Professional Documents
Culture Documents
Types of Attacks
Types of Attacks
OF
CYBER
ATTACKS
01 MALWARE ATTACKS
Malware, short for malicious software, is any software
designed to harm or exploit computer systems, often
without the user's knowledge or consent.
PREVENTION
IMPACT Keep software and antivirus
programs up to date.
Avoid downloading files from
Data breaches, financial suspicious sources.
loss, and system
Educate users about the
disruptions.
dangers of clicking
attachments.
02 SOCIAL ENGINEERING
ATTACKS
Social engineering is the tactic of manipulating,
influencing, or deceiving a victim in order to gain control
over a computer system, or to steal personal and
financial information.
PREVENTION
IMPACT
Keep software and
firmware regularly updated,
Identity theft,
particularly security
reputational damage, data
patches.
theft, service disruption
and unauthorized access.
03 PASSWORD ATTACKS
A password attack is an unauthorized attempt to gain
access to a computer system, network, or account by
trying various passwords until the correct one is found,
often through automated or manual methods.
PREVENTION
IMPACT
Enable multi-factor
Malware can lead to data authentication and using
breaches, unauthorised strong, unique passwords
data and compromised for your accounts.
sensitive data.
04 PHYSICAL ATTACKS
IMPACT PREVENTION
Implement CCTV,
Physical assets are control physical
harmed, damaged, stolen access, and implement
and disabled. secure configurations.
05 ON-PATH ATTACKS
IMPACT PREVENTION
Avoiding submitting any
sensitive information on
Leaked login credentials, any public WiFi network
data manipulation, online unless they are protected
interactions. by a secure Virtual
Private Network (VPN).
06 NETWORK ATTACKS
PREVENTION
IMPACT
Install antivirus
Adversely impact your software,Create strong
organization's operations passwords, Use firewalls,
and lead to productivity, Enforce security policies.
financial, and data loss.
07 APPLICATION
ATTACKS
Application attacks are malicious activities that target
software, applications, or programming code to exploit
vulnerabilities and gain unauthorized access or disrupt
system functionality.
PREVENTION
IMPACT
IMPACT PREVENTION