{"id":250,"date":"2020-05-11T11:11:41","date_gmt":"2020-05-11T11:11:41","guid":{"rendered":"http:\/\/www.cyberlaws.org\/?page_id=250"},"modified":"2020-05-23T06:33:13","modified_gmt":"2020-05-23T06:33:13","slug":"cyber-attacks","status":"publish","type":"page","link":"https:\/\/www.cyberlaws.org\/cyber-attacks\/","title":{"rendered":"Cyber Attacks"},"content":{"rendered":"

Cyber Attacks\u00a0<\/b><\/span><\/h3>\n

Denial-Of-Service (Dos) and distributed denial-of-service (DDoS)\u00a0<\/b><\/p>\n

\u00a0It’s a cyber attack which actually floods the targeted system as a result shutting down the resources and makes the service paralyze for a certain period of time. It’s an Illegal Act which could result in imprisonment as well as fine.\u00a0<\/span><\/p>\n

Phishing Attacks\u00a0<\/b><\/p>\n

\u00a0Phishing is actually an fraudulent attempt to bring the user in to trap and then fetch usernames, passwords, banking & credit card details\u00a0<\/span><\/p>\n

Spear Phishing Attacks<\/b><\/p>\n

\u00a0Spear phishing attacks are also email type attacks, and they are done targeting any single user or a particular user. On clicking the link, some specific malware is inserted into the computer.<\/span><\/p>\n

Password Attacks\u00a0<\/b><\/p>\n

These are the most common attacks, This is done with the help of a tool which tries to login using a number of permutations\u00a0 and combinations. To stop these types of attacks we have a technology at present in place ie; CAPTCHA \u2013 Completely Automated Public Turing Test to Tell Computers and Humans Apart.\u00a0<\/span><\/p>\n

SQL Injection Attacks\u00a0<\/b><\/p>\n

It’s a type of Attack which allows SQL queries to be executed. Main Objective of these attacks are to tamper the existing data.\u00a0<\/span><\/p>\n

Malware Attacks\u00a0<\/b><\/p>\n

\u00a0Malware Attacks\u00a0 are done by installing some malicious software on a device and then try to fetch useful or sensitive information. These Malware software hampers the device in many ways, sends sensitive information to receivers end, damages performance of the device, takes controls of settings & useful hardware resources and keeps on compromising on the security of the host hardware.<\/span><\/p>\n

Ransomware Attacks\u00a0<\/b><\/p>\n

\u00a0It’s a Attack where victims are asked for ransom. Technology behind that attack is that the data gets encrypted by the hacker and there is no guarantee even if after paying ransom, you get your files back.<\/span><\/p>\n

Trojan Horses<\/b><\/p>\n

\u00a0Trojan is actually damaging, they actually disrupt the normal flow of the system. Those malware\u2019s are distributed via downloading software from unsecured sources or email attachments etc.<\/span><\/p>\n

Brute \u2013 Force Attack\u00a0<\/b><\/p>\n

It’s actually an attempt to crack the security password or access. It’s a primitive method but is still used these days.<\/span>\u00a0<\/b><\/p>\n

AI- Power Attacks\u00a0<\/b><\/p>\n

\u00a0This is The Type of attack in which malware first learns the psyche of the user and based upon that behavior the attack is initiated.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"

Cyber Attacks\u00a0 Denial-Of-Service (Dos) and distributed denial-of-service (DDoS)\u00a0 \u00a0It’s a cyber attack which actually floods the targeted system as a result shutting down the resources and makes… <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/pages\/250"}],"collection":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/comments?post=250"}],"version-history":[{"count":8,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/pages\/250\/revisions"}],"predecessor-version":[{"id":393,"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/pages\/250\/revisions\/393"}],"wp:attachment":[{"href":"https:\/\/www.cyberlaws.org\/wp-json\/wp\/v2\/media?parent=250"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}