Forms of Cyber Attacks
Malware
How it works: Installed via emails, downloads, USBs, or infected websites.
Purpose: Steal data, spy, damage systems, demand ransom.
Threats: Data loss, financial damage, system failure.
Social Engineering (Phishing)
How it works: Fake emails or websites trick users.
Purpose: Steal login details or install malware.
Threats: Identity theft, account compromise.
Brute-Force Attacks
How it works: Automated guessing of passwords.
Purpose: Gain unauthorized access.
Threats: Account takeover.
Denial of Service (DoS / DDoS)
How it works: Flooding systems with traffic.
Purpose: Make services unavailable.
Threats: Downtime, business disruption.
Data Interception & Theft
How it works: Capturing data during transmission.
Purpose: Steal sensitive information.
Threats: Privacy loss, identity theft.
SQL Injection
How it works: Malicious SQL commands entered into forms.
Purpose: Access or delete database data.
Threats: Data breaches.
Identifying and Preventing Vulnerabilities
Penetration Testing
Ethical hacking to find weaknesses.
Anti-Malware
Detects and removes malicious software.
Firewalls
Blocks unauthorized network traffic.
User Access Levels
Limits user permissions.
Passwords
Strong passwords reduce brute-force attacks.
Encryption
Makes data unreadable without a key.
Physical Security
Protects hardware and buildings.