0% found this document useful (0 votes)
264 views13 pages

Top 10 Cyber Security Threats

This document discusses 10 common types of cybersecurity threats: malware, phishing, man-in-the-middle attacks, denial-of-service attacks, SQL injection attacks, cross-site scripting, ransomware, password attacks, Trojan horses, and drive-by download attacks. It provides brief definitions and examples of each threat type and how they can be used to access private information, install malware, or restrict access to systems without permission.

Uploaded by

Shabin Jerin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
264 views13 pages

Top 10 Cyber Security Threats

This document discusses 10 common types of cybersecurity threats: malware, phishing, man-in-the-middle attacks, denial-of-service attacks, SQL injection attacks, cross-site scripting, ransomware, password attacks, Trojan horses, and drive-by download attacks. It provides brief definitions and examples of each threat type and how they can be used to access private information, install malware, or restrict access to systems without permission.

Uploaded by

Shabin Jerin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Adarsh Vidya Kendra

Types Of CYBER
SECURITY Threats

©SHABIN
Types Of CYBER SECURITY
 Malware
 Phishing
 Man-in-the-middle
 Denial-of-service attacks
 SQL Injection attack
 Cross-Site Scripting
 Ransomware
 Password Attack
 Trojan Horses
 Drive-By Download Attack
Malware 1
•Malware is considered as software that deliberately developed to disrupt
computers, servers, and other computer networks
Blocks access to key components
Install harmful software
Steal valuable information from your system
Can damage certain hardware components
Phishing 2
•Phishing is a form of social engineering commonly used to steal user
data such as credit card numbers and credentials for logging in
Take fraudulent action to cheat users
Steal restricted and private information
Man-In-The-Middle 3
• In Man-in-the-middle (MitM), the invader can modify the chats and
dialogues between two individuals who communicate with each other
 Interference from the third party.
 Modify chats
Denial-Of-Service Attacks 4
•In Denial-of-service attacks, the offender to attempt to make digital assets
unavailable to its expected users in
•a denial-of-service attack.
 Make digital assets inaccessible
 Using different IP addresses
SQL Injection Attack 5
•In the SQL Injection attack, the intruder can access the data and can
easily add, modify, and delete the data from the database.
Personal data
Intellectual property
Customer information
Trade secrets, and more.
Cross-Site Scripting 6
•In Cross-Site Scripting, the intruders sent malicious code to different
users by embedding them into a trusted site, usually as a browser-side
script.
Browser-side script
Access to personal data
Ransomeware 7
•Ransomware is a kind of malware attack that restricts access to your
devices or files and displays a pop-up message that demands payment
for the restriction to be removed.
Restricts access to devices
Contains malicious attachments.
Password Attack 8
• Passwords are the main gateways to enter into your personal accounts
securely. The passwords are usually connected to our life’s incidents,
people, and places that can easily sniff and gain access to our
unencrypted passwords.
 Unencrypted passwords.
 Enter personal accounts
Trojen Horses 9
•Trojans are considered among the most dangerous types of all malware,
as they are often designed to steal financial information
 Influence a victim to install it
 They are specially designed to steal financial information
Drive By Download Attack 10
•Drive-by –download attack is a commonly used method to spread
malicious scripts or codes on users’ systems. These scripts will be
automatically installed in the system or might redirect to a website that is
controlled by the attacker.
Automatically installed
Spread malicious scripts

You might also like