Home »
Cyber Security
Types of Cyber attacks | Cyber Security
By Kamakshi, on March 29, 2019
Nowadays Cyber Security is an essential part of our life. We are store, secure and use data and security is important to prevent to steal data. There are numbers of attacks done by the attackers for ex: Man in middle attacks, Brute force, etc. Companies are aware of the Cyber Security importance especially those who are working on a cloud system and IoT technology. Cyber Security involving the various types of protection of computer system and prevention of the unauthorized access of electronic data.
The below are most common cyberattacks are:
1. Man in the middle attacks
It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge between them. Using this Man in middle attacks, an attacker will be able to read the data, insert the data and modify the data in the intercepted connection.
2. Brute Force
Brute force is a type of attack which uses a technique of trial and error method. Brute force attack generates a large number of guesses about the data and validates them to obtain actual data like user password and personal identification number. This type of attack used by criminals to crack encrypted data, or by security, analysts to test an organization's network security.
3. DNS Spoofing
DNS Spoofing is another type of computer security hacking. Where data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attacker's computer or any other computer. This type of attack DNS attacks may go on for a long period of time without being detected and can cause serious security issues.
This type of attack meant to make a network resource unavailable to the users. It accomplishes this by covering the target with traffic or sending it information that triggers a crash. The attacker uses a single system and a single internet connection to attack a server system.
4. Backdoors
Most of the attackers use the technique of backdoors and this is a method that bypasses the normal authentication process. For the get, information developer create a backdoor so that an application or operating system can be accessed for troubleshooting or other benefits purposes.
5. Bots
A bot is also called a robot is an automated process that interacts with all other network services. Some bots program run automatically, while others only execute commands when they receive specific input. There are various examples of bots program are a crawler, chatroom bots, and malicious bots.
6. Dictionary Attacks
Attacker use Dictionary attacks for stored the list of a commonly used password and validated information to get original password.
7. Session Hijacking
Attacker use Session Hijacking to attack a user session over a protected network and also web applications create cookies to store all the state about the cookies and user sessions. By stealing the cookies, an attacker can have access to all important information about user data.
8. Phishing
Attackers use Phishing technique to do various type of inactivities like steal sensitive information and user login credentials and credit card number. It occurs when an attacker pretends to be as a trustworthy entity in an electronic communication device.