A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Types of Cyber Attacks

Brute-Force ​Attack​
Brute-Force ​Attack​

One example of a type of brute force attack is known as a dictionary attack, which might try all the words in a dictionary. Other forms of brute force attack might try commonly-used passwords or combinations of letters and numbers.

Cross-Site ​Scripting​
Cross-Site ​Scripting​

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts (also commonly referred to as a malicious payload) into a legitimate website or web application.

source: acunetix.com
Denial-of-​Service Attack​
Denial-of-​Service Attack​

In computing, a denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.

Dictionary ​Attack​
Dictionary ​Attack​

Cyberattack definition, an attempt to damage, disrupt, or gain unauthorized access to a computer, computer system, or electronic communications network. See more.

Malware​
Malware​

What is a cyber attack? Simply put, a cyber attack is an attack launched from one computer or more computers against another computer, multiple computers or networks.

source: csoonline.com
Man-in-the-​Middle Attack​
Man-in-the-​Middle Attack​

If Bob sends his public key to Alice, but Mallory is able to intercept it, a man-in-the-middle attack can begin. Mallory sends a forged message to Alice that purports to come from Bob, but instead includes Mallory's public key.

Phishing​
Phishing​

Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack.

source: csoonline.com
SQL Injection​
SQL Injection​

SQL Injection Attack: What is it, and how to prevent it. The way that Yahoo! was hacked, SQL Injection attack, is the same method as many other hacks in the news recently: SQL Injection.

source: zdnet.com
image: secludit.com