You are on page 1of 10

TYPES

OF
CYBER
ATTACKS
01 MALWARE ATTACKS
Malware, short for malicious software, is any software
designed to harm or exploit computer systems, often
without the user's knowledge or consent.

PREVENTION
IMPACT Keep software and antivirus
programs up to date.
Avoid downloading files from
Data breaches, financial suspicious sources.
loss, and system
Educate users about the
disruptions.
dangers of clicking
attachments.
02 SOCIAL ENGINEERING
ATTACKS
Social engineering is the tactic of manipulating,
influencing, or deceiving a victim in order to gain control
over a computer system, or to steal personal and
financial information.

PREVENTION
IMPACT
Keep software and
firmware regularly updated,
Identity theft,
particularly security
reputational damage, data
patches.
theft, service disruption
and unauthorized access.
03 PASSWORD ATTACKS
A password attack is an unauthorized attempt to gain
access to a computer system, network, or account by
trying various passwords until the correct one is found,
often through automated or manual methods.

PREVENTION
IMPACT
Enable multi-factor
Malware can lead to data authentication and using
breaches, unauthorised strong, unique passwords
data and compromised for your accounts.
sensitive data.
04 PHYSICAL ATTACKS

In a physical attack, an attacker gains physical access to


a physical asset in the infrastructure system in order to
damage, disable, steal or use it in an undesirable way.

IMPACT PREVENTION

Implement CCTV,
Physical assets are control physical
harmed, damaged, stolen access, and implement
and disabled. secure configurations.
05 ON-PATH ATTACKS

A "on-path" attack refers to a type of network attack


where an adversary intercepts, monitors, or manipulates
data as it travels between two parties in a
communication.

IMPACT PREVENTION
Avoiding submitting any
sensitive information on
Leaked login credentials, any public WiFi network
data manipulation, online unless they are protected
interactions. by a secure Virtual
Private Network (VPN).
06 NETWORK ATTACKS

A network attack is an attempt to gain unauthorized


access to an organization’s network, with the objective
of altering, destroying and stealing data or perform
other malicious activity.

PREVENTION
IMPACT
Install antivirus
Adversely impact your software,Create strong
organization's operations passwords, Use firewalls,
and lead to productivity, Enforce security policies.
financial, and data loss.
07 APPLICATION
ATTACKS
Application attacks are malicious activities that target
software, applications, or programming code to exploit
vulnerabilities and gain unauthorized access or disrupt
system functionality.

PREVENTION
IMPACT

Encrypt data, use


Disrupting operations, to
critical data theft and parameterized queries,
ransom, to brand practice secure coding
degradation.
08 CRYPTOGRAPHIC
ATTACKS
A cryptographic attack is a method for circumventing
the security of a cryptographic system by finding a
weakness in a code, cipher, cryptographic protocol or
key management scheme.

IMPACT PREVENTION

Use strong encryption,


Data breaches, damaged regularly update and patch
reputation, financial your systems, train your
losses. staff.
FOLLOW US FOR MORE FREE
CHECKLISTS | PLAYBOOKS
TEMPLATES | VIDEOS

PLAYBOOK MADE WITH

You might also like