Network Security Threats

Most Common Definitions (v.1)

Network Security Threats

Phishing Attacks

Deceptive attempts to steal sensitive information like usernames, passwords, and credit card details.

Malware

Malicious software designed to harm, exploit, or disrupt computer systems, networks, or devices.

Ransomware

A type of malware that encrypts a victim's files and demands payment for their decryption.

DDoS Attacks

Distributed Denial of Service attacks that overwhelm a network with traffic, causing a shutdown or service denial.

SQL Injection

An attack that manipulates back-end databases through malicious SQL code.

Zero-Day Exploits

Attacks targeting vulnerabilities in software before the developer has issued a fix or patch.

Insider Threats

Risks posed by individuals within an organization who may misuse access to sensitive information.

Advanced Persistent Threats (APTs)

Prolonged and targeted cyber attacks aiming to steal information or disrupt operations.

Drive-By Downloads

Unintended download of malicious code from a compromised website, leading to infection.

Password Attacks

Attempts to steal or crack user passwords using various techniques like brute force or dictionary attacks.

Cross-Site Scripting (XSS)

Injecting malicious scripts into websites viewed by other users, often to steal data or credentials.

Rogue Software

Malicious software disguised as legitimate software, often tricking users into downloading and installing it.

Eavesdropping Attacks

Unauthorized interception of private communication over digital networks.

Device Security Threats

Security risks that directly impact devices such as computers, smartphones, and tablets. These include malware infections, unauthorized access, data theft, and physical theft or damage to the devices themselves.

Man-in-the-Middle Attacks

Unauthorized interception and alteration of communication between two parties. This type of attack often occurs in unsecured Wi-Fi networks, allowing the attacker to intercept and modify data transmitted between the victim's device and the network.

Definitions provided for documentation