2. What is Cyber Attack
• Hacker to damage or destroy a computer
network or system.
• A cyber attack is an exploitation of computer
system and networks.
•It uses malicious code to alter computer code,
logic or data lead to cybercrimes, such as
information and identity theft.
3. Types of Cyber Attacks
1. Malware
2. DoS and DDoS Attack
3. Password attack
4. Man in the middle Attack
5. Phishing Attack
4. DoS and DDos Attack
DoS (Denial of Service)
Denial of Service Attack = DoS Attack is a malicious
attempts by a single person or a group of people to
cause the victim.
•DoS = When a single host attacks
•DDos = When multiple hosts attacks simultaneously
5. Phishing Attack
Phishing is a type of social
engineering attack often used
to steal user data, including
login credentials and credit
card numbers
6. PASSWORD ATTACK
Password attack is a common
attack vector used to bypass or
exploit authentication of user
accounts. As one of the most
common application security
threats, password attacks
accounted for more than
in 2020
7. Malware Attack
A malware attack is a common cyber attack
where malware (normally malicious
software) executes unauthorized actions on
the victim's system
1. Trojans
2. Spyware
3. Ransomware
4. Viruses
5. Fileless Malware
8. Man in the middle Attack
A man in the middle (MITM) attack is a general term
for when a perpetrator positions himself in a
conversation between a user and an application—
either to eavesdrop or to impersonate one of the
parties, making it appear as if a normal exchange of
information is underway
9.
10. Advantages of Cyber Attacks
1. Protects Personal Data. ...
2. Protects Business Reputation. ...
3. Enhances Productivity. ...
4. Assists Remote Working. ...
5. Regulation Compliance. ...
6. Improves Cyber Posture. ...
7. Better Data Management. ...
8. Helps Educate the Workforce
11. Disadvantages of Cyber Attacks
1. theft of corporate information.
2. theft of financial information (egg. bank details or
payment card details)
3. theft of money.
4. disruption to trading (egg. inability to carry out
transactions online)
5. loss of business or contract.