Try our "Help Me AI"
Results 1 to 3 of 3

Thread: What Are The Most Common Types Of Cyber Security Attacks?

  1. #1
    Status
    Offline
    Moana's Avatar
    Reputed Member
    Join Date
    May 2018
    Location
    Vavuniya Srilanka
    Posts
    1,569
    Blog Entries
    5
       Rep Power
    17

    What Are The Most Common Types Of Cyber Security Attacks?

    HELLO GUYS!

    When a criminal is trying to Hack an organization, they won't re-invent the wheel unless they absolutely have to: they'll draw up[on a common space of attacks that are known to be highly effective, such as malware, phising, or cross-site scripting. Whether you're trying to make sense of the latest data breach headline in the news in the news or analyzing an incident in our own business!


    CAN YOU GUYS TELL ME THE MOST COMMON CYBER SECURITY ATTACKS??
    Your Last Mistake Is Your Best Teacher

  2. #2
    Status
    Offline
    Adiza's Avatar
    Reputed Member
    Join Date
    May 2018
    Posts
    423
       Rep Power
    16
    Quote Originally Posted by Shivani View Post
    HELLO GUYS!

    When a criminal is trying to Hack an organization, they won't re-invent the wheel unless they absolutely have to: they'll draw up[on a common space of attacks that are known to be highly effective, such as malware, phising, or cross-site scripting. Whether you're trying to make sense of the latest data breach headline in the news in the news or analyzing an incident in our own business!


    CAN YOU GUYS TELL ME THE MOST COMMON CYBER SECURITY ATTACKS??
    *Zero-day attacks- Target software vulnerabilities that have yet to be discovered and patched
    *Cloud-data leakage- Is when employee uploads sensitive information of the company to cloud services like Dropbox*
    *Mobile malware- Specially designed to target the operating system on mobile devices, allowing hackers to steal data on the devices.
    *Targeted attacks- Use a variety of hacking methods to methodically attack a predetermined user or organization
    *SQL injection- It allows hackers to execute malicious code on a server, allowing them to steal or delete data stored on that server
    Let's be the change

  3. #3
    Status
    Offline
    Moana's Avatar
    Reputed Member
    Join Date
    May 2018
    Location
    Vavuniya Srilanka
    Posts
    1,569
    Blog Entries
    5
       Rep Power
    17
    Quote Originally Posted by Shivani View Post
    HELLO GUYS!

    When a criminal is trying to Hack an organization, they won't re-invent the wheel unless they absolutely have to: they'll draw up[on a common space of attacks that are known to be highly effective, such as malware, phising, or cross-site scripting. Whether you're trying to make sense of the latest data breach headline in the news in the news or analyzing an incident in our own business!


    CAN YOU GUYS TELL ME THE MOST COMMON CYBER SECURITY ATTACKS??
    \

    Hi there Adix=za! These are some as well!



    • Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
    • Man-in-the-middle (MitM) attack.
    • Phishing and spear phishing attacks.
    • Drive-by attack.
    • Password attack.
    • SQL injection attack.
    • Cross-site scripting (XSS) attack.
    • Eavesdropping attack.


    Your Last Mistake Is Your Best Teacher

Similar Threads

  1. Replies: 0
    Last Post: 09-28-2018, 01:18 PM
  2. Replies: 0
    Last Post: 09-28-2018, 01:15 PM
  3. Replies: 0
    Last Post: 09-27-2018, 04:02 PM
  4. Replies: 2
    Last Post: 09-23-2018, 06:44 PM
  5. Cyber security
    By Wondergirl in forum Security
    Replies: 1
    Last Post: 05-19-2018, 12:06 AM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Who We Are

The Hub Sri Lanka is an online community portal for all the Sri Lankan digital Citizen's to enthusiastically learn and connect with the society by enormously increasing their knowledge and careers through an extensive collaborative marketplace.

Join us
RSS RSS 2.0 XML MAP HTML