A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Types of Computer Security

Botnets
Botnets

The short answer is that a botnet is hijacking your computer to do what botnets do -- carry out mundane tasks -- faster and better. How to Protect Yourself From Botnets. Most people who are infected with botnets aren’t even aware that their computer’s security has become compromised.

source: us.norton.com
Common Types of Cybersecurity Attacks
Common Types of Cybersecurity Attacks

It is not intended to be exhaustive, and attackers do evolve and develop new methods as needed; however, being aware of, and mitigating these types of attacks will significantly improve your security posture.

source: rapid7.com
image: gov.uk
Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS)

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application. XSS is amongst the most rampant of web application vulnerabilities and occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

source: acunetix.com
Cyber Security Strategies for Malware
Cyber Security Strategies for Malware

Cyber Security Strategies - Learn Information Security Cyber Law concepts in simple and easy steps starting from Introduction, Objectives, Intellectual Property Right, Strategies For Cyber Security, Policies To Mitigate Cyber Risk, Network Security, I.T ACT, Signatures, Offence and Penalties, Summary, FAQ.

Denial-of-Service Attacks
Denial-of-Service Attacks

A denial-of-service attack is a security event that occurs when an attacker takes action that prevents legitimate users from accessing targeted computer systems, devices or other network resources.

Distributed Denial-of-Service (DDoS)
Distributed Denial-of-Service (DDoS)

A distributed denial-of-service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource.

DoS (Denial of Service) Attacks
DoS (Denial of Service) Attacks

Denial-of-service (DoS) attacks typically flood servers, systems or networks with traffic in order to overwhelm the victim resources and make it difficult or impossible for legitimate users to use them.

Hacking
Hacking

Computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information. This article will discuss how computer hackers and predators operate and how to protect yourself.

source: webroot.com
image: pixabay.com
Malware
Malware

Malware is an abbreviated term meaning “malicious software.” This is software that is specifically designed to gain access or damage a computer without the knowledge of the owner. There are various types of malware including spyware, keyloggers, true viruses, worms, or any type of malicious code that infiltrates a computer.

source: us.norton.com
image: paubox.com
Malware Attacks
Malware Attacks

Various factors can make computers more vulnerable to malware attacks, including defects in the operating system design, having all of the computers on a network run the same OS, giving users to much permissions or just using the Windows OS (due to its popularity, it gets the most malware written for it).

source: us.norton.com
Man-in-the-Middle (MITM) Attacks
Man-in-the-Middle (MITM) Attacks

In cryptography and computer security, a man-in-the-middle attack (MITM) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

Pharming
Pharming

Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent Web sites without their knowledge or consent.

Phishing
Phishing

Phishing is popular with cybercriminals, as it is far easier to trick someone into clicking a malicious link in a seemingly legitimate phishing email than trying to break through a computer's defenses.

image: youtube.com
Phishing Attacks
Phishing Attacks

At this year’s RSA Conference, Tripwire conducted a survey where it asked 200 security professionals to weigh in on the state of phishing attacks. More than half (58 percent) of respondents stated their organizations had seen an increase in phishing attacks in the past year.

source: tripwire.com
Ransomware
Ransomware

Ransomware restricts access to data by encrypting files or locking computer screens. It then attempts to extort money from victims by asking for "ransom", usually in form of cryptocurrencies like Bitcoin, in exchange for access to data.

source: microsoft.com
image: bbj.hu
Spam
Spam

According to various estimates, about 80% of all email in the world may be spam. What is "phishing?" Phishing is the practice of defrauding users into giving up their usernames, passwords, credit card numbers and other personal information.

Spear Phishing Attacks
Spear Phishing Attacks

Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to sensitive information. Spear-phishing attempts are not typically initiated by random hackers, but are more likely to be conducted by perpetrators out for financial gain, trade secrets or military information.

SQL Injection Attacks (SQLi)
SQL Injection Attacks (SQLi)

SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application’s database server (also commonly referred to as a Relational Database Management System – RDBMS). Since an ...

source: acunetix.com
Strategies for DoS Attacks
Strategies for DoS Attacks

Denial-of-service attacks disrupt legitimate access to organizational resources, often by overwhelming a network or resource with malicious traffic. Denial-of-service attacks disrupt legitimate access to organizational resources, often by overwhelming a network or resource with malicious traffic.

Strategies for Phishing Attacks
Strategies for Phishing Attacks

Phishing attacks are one of the most common security challenges that both individuals and companies face in keeping their information secure. Whether it's getting access to passwords, credit cards, or other sensitive information, hackers are using email, social media, phone calls, and any form of communication they can to steal valuable data.