Cybersecurity — Understanding the Fundamentals IV (Attack Types)

I. Advanced Persistent Threat (APT) Attacks

Image by Pete Linforth from Pixabay
  • Advanced; Operatives behind APT have a full range of insight gathering strategies available to them.
  • Persistent; Operative’s main aim is to maintain long-term access to the targets to execute a specific task.
  • Threat; APTs are so advanced and sophisticated. They are huge threats to intellectual property (e.g. trade secrets or patents), sensitive information (e.g. military secrets), critical infrastructures (e.g. SCADA systems, nuclear plants) and total site takeovers which makes them one of the most concerned cyber threats nowadays.
APT Lifecycle

II. Denial-of-service (DoS) and Distributed-denial-of-service (DDoS) Attacks

Image by OpenClipart-Vectors from Pixabay
DDoS Stacheldraht Attack Diagram

III. Man-in-the-middle (MitM) Attack

MitM Attack Types

IV. Phishing and Spear-phishing Attacks

Image by Andrew Martin from Pixabay

V. SQL Injection (SQLI) Attacks

Image by Dimitri Houtteman from Pixabay
statement = "SELECT * FROM users WHERE name = '" + userName + "';"
' OR '1'='1' --
' OR '1'='1' {
' OR '1'='1' /*

VI. Cross-site Scripting (XSS) Attack

Image by Gerd Altmann from Pixabay
<SCRIPT type="text/javascript">
var adr = '../evil.php?cakemonster=' + escape(document.cookie);
</SCRIPT>

VII. Brute-force and Dictionary Attacks

A Screenshot of Dictionary Attack

VIII. Drive-by Download Attack

Image by Gerd Altmann from Pixabay
  1. A person has authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet) automatically.
  2. Any download that happens without a person’s knowledge, often a computer virus, spyware, malware.

--

--

--

Cybersecurity | Artificial Intelligence | Blockchain

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Breach Notification Laws Impose High Penalties

3 Benefits of an Incident Response Plan

Inside The SolarWinds Hack

Top 5 Cyber Security Tips for Small Business in 2018

UUID vs Crypto.randomUUID vs NanoID

The Security of Zard

What is a Ransomware — and how to protect yourself

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ensar Seker

Ensar Seker

Cybersecurity | Artificial Intelligence | Blockchain

More from Medium

Vulnhub : Escalate My Privileges 1

PicoCTF 2022 — Binary Exploitation: ropfu

How to Back up Cisco Switch Router Automatically to FTP Server — ICT Fella

Creating a Menu item in Kali Linux