Cyber Attacks
Denial-Of-Service (Dos) and distributed denial-of-service (DDoS)
It’s a cyber attack which actually floods the targeted system as a result shutting down the resources and makes the service paralyze for a certain period of time. It’s an Illegal Act which could result in imprisonment as well as fine.
Phishing Attacks
Phishing is actually an fraudulent attempt to bring the user in to trap and then fetch usernames, passwords, banking & credit card details
Spear Phishing Attacks
Spear phishing attacks are also email type attacks, and they are done targeting any single user or a particular user. On clicking the link, some specific malware is inserted into the computer.
Password Attacks
These are the most common attacks, This is done with the help of a tool which tries to login using a number of permutations and combinations. To stop these types of attacks we have a technology at present in place ie; CAPTCHA – Completely Automated Public Turing Test to Tell Computers and Humans Apart.
SQL Injection Attacks
It’s a type of Attack which allows SQL queries to be executed. Main Objective of these attacks are to tamper the existing data.
Malware Attacks
Malware Attacks are done by installing some malicious software on a device and then try to fetch useful or sensitive information. These Malware software hampers the device in many ways, sends sensitive information to receivers end, damages performance of the device, takes controls of settings & useful hardware resources and keeps on compromising on the security of the host hardware.
Ransomware Attacks
It’s a Attack where victims are asked for ransom. Technology behind that attack is that the data gets encrypted by the hacker and there is no guarantee even if after paying ransom, you get your files back.
Trojan Horses
Trojan is actually damaging, they actually disrupt the normal flow of the system. Those malware’s are distributed via downloading software from unsecured sources or email attachments etc.
Brute – Force Attack
It’s actually an attempt to crack the security password or access. It’s a primitive method but is still used these days.
AI- Power Attacks
This is The Type of attack in which malware first learns the psyche of the user and based upon that behavior the attack is initiated.