SlideShare a Scribd company logo
TYPES OF CYBER- ATTACKS
Zero-Day Attacks
 Usually target that software that have yet to be discovered and patched.
Cloud-Data Leakage
■ Data leakage takes place when an employee upload any sensitive information of
the organization on the cloud services such as Dropbox and much more.
Mobile Malware
■ Mainly target operating system on mobile devices, allowing cyber-crooks to steal
your valuable data on the device.
SQL Injection
■ Allows cyber-hackers to execute malicious code on a server in order to steal or delete
valuable data stored on that server.
■ Note:- Run the best virus protection on your digital gadgets to keep malicious
threats and other vulnerabilities at bay.
Thank You!

More Related Content

What's hot

Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
phanleson
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
newbie2019
 
Dos attack
Dos attackDos attack
Dos attack
Manjushree Mashal
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
Emmanuel Gbenga Dada (BSc, MSc, PhD)
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
S.M. Towhidul Islam
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
vasanthimuniasamy
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
Raj vardhan
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
Arun Velayudhan
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
wajug
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
eiramespi07
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
kanika sharma
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
Education
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
A. Shamel
 
Web security
Web securityWeb security
Web security
Iqbal Shaikh
 
Computer Security
Computer SecurityComputer Security
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
Insiya Tarwala
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
Sugirtha Jasmine M
 

What's hot (20)

Cyber attack
Cyber attackCyber attack
Cyber attack
 
Ch03 Network and Computer Attacks
Ch03 Network and Computer AttacksCh03 Network and Computer Attacks
Ch03 Network and Computer Attacks
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Dos attack
Dos attackDos attack
Dos attack
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
Network security chapter 1,2
Network security chapter  1,2Network security chapter  1,2
Network security chapter 1,2
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
Web security
Web securityWeb security
Web security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 
Protection from hacking attacks
Protection from hacking attacksProtection from hacking attacks
Protection from hacking attacks
 

More from techexpert2345

Internet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware AboutInternet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware About
techexpert2345
 
How to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber HackersHow to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber Hackers
techexpert2345
 
How to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on FacebookHow to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on Facebook
techexpert2345
 
Email Security Tips
Email Security TipsEmail Security Tips
Email Security Tips
techexpert2345
 
Common Sources of Computer Virus Infection
Common Sources of Computer Virus InfectionCommon Sources of Computer Virus Infection
Common Sources of Computer Virus Infection
techexpert2345
 
Warning Signs of Malware Infection
Warning Signs of Malware InfectionWarning Signs of Malware Infection
Warning Signs of Malware Infection
techexpert2345
 
Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018
techexpert2345
 
Cyber Security Tricks One Should Know
Cyber Security Tricks One Should KnowCyber Security Tricks One Should Know
Cyber Security Tricks One Should Know
techexpert2345
 
5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media
techexpert2345
 
Tips for using a Public Wi-Fi
Tips for using a Public Wi-FiTips for using a Public Wi-Fi
Tips for using a Public Wi-Fi
techexpert2345
 
Signs your PC has a Virus
Signs your PC has a VirusSigns your PC has a Virus
Signs your PC has a Virus
techexpert2345
 
Ways to Speed up Your Draggy Android
Ways to Speed up Your Draggy AndroidWays to Speed up Your Draggy Android
Ways to Speed up Your Draggy Android
techexpert2345
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accounts
techexpert2345
 
Common sources of computer virus infection
Common sources of computer virus infectionCommon sources of computer virus infection
Common sources of computer virus infection
techexpert2345
 
Do’s and Don’ts of Cybersecurity
Do’s and Don’ts of CybersecurityDo’s and Don’ts of Cybersecurity
Do’s and Don’ts of Cybersecurity
techexpert2345
 
Malvertising
MalvertisingMalvertising
Malvertising
techexpert2345
 
Internet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware aboutInternet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware about
techexpert2345
 
Tips to make your computer happy
Tips to make your computer happyTips to make your computer happy
Tips to make your computer happy
techexpert2345
 
REVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV DashboardREVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV Dashboard
techexpert2345
 
REVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLINGREVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLING
techexpert2345
 

More from techexpert2345 (20)

Internet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware AboutInternet Etiquette Every Internet User Should Be aware About
Internet Etiquette Every Internet User Should Be aware About
 
How to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber HackersHow to Protect your Wi-Fi from Cyber Hackers
How to Protect your Wi-Fi from Cyber Hackers
 
How to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on FacebookHow to Stand against Cyberbullying on Facebook
How to Stand against Cyberbullying on Facebook
 
Email Security Tips
Email Security TipsEmail Security Tips
Email Security Tips
 
Common Sources of Computer Virus Infection
Common Sources of Computer Virus InfectionCommon Sources of Computer Virus Infection
Common Sources of Computer Virus Infection
 
Warning Signs of Malware Infection
Warning Signs of Malware InfectionWarning Signs of Malware Infection
Warning Signs of Malware Infection
 
Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018Rules and Regulations for a Fresh Start of 2018
Rules and Regulations for a Fresh Start of 2018
 
Cyber Security Tricks One Should Know
Cyber Security Tricks One Should KnowCyber Security Tricks One Should Know
Cyber Security Tricks One Should Know
 
5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media5 Easy Steps to Protect your Social Media
5 Easy Steps to Protect your Social Media
 
Tips for using a Public Wi-Fi
Tips for using a Public Wi-FiTips for using a Public Wi-Fi
Tips for using a Public Wi-Fi
 
Signs your PC has a Virus
Signs your PC has a VirusSigns your PC has a Virus
Signs your PC has a Virus
 
Ways to Speed up Your Draggy Android
Ways to Speed up Your Draggy AndroidWays to Speed up Your Draggy Android
Ways to Speed up Your Draggy Android
 
Steps to Protect your Social Media Accounts
Steps to Protect your Social Media AccountsSteps to Protect your Social Media Accounts
Steps to Protect your Social Media Accounts
 
Common sources of computer virus infection
Common sources of computer virus infectionCommon sources of computer virus infection
Common sources of computer virus infection
 
Do’s and Don’ts of Cybersecurity
Do’s and Don’ts of CybersecurityDo’s and Don’ts of Cybersecurity
Do’s and Don’ts of Cybersecurity
 
Malvertising
MalvertisingMalvertising
Malvertising
 
Internet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware aboutInternet etiquette- Every Internet user should be aware about
Internet etiquette- Every Internet user should be aware about
 
Tips to make your computer happy
Tips to make your computer happyTips to make your computer happy
Tips to make your computer happy
 
REVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV DashboardREVE ANTIVIRUS Introducing REVE AV Dashboard
REVE ANTIVIRUS Introducing REVE AV Dashboard
 
REVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLINGREVE ANTIVIRUS PARTNER & START SELLING
REVE ANTIVIRUS PARTNER & START SELLING
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 

Types of Cyber-Attacks