Blog

Types of threats in cybersecurity

Types of threats in cybersecurity

In the last article, we learned about cybersecurity, its goals and methods of protecting against cyber threats. In this article, let's look at the types of threats that we may face.

 • Malware

This is software that, when downloaded by the recipient, harms the device, data, or wants to disable it. Such programs are often distributed as files via email and then downloaded by the recipient. Let's look at the most common types of such programs.

1. Viruses penetrate devices and systems and then infect them by copying their own code. By copying their own code, they spread, wasting system resources, thereby violating its integrity. Violation of the integrity of the system leads to errors such as deleting files, blocking users, etc.

2. Trojans penetrate devices under the guise of legitimate software. Then, through deception, the program is downloaded and the data is stolen.

3. Spyware - with the help of such programs, attackers monitor data for a certain time, for example, transactions on a bank card, etc., and then use the received information for their own purposes.

4. Ransomware. Attackers encrypt your data and then promise to decrypt it in exchange for money.

5. Adware is malicious software that is distributed in the form of advertisements.

• Phishing is an attack that can be used to obtain confidential information. This type of threat is usually distributed in the form of links from stores about promotions, etc. Let's say the recipient follows the link, logs into his online store account, orders a product and enters his bank information. Thus, the attackers have the bank card data.

• SQL injection is a type of threat where malicious code spreads and steals information from a database.

• “Man in the middle” (MITM-man-in-the-middle) - in this type of attack, data is intercepted during its transmission. Let's say information is transmitted from one person to another, and when it is already sent, attackers intercept it and change it. Such attacks often occur when there is a connection to an unsecured WI-FI network.

• DoS-DDoS attacks or “Denial of Service” - such attacks appear in the form of increased load on the network or system, as a result of which it stops working. For example, attackers register on the site in large numbers and thereby load the network and the system stops working. Such an attack can disable the site, application and the system itself as a whole.

To summarize, by taking proper precautions online and being aware, you can prevent dangerous incidents online and reduce the risk of cyber threats.

Author detail

Gülər Rəhimli

Recent posts

Be the first to know about innovations and opportunities