3. MALICIOUS ATTACK
• Malicious attack is also known as malware
attack.
• Malware attacks are any type of malicious
software designed to cause harm or
damage to a computer or damage to a
computer, server, or computer network.
• Malicious attack encompass a wide range
of harmful activities carried with ill intent.
4. TYPES OF MALICIOUS ATTACK
There are different types of malicious attack such as:-
• Malware
• Phishing
• Cyberstalking
• Insider threats
• Social engineering
5. MALWARE
• Malware is any software intentionally
designed to cause disruption to a computer,
server, leak information.
• Malware poses serious problems to
individuals and businesses on the internet.
• Researchers tend to classify malware into
one or more subtypes such as viruses,
worms, Trojan horses, ransomware,
adware, rootkit, etc.
6. PHISHING
• Phishing is the from of social engineering and scam where attackers
deceive people into revealing sensitive information or installing malware
such as ransomware.
• The term phishing was first recorded in 1995 in the cracking toolkit
AOHell, but may have been used earlier in the hacker magazine 2600.
• It is a variation of fishing and refers to the use of lures to “fish” for
sensitive information.
• There are different types of phishing attack including Email phishing,
Spear phishing, Pharming, Vishing, Smishing.
7.
8. CYBER STALKING
• Cyber stalking is the use of internet or other
electronic means to stalk or harass an individual,
group, or organization.
• It may include false accusations,defamation, slander,
libel, monitoring, threats, vandalism, doxing.
• Cyber stalking is often accompanied by realtime or
offline stalking.
• Cyber stalking mainly occurs in Email, Chatrooms,
Internet sites, New groups.
9. INSIDER THREATS
• A insider attack refers to a cyber
security risk that originates from
within an organisation.
• It is a malicious action such as
employees stealing data,
compromising security or leaking
information.
10. SOCIAL ENGINEERING
• Manipulating people into revealing
confidential information or performing
actions they shouldn’t often through
psychological tactics.
• Social engineering involves email or other
communication that invokes urgency, fear,
or similar emotion in the victim, leading the
victim to reveal sensitive information.