Skip to content

Latest commit

 

History

History
21 lines (11 loc) · 1.53 KB

File metadata and controls

21 lines (11 loc) · 1.53 KB

Security attacks

Security attacks refer to any deliberate action taken to compromise the confidentiality, integrity, or availability of a system. Attacks can target hardware, software, or data. Attacks can come from various sources, including hackers, criminals, insiders, or nation-states.

Various types…

Malware: This is malicious software that is designed to infiltrate or damage a computer system. This includes viruses, worms, trojans, and ransomware.

Phishing attack: These are social engineering attacks where attackers send emails, texts, or other messages that appear to be from a legitimate source, such as a bank or company, to trick users into providing sensitive information.

Distributed Denial of Service (DDoS) attacks: These overwhelm a targeted system with traffic to make it unavailable to legitimate users.

Man-in-the-middle attacks (MITM): These intercept communication between two parties to steal sensitive information or manipulate the conversation.

Password attacks: These try to guess or steal a user's password to gain access to a system or network. This includes brute-force attacks, dictionary attacks, and phishing attacks.

SQL injection attacks: These exploit vulnerabilities in SQL code to gain access to sensitive information or execute unauthorized commands.

Cross-site scripting (XSS) attacks: These inject malicious code into a website to steal sensitive information or execute unauthorized commands.

Eavesdropping attacks: These listening in on a network or communication channel to steal sensitive information.