In Threat-Thursday we will be discussing about common but devastating threats that we are supposed to come across in the digital world.
Common threats in the world of cyber security are listed down:-
- · Botnet
- · DDoS
- · Hacking
- · Malware
- · Pharming
- · Phishing
- · Ransomware
- · Spam
- · Spoofing
- · Spyware
- · Trojan Horses
- · Virus
- · Wi-Fi Eavesdropping
- · Worms
Botnet:-
When the attacker
wants to launch a mass attack like DDoS then he/she infects few of the other
Computer by exploiting its security vulnerabilities. And in this way Computer
that comes under the infection of the attacker becomes Bots to the attacker and
the network of these bots and collectively known as Botnets.
DDoS:-
DDoS is the abbreviation
of Distributed Denial of Service attack in which the attacker uses the botnet
to launch a denial of service attack on desired target. Now, denial of service
attack means the type of attack in which the attack intentionally sends a huge
beam of useless packets to the target that eventually dismantles the services
that the target intend to provide.
Hacking:-
Hacking is the
act of intrusion to a given system by passing the conventional protocols of the
system. It is performed usually by computer geeks either to for fun or
challenging themselves.
Malware:-
Malwares are
malicious software that are coded by programmers with the intention of harming
the computer in which the malware is deployed.
Pharming:-
Pharming is the
best means of online fraud .In this the user is redirected to an illegitimate
website via a legitimate URL.
Phishing:-
Phishing is
process in the attacker creates a fake login page of a legitimate website and
sent to victim usually via e-mails .When the victim try to login in the fake
login page, then the login credentials of victim are transferred to the
attacker.
Ransomware:-
It is a type of
malware that encrypts the data in a system once it get deployed in the target
system and in returns demands ransom usually in the form of bitcoins for the
decrypting key.
Spam:-
It is a certain
way in which the information are sent to or collected from people who are
usually unrelated.
Spoofing:-
Spoofing is a
technique that is usually performed in continuation to phishing which an intend
of stealing information.
Spyware:-
Spyware are software’s
that coded with an intention of spying on the computer system or network in
which it is deployed.
Trojan
Horse:-
It is a type of
malware that usually aims at establishing a backdoor in the system that is
deployed upon which eventually helps the attacker to gain a remote access to
the system.
Viruses:-
It is a malware
that are usually deployed in a computer via mail attachments or download files
which harms the computer and other computers that are connected to it.
WiFi
Eavesdropping:-
It is method that
used by the cyber criminals for collection personal information by listening to
unsecure WiFi networks.
Worms:-
Worms are form of
malware that usually spreads through networks and slows the performance of the computers
or the networks by its self-replicating property.
Hence, the above mentioned were the commons threats in the cyber
security world.
To show
support for LogOut Gujarat’s 1st Cyber Awareness Conference Visit http://comexpocybersecurity.com/support to show your support for privacy and
security by changing your Facebook Profile picture. #logout #staysafe #stayprotected
Comments
Post a Comment