0% found this document useful (0 votes)
33 views3 pages

5.3 Cyber Security v2 1 3

Cyber security threats are activities aimed at harming digital systems, networks, or data, and understanding them is crucial for protecting information. Key threats include brute force attacks, data interception, DDoS attacks, hacking, malware, phishing, pharming, and social engineering. Each threat employs different techniques to compromise security, often targeting sensitive information and exploiting vulnerabilities.

Uploaded by

thinuperera903
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views3 pages

5.3 Cyber Security v2 1 3

Cyber security threats are activities aimed at harming digital systems, networks, or data, and understanding them is crucial for protecting information. Key threats include brute force attacks, data interception, DDoS attacks, hacking, malware, phishing, pharming, and social engineering. Each threat employs different techniques to compromise security, often targeting sensitive information and exploiting vulnerabilities.

Uploaded by

thinuperera903
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cyber security

Cyber security threats


Cyber security threats are activities or events that aim to harm digital systems, networks, or data.
Understanding these threats is essential to protect personal and organizational information.

The following list shows the cyber threats which will be considered in this section:

• brute force attacks


• data interception
• distributed denial of service (DDoS) attacks
• hacking
• malware (viruses, worms, Trojan horse, spyware, adware and ransomware)
• phishing
• pharming
• social engineering

Brute force attacks


A brute force attack is a type of cyberattack where an attacker systematically attempts all possible
combinations of usernames, passwords until the correct one is found. This method relies on trial and error and
can be automated using specialized tools.

Data interception
Data interception is a cyberattack where an unauthorized entity intercepts and accesses data being transmitted
over a network. This type of attack can compromise sensitive information, such as passwords, credit card
details, or confidential communications.

In a wired network interception can be carried out using a packet sniffer, which examines data packets being
sent over a network.

Wi-Fi (wireless) data interception can be carried out using wardriving.

Distributed Denial of Service (DDoS) attacks


A Distributed Denial of Service (DDoS) attack is a cyberattack in which an attacker uses multiple devices or
systems to overwhelm a target, such as a website, server, or network, with excessive traffic. The goal is to
disrupt normal operations, making the target unavailable to legitimate users.

One method of attack is to flood the network with useless spam traffic

Hacking
Hacking refers to the act of gaining unauthorized access to computer systems, networks, or data. It can involve
exploiting vulnerabilities, bypassing security measures, or using various tools and techniques to manipulate
systems.

Ethical hacking, also known as white-hat hacking, involves identifying and exploiting security vulnerabilities in
systems, networks, or applications with the owner's permission.

1
Malware
Malware, short for malicious software, refers to any software intentionally designed to harm, exploit, or
compromise computers, networks, or devices.

Summary of types of malware

Phishing
Phishing is a type of cyber-attack where criminals trick people into providing sensitive information, such as
usernames, passwords, or bank details, by pretending to be a trustworthy entity.

Key Features of Phishing


• Usually done via email, text messages, or fake websites.
• Often involves urgent or alarming messages (e.g., "Your account will be locked! Click here to verify your
details").

2
Pharming
Pharming is a cyber-attack where hackers redirect users from legitimate websites to fake ones to steal personal
information like usernames, passwords, or banking details. Unlike phishing, which relies on tricking users into
clicking malicious links, pharming works at the system level by manipulating the Domain Name System (DNS
cache poisoning) or a user’s device.

Social engineering
Social engineering is a method of manipulating people into revealing confidential information or performing
actions that compromise security. Instead of using technical hacking, attackers exploit human psychology to
gain access to sensitive data, such as passwords or banking details.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy