Cyber Security Attacks Types

HighSpiritedTrigonometry avatar
HighSpiritedTrigonometry
·
·
Download

Start Quiz

Study Flashcards

8 Questions

What type of cyber attack involves self-replicating code that attaches to programs or files?

Viruses

What is the term for a targeted phishing attack on a specific individual?

Spear Phishing

What type of attack involves overwhelming network traffic?

DoS

What type of password attack uses precomputed tables for hash cracking?

Rainbow Table Attack

What type of threat involves authorized personnel misusing access?

Insider Threats

What is the first stage of a cyber attack?

Reconnaissance

What is the term for exploiting previously unknown vulnerabilities?

Zero-Day Attacks

What is the final stage of a cyber attack?

Covering Tracks

Study Notes

Types of Cyber Security Attacks

  • Malware Attacks:
    • Viruses: self-replicating code that attaches to programs or files
    • Worms: self-replicating code that travels from system to system
    • Trojans: malicious code disguised as legitimate software
    • Ransomware: encryption-based attacks demanding payment
  • Network Attacks:
    • Phishing: social engineering attacks via email or messaging
    • Spear Phishing: targeted phishing attacks on specific individuals
    • Denial of Service (DoS): overwhelming network traffic
    • Distributed Denial of Service (DDoS): coordinated DoS attacks
  • Password Attacks:
    • Brute Force: automated password guessing
    • Dictionary Attack: using word lists to crack passwords
    • Rainbow Table Attack: precomputed tables for hash cracking
  • Insider Threats:
    • Authorized personnel misusing access
    • Negligent employees falling victim to social engineering
  • Advanced Persistent Threats (APTs):
    • Sophisticated, targeted attacks by nation-states or organizations
    • Often involve multiple vectors and exploits
  • Zero-Day Attacks:
    • Exploiting previously unknown vulnerabilities
    • Attackers have a "window of opportunity" before patches are released

Stages of a Cyber Attack

  1. Reconnaissance: gathering information about the target
  2. Initial Compromise: initial entry point, often via exploit or phishing
  3. Establish Foothold: establishing a persistent presence on the system
  4. Escalation of Privileges: elevating access and control
  5. Lateral Movement: moving laterally within the network
  6. Data Exfiltration: stealing sensitive data
  7. Command and Control: communicating with the attacker's server
  8. Covering Tracks: hiding evidence of the attack

Types of Cyber Security Attacks

  • Malware Attacks:
    • Viruses attach to programs or files and self-replicate
    • Worms self-replicate and travel from system to system
    • Trojans are malicious code disguised as legitimate software
    • Ransomware uses encryption to demand payment in exchange for data
  • Network Attacks:
    • Phishing uses social engineering via email or messaging to trick victims
    • Spear Phishing targets specific individuals with personalized attacks
    • Denial of Service (DoS) overwhelms network traffic to disrupt systems
    • Distributed Denial of Service (DDoS) coordinates multiple DoS attacks
  • Password Attacks:
    • Brute Force attacks use automated password guessing
    • Dictionary Attacks use word lists to crack passwords
    • Rainbow Table Attacks use precomputed tables for hash cracking
  • Insider Threats:
    • Authorized personnel can misuse access for malicious purposes
    • Negligent employees can fall victim to social engineering
  • Advanced Persistent Threats (APTs):
    • Sophisticated, targeted attacks by nation-states or organizations
    • Often involve multiple vectors and exploits to achieve a goal
  • Zero-Day Attacks:
    • Exploit previously unknown vulnerabilities
    • Attackers have a "window of opportunity" before patches are released

Stages of a Cyber Attack

Initial Attack Stages

- **Reconnaissance**: gather information about the target
- **Initial Compromise**: gain initial entry point via exploit or phishing

Establishing a Presence

- **Establish Foothold**: establish a persistent presence on the system
- **Escalation of Privileges**: elevate access and control

Moving Laterally

- **Lateral Movement**: move laterally within the network
- **Data Exfiltration**: steal sensitive data

Controlling and Covering

- **Command and Control**: communicate with the attacker's server
- **Covering Tracks**: hide evidence of the attack

Learn about different types of cyber security attacks, including malware, network attacks, and more. Understand the differences between viruses, worms, trojans, ransomware, phishing, and denial of service attacks.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Cybersecurity Fundamentals Quiz
30 questions
Cybersecurity Measures
10 questions
Use Quizgecko on...
Browser
Browser