Information Technology - Types of Computer Attacks.pptx

LanieDalagon1 14 views 113 slides May 24, 2024
Slide 1
Slide 1 of 113
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113

About This Presentation

Can help for IT students


Slide Content

Types of computer attacks Lanie D. Viernes 1

What is a computer attack? -Is a malicious attempt to disrupt, damage or gain unauthorized access to a computer system or network. 2

MALWARE ATTACKS 3 Some common types of computer attacks PHISHING ATTACKS PASSWORD ATTACKS DENIAL-OF-SERVICE ATTACKS WEB ATTACKS DRIVE-BY DOWNLOADS

20XX Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/ 4 Malware attack A malware attack is a type of computer attack that involves the use of malicious software, or malware, to disrupt, damage, or gain unauthorized access to a computer system or network. Malware is a catch-all term that includes a wide variety of malicious software, such as viruses, worms, Trojan horses, ransomware, and spyware, among others. Malware attacks can be launched in a variety of ways, such as through email attachments, infected websites, or software downloads. Once the malware is installed on a computer system or network, it can cause a range of problems, such as stealing sensitive information, disrupting system performance, or even taking control of the system.

20XX 5 The most common type of malware Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/ 5

is a type of malware that encrypts a victim’s data where the attacker demands for a “ransom”, or payment, in order to restore access to files and network. 6 RANSOMWARE Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

HOW DO RANSOMWARE ATTACKS WORK? 7 Step 1: Infection Ransomware operators often use phishing emails and social engineering techniques to infect their victim’s computer. In most cases, the victim ends up clicking a malicious link in the email, introducing the ransomware variant on their device. Step 2: ENCRYPTION After a device or system has been infected, the ransomware then searches for and encrypts valuable files. Depending on the variant, the malicious software may find opportunities to spread to other devices and systems across the organization. Step 3: RANSOM DEMAND Once the data has been encrypted, a decryption key is required to unlock the files. In order to get the decryption key, the victim must follow the instructions left on a ransom note that outline how to pay the attacker – usually in Bitcoin. Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

Example of ransomware letter 8 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

https://krebsonsecurity.com/2019/06/report-no-eternal-blue-exploit-found-in-baltimore-city-ransomware/ 9 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

is a type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. Unlike traditional  malware , fileless malware does not require an attacker to install any code on a target’s system, making it hard to detect. 10 FILELESS MALWARE Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

Stages of a fileLESS attack 11 Stage 1: gain access Technique:   Remotely Exploit a vulnerability and use web scripting for remote access ( eg. China Chopper) The attacker gains remote access to the victim’s system, to establish a beachhead for his attack. Stage 2: steal credentials Technique:   Remotely Exploit a vulnerability and use web scripting for remote access ( eg. Mimikatz ) Using the access gained in the previous step, the attacker now tries to obtain credentials for the environment he has compromised, allowing him to easily move to other systems in that environment. Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

12 Stage 3: maintain persistence Technique:   Modify registry to create a backdoor ( eg. Sticky Keys Bypass) Now, the attacker sets up a backdoor that will allow him to return to this environment at will, without having to repeat the initial steps of the attack. Stage 2: exfiltrate data Technique:   Uses file system and built-in compression utility to gather data, then uses FTP to upload the data In the final step, the attacker gathers the data he wants and prepares it for exfiltration, copying it in one location and then compressing it using readily available system tools such as Compact. The attacker then removes the data from the victim’s environment by uploading it via FTP. Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

https://www.zdnet.com/article/microsoft-warns-about-astaroth-malware-campaign/ 13

https://www.zdnet.com/article/microsoft-warns-about-astaroth-malware-campaign/ 14

Spyware collects information about users’ activities without their knowledge or consent. This can include passwords, pins, payment information and unstructured messages. 15 SPYWARE Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

https://www.wired.com/2014/11/darkhotel-malware/ 16 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

Adware is any software program that displays adverts on a computer, whether harmful or not. It is most commonly referred to as malicious programs that show misleading adverts, blinking pop-up windows, giant digital billboards, and full-screen auto-play advertisements within an internet browser 17 ADWARE Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

The danger in adware is the erosion of a user’s privacy — the data captured by adware is collated with data captured, overtly or covertly, about the user’s activity elsewhere on the internet and used to create a profile of that person which includes who their friends are, what they’ve purchased, where they’ve traveled, and more. That information can be shared or sold to advertisers without the user’s consent. 18 ADWARE Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

https://www.wired.com/2017/06/hack-brief-dangerous-fireball-adware-infects-quarter-billion-pcs/ 19 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

A Trojan Horse (Trojan) is a type of  malware  that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.  20 TROJAN Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

A Trojan is sometimes called a Trojan virus or Trojan horse virus, but those terms are technically incorrect. Unlike a  virus  or worm, Trojan malware cannot replicate itself or self-execute. It requires specific and deliberate action from the user. 21 TROJAN: virus or malware? Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

Trojans are malware, and like most forms of malware, Trojans are designed to damage files, redirect internet traffic, monitor the user’s activity, steal sensitive data or set up backdoor access points to the system. Trojans may delete, block, modify, leak or copy data, which can then be sold back to the user for ransom or on the  dark web . 22 TROJAN: virus or malware? Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

https://www.crowdstrike.com/blog/meet-crowdstrikes-adversary-of-the-month-for-february-mummy-spider/ https://www.cisa.gov/news-events/alerts/2018/07/20/emotet-malware 23 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

24 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate from one computer to another without human activation after breaching a system. Typically, a worm spreads across a network through your Internet or LAN (Local Area Network) connection. 25 WORMS Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

Worms target vulnerabilities in operating systems to install themselves into networks. They may gain access in several ways: through backdoors built into software, through unintentional software vulnerabilities, or through flash drives. Once in place, worms can be used by malicious actors to launch  DDoS attacks , steal sensitive data, or conduct ransomware attacks. 26 WORMS Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ 27 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

A  virus  is a piece of code that inserts itself into an application and executes when the app is run. Once inside a network, a virus may be used to steal sensitive data, launch DDoS attacks or conduct ransomware attacks. 28 VIRUS Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

29 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

A rootkit is a type of malicious software or malware that is designed to gain administrative-level or privileged access to a computer system or network without being detected. Once installed, a rootkit can modify or replace system files, programs, and processes, and can hide its presence from traditional antivirus and anti-malware software. 30 ROOTKITS Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

https://www.eweek.com/security/more-nefarious-strain-of-zacinlo-malware-infecting-windows-10-machines/ 31 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

Keyloggers are a type of malware designed to capture and record every keystroke made on a computer keyboard or virtual keyboard. This can include usernames, passwords, credit card numbers, and other sensitive information entered by the user. Keyloggers can be used by hackers to steal personal information, financial data, or login credentials. 32 KEYLOGGERS Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

A  keylogger  is a type of spyware that monitors user activity. Keyloggers have legitimate uses; businesses can use them to monitor employee activity and families may use them to keep track of children’s online behaviors. 33 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

https://www.pcworld.com/article/420141/attack-campaign-uses-keylogger-to-hijack-key-business-email-accounts.html 34

A bot is a software application that performs automated tasks on command. They’re used for legitimate purposes, such as indexing search engines, but when used for malicious purposes, they take the form of self-propagating malware that can connect back to a central server. 35 BOTS/BOTNETS Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

Usually, bots are used in large numbers to create a  botnet , which is a network of bots used to launch broad remotely-controlled floods of attacks, such as DDoS attacks. Botnets can become quite expansive. For example, the Mirai IoT botnet ranged from 800,000 to 2.5M computers. 36 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

Mirai gained notoriety in 2016 when it was used to launch a massive DDoS attack on the DNS provider Dyn , which caused major internet disruptions and outages across the United States and Europe. The attack was successful in part because Mirai was able to exploit vulnerable IoT devices with weak security and default passwords. 37 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

New Echobot malware is a smorgasbord of vulnerabilities | ZDNET 38 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

Mobile malware is malicious software specifically designed to target mobile devices, such as smartphones and tablets, with the goal of gaining access to private data. 39 MOBILE MALWARE Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

https://security.googleblog.com/2019/06/pha-family-highlights-triada.html 40 Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

A wiper is a type of malware with a single purpose: to erase user data and ensure it can’t be recovered. Wipers are used to take down computer networks in public or private companies across various sectors. Threat actors also use wipers to cover up traces left after an intrusion, weakening their victim’s ability to respond. 41 WIPER MALWARE Source: https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

https://www.crowdstrike.com/blog/technical-analysis-of-whispergate-malware/ 42

MALWARE ATTACKS 43 Some common types of computer attacks PHISHING ATTACKS PASSWORD ATTACKS WEB ATTACKS PASSWORD ATTACKS

44 A phishing attack is a type of social engineering attack where an attacker tries to trick a victim into revealing sensitive information, such as login credentials, credit card numbers, or personal information, by posing as a trustworthy entity. What is a phishing attack?

45 Phishing attacks typically involve sending a fake email, message, or website that looks like it comes from a legitimate source, such as a bank, social media platform, or online retailer. The message may contain a link to a fake website that looks like the real thing but is actually designed to steal the victim's login credentials or other sensitive information.

46 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

47 Spear phishing  involves targeting a specific individual in an organization to try to steal their  login credentials . The attacker often first gathers information about the person before starting the attack, such as their name, position, and contact details. SPEAR PHISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

48 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

49 Vishing , which is short for "voice phishing," is when someone uses the phone to try to steal information. The attacker may pretend to be a trusted friend or relative or to represent them. VISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

50 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.infosecurity-magazine.com/news/mps-bombarded-spam-brexit-no-deal/

51 In an  email phishing  scam, the attacker sends an email that looks legitimate, designed to trick the recipient into entering information in reply or on a site that the hacker can use to steal or sell their data. EMAIL PHISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

52 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.inky.com/en/blog/5-of-the-biggest-phishing-scams-of-all-time

53 An HTTPS phishing attack is carried out by sending the victim an email with a link to a fake website. The site may then be used to fool the victim into entering their private information. HTTPS PHISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

54 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.agari.com/resources/guides/scarlet-widow-bec-scams

55 In a  pharming  attack, the victim gets malicious code installed on their computer. This code then sends the victim to a fake website designed to gather their login credentials. PHARMING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

56 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.fortinet.com/resources/cyberglossary/pharming

57 Pop-up phishing often uses a pop-up about a problem with your computer’s security or some other issue to trick you into clicking. You are then directed to download a file, which ends up being malware, or to call what is supposed to be a support center. POP-UP PHISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

58 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.affinitytechpartners.com/3n1blog/2018/5/3/scam-alert-what-you-need-to-know-about-pop-up-phishing

59 In an evil twin attack, the hacker sets up a false Wi-Fi network that looks real. If someone logs in to it and enters sensitive details, the hacker captures their info. EVIL TWIN PHISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

60 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.darkreading.com/attacks-breaches/understanding-evil-twin-ap-attacks-and-how-to-prevent-them

61 In a  watering hole phishing attack , a hacker figures out a site a group of users tends to visit. They then use it to infect the users’ computers in an attempt to penetrate the network. WATERING HOLE PHISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

62

63 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://threatpost.com/council-foreign-relations-website-hit-watering-hole-attack-ie-zero-day-exploit-122912/77352/

64 A  whaling attack  is a phishing attack that targets a senior executive. These individuals often have deep access to sensitive areas of the network, so a successful attack can result in access to valuable info. WHALING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

65 A whaling attack may begin with a communication through a method commonly used by both the person being impersonated and the target. This may be email or office texting that uses the internet. When the attack begins, there may be no reason for the target to question the identity of the attacker, as the latter may have the same username as the target's associate. In some cases, the email address may be faked, but it appears real enough to be believable. https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

66

67

68 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.afr.com/companies/financial-services/fake-zoom-invite-cripples-aussie-hedge-fund-with-8m-hit-20201122-p56f9c

69 A clone phishing attack involves a hacker making identical copies of a recipient’s message. They may include something like “resending this” and put a malicious link in the email. CLONE PHISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

70 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.researchgate.net/figure/3-Whaling-phishing-example-2-113-Phishing-email-affection-The-phishing-email-can_fig3_333162611

71 Deceptive phishers use  deceptive technology  to pretend they are with a real company to inform the targets they are already experiencing a cyberattack. The users then click on a malicious link, infecting their computer. DECEPTIVE PHISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

72 deceptive technology   is a strategy to attract cybercriminals away from an enterprise's true assets and divert them to a decoy or trap. The decoy mimics legitimate servers, applications, and data so that the criminal is tricked into believing that they have infiltrated and gained access to the enterprise's most important assets when in reality they have not. The strategy is employed to minimize damage and protect an organization's true assets. https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

73 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.fortinet.com/resources/cyberglossary/what-is-deception-technology

74 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://securelist.com/email-spoofing-types/102703/

75 Social engineering  attacks pressure someone into revealing sensitive information by manipulating them psychologically. SOCIAL ENGINEERING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

76 Social engineering refers  to a wide range of attacks that leverage human interaction and emotions to manipulate the target. During the attack, the victim is fooled into giving away sensitive information or compromising security. A social engineering attack typically takes multiple steps. The attacker will research the potential victim, gathering information about them and how they can use them to bypass security protocols or get information. Then the attacker does something to gain the target’s trust before finally manipulating them into divulging sensitive information or violating security policies. https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

77 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.armorblox.com/blog/blox-tales-chase-credential-phishing-attacks/

78 Anglers use fake social media posts to get people to provide login info or download malware. ANGLER PHISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

79 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.itgovernance.co.uk/blog/beware-of-angler-phishing

80 Smishing  is phishing through some form of a text message or SMS. SMISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

81 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.secureworld.io/industry-news/5-smishing-attack-examples-everyone-should-see

82 With a  man-in-the-middle attack , the hacker gets in “the middle” of two parties and tries to steal information exchanged between them, such as account credentials. MAN-IN-THE-MIDDLE (MTM) ATTACKS https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

83

84 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.veracode.com/security/man-middle-attack

85 With website spoofing, a hacker creates a fake website that looks legitimate. When you use the site to log in to an account, your info is collected by the attacker. WEBSITE SPOOFING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

86

87 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.techrepublic.com/article/phishing-attack-impersonates-amazon-web-services-to-steal-user-credentials/

88 Domain spoofing, also referred to as  DNS spoofing,  is when a hacker imitates the domain of a company—either using email or a fake website—to lure people into entering sensitive information. To  prevent domain spoofing , you should double-check the source of every link and email. DOMAIN SPOOFING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

89 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

90

91 Image phishing uses images with malicious files in them meant to help a hacker steal your account info or infect your computer. IMAGE PHISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

92 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.sentinelone.com/blog/hiding-code-inside-images-malware-steganography/

93

94 A search engine phishing attack involves an attacker making fake products that look attractive. When these pop up in a search engine, the target is asked to enter sensitive information before purchasing, which then goes to a hacker. SEARCH ENGINE PHISHING https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

95

96 https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks https://www.govcert.ch/blog/ads-on-popular-search-engine-are-leading-to-phishing-sites/

MALWARE ATTACKS 97 Some common types of computer attacks PHISHING ATTACKS PASSWORD ATTACKS WEB ATTACKS PASSWORD ATTACKS

98 A password attack is a type of cyber attack where an attacker attempts to gain unauthorized access to a system or account by guessing or cracking the password used to protect it. What is a Password attack? https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

99 Password attacks are one of the most common forms of corporate and personal data breaches. A password attack is simply when a hacker tries to steal your password. In 2020,  81% of data breaches  were due to compromised credentials. Because passwords can only contain so many letters and numbers,  passwords are becoming less safe . Hackers know that many passwords are poorly designed, so password attacks will remain a method of attack as long as passwords are being used. https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

100 Phishing is when a hacker posing as a trustworthy party sends you a fraudulent email, hoping you will reveal your personal information voluntarily. Sometimes they lead you to fake "reset your password" screens; other times, the links install malicious code on your device. 1. phishing https://www.onelogin.com/learn/6-types-password-attacks Protect yourself from password attacks with the following information:

101 https://www.onelogin.com/learn/6-types-password-attacks

102 Man-in-the middle ( MitM ) attacks are when a hacker or compromised system sits in between two uncompromised people or systems and deciphers the information they're passing to each other, including passwords. If Alice and Bob are passing notes in class, but Jeremy has to relay those notes, Jeremy has the opportunity to be the man in the middle. Similarly, in 2017, Equifax removed its apps from the App Store and Google Play store because they were passing sensitive data over insecure channels where hackers could have stolen customer information. 2. Man-in-the-Middle Attack https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

103 https://www.onelogin.com/learn/6-types-password-attacks

104 If a password is equivalent to using a key to open a door, a brute force attack is using a battering ram. A hacker can try 2.18 trillion password/username combinations in 22 seconds, and if your password is simple, your account could be in the crosshairs. 3. Brute Force Attack https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

105 https://www.onelogin.com/learn/6-types-password-attacks

106 A type of brute force attack, dictionary attacks rely on our habit of picking "basic" words as our password, the most common of which hackers have collated into "cracking dictionaries." More sophisticated dictionary attacks incorporate words that are personally important to you, like a birthplace, child's name, or pet's name. 4. Dictionary Attack https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

107 https://www.onelogin.com/learn/6-types-password-attacks

108 If you've suffered a hack in the past, you know that your old passwords were likely leaked onto a disreputable website. Credential stuffing takes advantage of accounts that never had their passwords changed after an account break-in. Hackers will try various combinations of former usernames and passwords, hoping the victim never changed them. 5. Credential Stuffing https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

109 https://www.onelogin.com/learn/6-types-password-attacks

110 Keyloggers are a type of malicious software designed to track every keystroke and report it back to a hacker. Typically, a user will download the software believing it to be legitimate, only for it to install a keylogger without notice. 6. Keyloggers https://www.fortinet.com/resources/cyberglossary/types-of-phishing-attacks

111 https://www.onelogin.com/learn/6-types-password-attacks

MALWARE ATTACKS 112 Some common types of computer attacks PHISHING ATTACKS PASSWORD ATTACKS DENIAL-OF-SERVICE ATTACKS WEB ATTACKS DRIVE-BY DOWNLOADS

113
Tags