This type of attack involves
identifying the target (such as
stealing data) and gathering
sensitive information about it using
tools like:
Internet Searches: Finding general
information about the target using Intent information &quieries
search engines.
Social Engineering: Manipulating
people to obtain sensitive the Ping of Death attack is a type
information. of Denial of Service attack that
Scanning Tools: Such as network targets systems by sending
scanners to discover available oversized ICMP packets, potentially
devices and services. causing them to crash or become
Ping of death
unresponsive. Organizations should
a ping sweep is a valuable take proactive measures, such as
reconnaissance tool that helps system updates, firewalls, and
gather information about a network monitoring, to protect
network's active hosts, assisting Ping sweep against this type of attack
both attackers in planning their
moves and administrators in a Smurf attack is a DDoS attack
managing their networks effectively. that utilizes ICMP to flood a target
Reconnaissance with traffic by exploiting broadcast
Packet sniffers are tools used to Dos Smurf attack
addresses and amplification
capture and analyze network traffic. techniques. Organizations can
Common tools include Wireshark for protect themselves by disabling IP
real-time analysis, Tcpdump for spoofing, blocking ICMP traffic, and
command-line packet capture, and Packet sniffer properly configuring network devices
Snort for intrusion detection. They
help gather sensitive information A TCP SYN Flood attack is when an
during reconnaissance and assist in attacker sends lots of fake requests
network diagnostics to a server, overwhelming it and
preventing real users from
Tcp syn flood
buffer access attacks exploit connecting. Understanding this
vulnerabilities related to memory attack is essential for protecting
buffers, allowing attackers to servers and ensuring they remain
overwrite memory, execute arbitrary accessible
code, and potentially gain control of
Port scan
the affected system. Organizations
should implement robust security
practices, including input validation
and memory protection, to defend A computer virus is a type of
4 types of
against such attacks malicious software that replicates
itself and spreads from one
computer to another, causing harm
Virus
attack
to files, systems, and networks. To
protect against these threats, users
should install reliable antivirus
password attacks are a critical
software, keep all software updated
concern in cybersecurity, involving
various methods like brute force,
A computer worm is a type of
dictionary attacks, phishing,
malicious software that self-
credential stuffing, and keylogging Password replicates and spreads independently
to compromise user accounts.
across networks without the need
Organizations should prioritize
for a host file or user intervention.
strong password practices and
Unlike viruses, worms do not attach
awareness to mitigate these risks.
themselves to existing programs;
instead, they exploit vulnerabilities
trust exploitation attacks leverage
in operating systems or applications
the inherent trust within networks Worm
to propagate
and systems to gain unauthorized
access, including methods like Man- To protect against worms, users
in-the-Middle attacks, session Trust should keep their operating systems
hijacking, and social engineering. and software updated to patch
Organizations must prioritize Malisious vulnerabilities, use firewalls to block
security awareness and practices to unauthorized access, and employ
protect against these vulnerabilities reliable antivirus software that can
detect and remove worms
port access attacks exploit Access attack
vulnerabilities associated with open A Trojan, or Trojan horse, is a type of
ports on devices to gain malicious software that disguises itself as a
legitimate application to trick users into
unauthorized access to services and installing it. Trojans do not self-replicate;
data. Techniques such as port Trojan instead, they rely on user interaction to be
Port executed. Once installed, Trojans can create
scanning, service exploitation, and
backdoors for attackers, steal sensitive
brute force attacks are commonly information, or facilitate further malware
used. Organizations should prioritize infections.
network security to defend against
Malware attacks are any type of
these threats
malicious software designed to cause
buffer access attacks exploit harm or damage to a computer,
vulnerabilities related to memory server, client or computer network
buffers, allowing attackers to and/or infrastructure without end-
overwrite memory, execute arbitrary user knowledge.
code, and potentially gain control of Malware
Buffer Cyber attackers create, use and sell
the affected system. Organizations
malware for many different reasons,
should implement robust security
but it is most frequently used to
practices, including input validation
steal personal, financial or business
and memory protection, to defend
information.It includes various types
against such attacks
Spyware,Ransomware,Adware,Trojan,w
orm,virus