CS Types of Cyber Attacks

Understanding Cyber Attacks: Types, Targets, and Prevention

Cyber attacks are malicious attempts to gain unauthorized access to computer systems, networks, or data. They are carried out to steal sensitive information, disrupt services, or damage digital systems.

Understanding these attacks is the first step in helping organizations and individuals improve their cybersecurity and protect critical information.

Key Characteristics of Cyber Attacks


Major Types of Cyber Attacks

Hackers use a variety of techniques to compromise systems. Below are the 8 most common types of cyber attacks you should know about.

Common Cyber Attack Vectors Target System/Data Malware Phishing Ransomware DDoS Attack SQL Injection MITM Attack

1. Malware Attack

Malware (short for malicious software) is designed to damage, disrupt, or gain unauthorized access to computer systems. It can secretly steal data, monitor activities, or take control of a system without the user's knowledge.

Example: A user downloads "free" software from an untrusted website. The software secretly installs a keylogger (a type of malware) that records the user's keystrokes and steals their login credentials.

2. Phishing Attack

A Phishing Attack is a social engineering technique where attackers trick users into revealing sensitive information. It relies on human error rather than technical exploits.

Example: A user receives an email claiming to be from their bank asking them to verify their account. They click the link, log into the fake website, and the attacker instantly steals their username and password.

3. Ransomware Attack

Ransomware is a destructive type of malware that locks a victim out of their own files or computer system.

Example: A company’s computer network suddenly becomes locked. A red screen appears demanding $50,000 in Bitcoin within 48 hours to unlock their critical financial files.

4. Distributed Denial of Service (DDoS) Attack

A DDoS attack attempts to make a website or online service completely unavailable by flooding it with massive amounts of fake traffic.

Example: Thousands of infected computers send connection requests to an e-commerce website at the exact same time during a big sale, causing the server to crash and the store to go offline.

5. SQL Injection (SQLi)

SQL Injection is a web application attack where attackers insert malicious SQL (database) commands into standard input fields (like a search bar or login form).

Example: An attacker enters a specially crafted SQL command (e.g., ' OR 1=1 --) into a login form. The database misinterprets this as a valid command, bypassing authentication and logging the attacker in as an administrator.

6. Zero-Day Attack

A Zero-Day Attack exploits a previously unknown vulnerability in software before the developers have had time to release a patch or fix.

Example: Hackers discover a hidden flaw in a popular web browser. They exploit it to silently install malware on users' systems for weeks before the browser company realizes it and releases a security patch.

7. Man-in-the-Middle (MITM) Attack

A MITM attack occurs when an attacker secretly intercepts, monitors, or alters the communication between two parties.

Example: A user connects to free public Wi-Fi in a café and logs into their bank account. An attacker on the same network intercepts the unencrypted data packets and steals the login data.

8. Password Attack

A Password Attack is an attempt to logically guess, crack, or steal a user's password to gain unauthorized access to a system.

Example: An attacker uses a program that blasts thousands of common password combinations (like "password123", "admin", "123456") at a login page until it finds the correct one.


Why Do Cyber Attacks Happen? (The Motives)

Cyber attacks are carried out for various reasons depending on the attacker’s ultimate goals:

Common Targets of Cyber Attacks

No one is immune to cyber threats. The most common targets include:


Strategies to Prevent Cyber Attacks

Protecting yourself and your organization requires proactive security habits.

Strong Passwords Enable MFA Update Software

Verify Links Use Firewalls

1. Use Strong Passwords

Create complex passwords using a combination of uppercase and lowercase letters, numbers, and symbols to make them harder to guess.

2. Enable Multi-Factor Authentication (MFA)

MFA adds an extra layer of security by requiring a second verification step in addition to your password.

3. Keep Software Updated

Cybercriminals frequently exploit known vulnerabilities in outdated software.

4. Avoid Suspicious Links and Downloads

Be extremely cautious when clicking on links or downloading files from unknown or untrusted sources.

5. Use Antivirus and Firewall Protection

Security tools act as the outer walls of your digital defense.


Knowledge Check

?

Which type of cyber attack uses a "botnet" of infected devices to flood a server with massive amounts of traffic until it crashes?