Cyber Security Attacks & Prevention

Understanding threats to systems and testing your knowledge

Forms of Cyber Attacks

Malware

How it works: Installed via emails, downloads, USBs, or infected websites.

Purpose: Steal data, spy, damage systems, demand ransom.

Threats: Data loss, financial damage, system failure.

Social Engineering (Phishing)

How it works: Fake emails or websites trick users.

Purpose: Steal login details or install malware.

Threats: Identity theft, account compromise.

Brute-Force Attacks

How it works: Automated guessing of passwords.

Purpose: Gain unauthorized access.

Threats: Account takeover.

Denial of Service (DoS / DDoS)

How it works: Flooding systems with traffic.

Purpose: Make services unavailable.

Threats: Downtime, business disruption.

Data Interception & Theft

How it works: Capturing data during transmission.

Purpose: Steal sensitive information.

Threats: Privacy loss, identity theft.

SQL Injection

How it works: Malicious SQL commands entered into forms.

Purpose: Access or delete database data.

Threats: Data breaches.

Identifying and Preventing Vulnerabilities

Penetration Testing

Ethical hacking to find weaknesses.

Anti-Malware

Detects and removes malicious software.

Firewalls

Blocks unauthorized network traffic.

User Access Levels

Limits user permissions.

Passwords

Strong passwords reduce brute-force attacks.

Encryption

Makes data unreadable without a key.

Physical Security

Protects hardware and buildings.

Knowledge Check – Multiple Choice Quiz

1. What is malware?

Hardware failure
Malicious software
A firewall

2. Which attack relies on tricking people?

Social engineering
Brute force
SQL injection

3. What does phishing try to steal?

Login details
Hardware
Internet speed

4. What is the main goal of a brute-force attack?

Guess passwords
Crash servers
Encrypt files

5. What does DoS stand for?

Denial of Service
Data over Security
Disk operating system

6. What is DDoS?

Distributed Denial of Service
Direct Data operation
Dual device system

7. SQL injection targets which component?

Database
Network cable
Keyboard

8. Which is a prevention method?

Firewall
Phishing
Malware

9. What does encryption do?

Makes data unreadable
Deletes data
Slows the internet

10. Which attack intercepts data in transit?

Man-in-the-middle
Firewall attack
Brute force

11. What protects a building from unauthorized access?

Physical security
SQL injection
Malware

12. Which password is strongest?

T9!x@2Lp#
123456
password

13. Penetration testing is done by?

Ethical hackers
Criminals
End users

14. Which attack causes downtime?

DoS attack
Encryption
Antivirus

15. Which limits user permissions?

Access levels
Malware
Phishing

16. What is ransomware?

Malware demanding payment
Firewall software
Encryption key

17. What is the weakest security link?

Humans
Servers
Firewalls

18. Which protects against malware?

Anti-malware software
SQL injection
Phishing

19. What attack modifies database data?

SQL injection
DoS
Firewall

20. What is the main aim of cyber security?

Protect data and systems
Slow networks
Stop software updates