Cyber Attacks
There are many ways that computer systems may be attacked. Here are some common attacks that must be defended against.
There are many ways that computer systems may be attacked. Here are some common attacks that must be defended against.
Malware short for "malicious software." This is software that installs on your system without your knowledge, and causes harm. There are many types of malware, including:
Viruses - malware that attaches to a legitimate program or file and spreads from one computer to another, typically when the infected file is executed. Viruses can corrupt, delete, or steal data, and they often require some form of human action to spread (such as opening an email attachment).
Worms - is similar to viruses, but can spread without human intervention. Worms exploit vulnerabilities in operating systems or networks to replicate themselves and spread across systems or networks, often consuming bandwidth and overloading servers.
Trojan horse - disguises itself as legitimate software to trick users into installing it. Once installed, the Trojan can give the attacker remote access to the infected system, allowing them to steal data, install other malware, or cause damage.
Ransomware - encrypts a victim's files or systems, making them inaccessible. The attacker then demands a ransom, typically paid in cryptocurrency, in exchange for the decryption key to restore access to the files.
Spyware - secretly monitors and collects information about a user's activity without their knowledge. It often tracks things like keystrokes, browsing habits, and login information, sending this data to the attacker.
Keylogger - malware that records every keystroke made on a device, often to capture sensitive information like usernames, passwords, and credit card details.
Phishing is a type of social engineering attack in which an attacker disguises themselves as a trusted entity (like a bank or school administrator) to trick someone into revealing sensitive information, such as usernames, passwords, or credit card numbers.
A botnet is a network of infected computers (often called "zombies") that are controlled remotely by an attacker. These infected devices can be used to launch large-scale attacks, such as DDoS attacks, or to send spam emails. A botnet may contain thousands or tens-of-thousands of computers.
A Distributed Denial of Service (DDoS) attack is when multiple systems flood a targeted server, website, or network with so much traffic that it becomes overwhelmed and unable to function. This is generally accomplished using a botnet, which may have been bought or rented for the attack. The goal is to make the service unavailable to legitimate users.