
-
Active Attacks attempts to change system resources or affect their operation.
-
Passive Attacks attempts to learn or make use of information from the system but does not affect system resource.
-
Inside Attacks is an attack initiated by an entity that is authorized to access system resources but used them in the wrong way.
-
Outside Attack is an attack initiated outside the perimeter, by the illegitimate user of the system. Outside hackers range from amateur pranksters to organized criminals, hostile governments, International criminals.
-
Malware (malicious software) downloaded to a targeted computer that can do anything from steal data to encrypt files and demand ransoms.
-
Phishing emails that are crafted to fool victims emails into giving up passwords or taking some other harmful action.
-
Denial of Service Attacks, which overwhelm a web server with bogus traffic.
-
Man in the middle attacks which fool the target computer into joining a comprised network.
-
WannaCry
-
NotPetya
-
Ethereum
-
Equinox
-
Yahoo( All 3 Billion yahoo email addresses affected)
-
GitHub(Massive denial of service attack) and many more.
-
The Government and the organisations can work together to fight cyber attacks.
-
Point-of-sale terminals are a vector for malware and data theft. Point-of-sale terminals include marketing/Sales cooperatives, retailers, hotels, restaurants which are victimized through the same heel that Cybercriminals continue to attack: Point-of-Sale system where Customer payment details, Sales Employee Travel claim details are routinely processed.