Adarsh Vidya Kendra
Types Of CYBER
SECURITY Threats
©SHABIN
Types Of CYBER SECURITY
Malware
Phishing
Man-in-the-middle
Denial-of-service attacks
SQL Injection attack
Cross-Site Scripting
Ransomware
Password Attack
Trojan Horses
Drive-By Download Attack
Malware 1
•Malware is considered as software that deliberately developed to disrupt
computers, servers, and other computer networks
Blocks access to key components
Install harmful software
Steal valuable information from your system
Can damage certain hardware components
Phishing 2
•Phishing is a form of social engineering commonly used to steal user
data such as credit card numbers and credentials for logging in
Take fraudulent action to cheat users
Steal restricted and private information
Man-In-The-Middle 3
• In Man-in-the-middle (MitM), the invader can modify the chats and
dialogues between two individuals who communicate with each other
Interference from the third party.
Modify chats
Denial-Of-Service Attacks 4
•In Denial-of-service attacks, the offender to attempt to make digital assets
unavailable to its expected users in
•a denial-of-service attack.
Make digital assets inaccessible
Using different IP addresses
SQL Injection Attack 5
•In the SQL Injection attack, the intruder can access the data and can
easily add, modify, and delete the data from the database.
Personal data
Intellectual property
Customer information
Trade secrets, and more.
Cross-Site Scripting 6
•In Cross-Site Scripting, the intruders sent malicious code to different
users by embedding them into a trusted site, usually as a browser-side
script.
Browser-side script
Access to personal data
Ransomeware 7
•Ransomware is a kind of malware attack that restricts access to your
devices or files and displays a pop-up message that demands payment
for the restriction to be removed.
Restricts access to devices
Contains malicious attachments.
Password Attack 8
• Passwords are the main gateways to enter into your personal accounts
securely. The passwords are usually connected to our life’s incidents,
people, and places that can easily sniff and gain access to our
unencrypted passwords.
Unencrypted passwords.
Enter personal accounts
Trojen Horses 9
•Trojans are considered among the most dangerous types of all malware,
as they are often designed to steal financial information
Influence a victim to install it
They are specially designed to steal financial information
Drive By Download Attack 10
•Drive-by –download attack is a commonly used method to spread
malicious scripts or codes on users’ systems. These scripts will be
automatically installed in the system or might redirect to a website that is
controlled by the attacker.
Automatically installed
Spread malicious scripts