Directory Image
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.

Kinds of Cyber Attacks

Author: Doc Toolss
by Doc Toolss
Posted: Apr 22, 2020

On a time when the world is getting locked down due to COVID19 which is a deadly virus and very contagious thanks to the Wuhan city located in Central China. This is also one of the kinds of attack which the world is battling with and is referred to as a World War - III. We hope that this epidemic comes to an end as early as possible and our world around doctors or scientists find its antidote. To get the latest counts on COVID19 check out the link https://www.worldometers.info/coronavirus/

We took COVID19 as an example above as its also a kind of attack which the world is facing today:

Catfishing : Process of creating a online profile in order to trick people into believing they are someone else for financial gains.

Zeroday Attack: It is a threat that is unknown to security specialist and has not been addressed.

Social Engineering: Asking the information over the meeting or talking to him or her to gain the sensitive information of any secured data.

Foot Printing: The process where a hacker takes passive steps to gather information about a potential target.

Phishing : The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information such as passwords and credit card numbers.

Reconnaissance: A type of computer attack in which an intruder engages with the targeted system to gather information about vulnerabilities.

Vishing: The fraudulent practice of making phone calls or leaving voice messages purporting to be from a reputable companies in order to induce individuals to reveal personal information such as bank details or CC details etc.

Doxing: The attacker threatens to release sensitive information or an access to other unless victim says him.

Shoulder Surfing: It is a type of social engineering technique used to obtain information such as personal identification numbers, passwords and other confidential data

Spoofing: Spoofing attack is a situation in which a person or program successfully masquerade as another by falsifying data to gain an illegitimate.

Pharming: It is a form of an online fraud that redirects users from legitimate. website’s traffic to another fake site.

Smishing: The use of text messages sent to a target in order to lure them to click on the links contained in the text.

DoS (Denial-of-Service): An attack which is meant to shut down a machine or network, making it inaccessible to its intended users.

Brute Force Attack: It is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys.

Dictionary Attack: It is a form of attack technique for defeating a cipher or authentication mechanism by trying to determine its decryption or passphrase by trying hundreds or sometimes millions of likely possibilities such as words in a dictionary.

So to check some of more blogs, please click the link below:

https://doctoolss.wordpress.com/

Written and Composed by DocTooLss | @doctools8

"We make Technology EaZy via Docs"

Follow us @doctools8 | Email: task.theme@gmail.com| WordPress: https://doctoolss.wordpress.com/

About the Author

Written and Composed by DocTooLss | @doctools8 "We make Technology EaZy via Docs" Follow us @doctools8 | email: task.theme@gmail.com| WordPress: https://doctoolss.wordpress.com/

Rate this Article
Leave a Comment
Author Thumbnail
I Agree:
Comment 
Pictures
Author: Doc Toolss

Doc Toolss

Member since: Apr 19, 2020
Published articles: 3

Related Articles