Types of cyber attacks
Malware: What is it?
Malware including spyware, ransomware, viruses and worms. A network is compromised when a user clicks on a link or attachment in an email that installs dangerous software.
Interceptor attack: What is it?
Also known as a middle host attack. This occurs when a hacker interferes in a transaction between two parties. For example, a hacker can intercept communications between a visiting device and an unsecured Wi-Fi network. All information is thus transmitted to the hacker, without the knowledge of the parties.
Phishing: What is it?
A tactic of sending fraudulent communications that appear to come from a trusted source, usually via email, and that aim to obtain sensitive data or install malware on the victim's computer.
Denial of service attack: what is it?
This type of attack overwhelms systems, servers, or networks in a way that depletes an organization's resources and bandwidth, causing the organization to no longer respond to genuine demands.