Cyber security protects the data and integrity of computing assets belonging to or connecting to an organization’s network.The purpose of cybersecurity is to help prevent cyberattacks, data breaches and identity theft and can aid in risk management.or a hacker, it’s a golden age. With so many access points, public IP’s and constant traffic and tons of data to exploit, black hat hackers are having one hell of a time exploiting vulnerabilities and creating malicious software for the same. Above that, cyber attacks are evolving by the day. Hackers are becoming smarter and more creative with their malware and how they bypass virus scans and firewalls still baffles many people.
Why is this so important? Because year over year, the worldwide spend for cyber security continues to grow: 71.1 billion in 2014 (7.9% over 2013), and 75 billion in 2015 (4.7% from 2014) and expected to reach 101 billion by 2018. Organizations are starting to understand that malware is a publicly available commodity that makes it easy for anyone to become a cyber attacker, and even more companies offer security solutions that do little to defend against attacks. Cyber security demands focus and dedication.
10 most common cyber attack types
- Man-in-the-middle (MitM) attack
- Phishing and spear phishing attacks
- Drive-by attack
- Password attack
- SQL injection attack
- Cross-site scripting (XSS) attack
- Eavesdropping attack
- Birthday attack
- Malware attack
A denial-of-service (DoS) is any type of attack where the attackers (hackers) attempt to prevent legitimate users from accessing the service. In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses.
Man-in-the-middle (MitM) attack
man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
Spear phishing attacks
Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer.
A drive-by download refers to the unintentional download of malicious code to your computer or mobile device that leaves you open to a cyberattack.Unlike many other types of cyberattack, a drive-by doesn’t rely on the user to do anything to actively enable the attack.
password–based attack. An attack in which repetitive attempts are made to duplicate a valid logon or password sequence.
SQL injection attack
An SQL injection is a computer attack in which malicious code is embedded in a poorly-designed application and then passed to the backend database. The malicious data then produces database query results or actions that should never have been executed.
Cross-site scripting (XSS) attack
Cross–site scripting (XSS) is a security breach that takes advantage of dynamically generated Web pages. In an XSS attack, a Web application is sent with a script that activates when it is read by an unsuspecting user’s browser or by an application that has not protected itself against cross–site scripting.
An eavesdropping attack, which are also known as a sniffing or snooping attack, is an incursion where someone tries to steal information that computers, smartphones, or other devices transmit over a network.
Birthday attacks are a class of brute-force techniques used in an attempt to solve a class of cryptographic hash function problems. These methods take advantage of functions which, when supplied with a random input, return one of equally likely values. By repeatedly evaluating the function for different inputs, the same output is expected to be obtained after about evaluations.
A malware attack is a type of cyberattack in which malware or malicious software performs activities on the victim’s computer system, usually without his/her knowledge. Nowadays, people use words like malware, spyware, and ransomware a lot more than the word “virus.” Computer viruses operate via similar means.