Professional Documents
Culture Documents
Programme: B. Tech. IT
Semester: 7th
Year:2023
Session: 2020-2024
Faculty: Dr. Pankaj Pal
Cyber Threat
Cyber threat is defined by the capability that one’s opponent has in
both terms of skills and software or digital tools.
However, these tools are based on an array of equipment that must
be available along with the knowledge as how to best use tools or
skills.
Thus, cyber threat equals the capability of the opponent plus the
intent to do damage, take action, or simply monitor activities.
The manner in which we pursue these cyber threats is based on our
legal system, intelligence system, military system, and a range
of additional factors.
Characteristics of Cyber Threat
3. Phishing: Phishing is a type of cyber security attack during which malicious actors send
messages pretending to be a trusted person or entity. Phishing messages manipulate a
user, causing them to perform actions like installing a malicious file, clicking a malicious
link, or divulging sensitive information such as access credentials. Phishing is the most
common type of social engineering, which is a general term describing attempts to
manipulate or trick computer users.
4. SQL injection attacks: SQL injection, also known as SQLI, is a common attack vector
that uses malicious SQL code for backend database manipulation to access
information that was not intended to be displayed. This information may include any
number of items, including sensitive company data, user lists or private customer
details.
5. XSS: Cross site scripting (XSS) is an attack in which an attacker injects malicious
executable scripts into the code of a trusted application or website. Attackers often
initiate an XSS attack by sending a malicious link to a user and enticing the user to click
it.
6. Botnets: A botnet (short for “robot network”) is a network of computers infected by
malware that are under the control of a single attacking party, known as the “bot-
herder.” Each individual machine under the control of the bot-herder is known as a
bot.
Cyber warfare
Economic
Disruption
7 Types of Cyber Sabotage
Warfare Attacks
Propaganda
Attacks
Denial-of-Service
(DoS) Attacks
Electrical
Power Grid
Espionage