Common Network Attacks Explained.
1.
Overwhelming a Network (DoS/DDoS):
Imagine a restaurant that's flooded with too many customers.
In a DoS/DDoS attack: A website is overwhelmed with too much
traffic.
2.
Eavesdropping on Conversations (MitM):
Imagine someone listening in on your phone call.
In a MitM attack: An attacker listens to your online
conversations.
3. Tricking
You (Phishing):
Imagine receiving a fake email from your bank.
In phishing: Attackers try to trick you into giving them your
personal information.
4. Finding
a Weakness in a Website (SQL Injection):
Imagine finding a hole in a fence.
In an SQL injection attack: An attacker finds a weakness in a
website to steal or change data.
5. Planting
a Hidden Camera (XSS):
Imagine someone hiding a camera in a party.
In an XSS attack: An attacker hides harmful code on a website
to spy on you.
6. Guessing
Your Password (Password Attck):
Imagine trying to guess a friend's password.
In a password attack: An attacker tries to guess your
password.
7. Finding
a Secret Flaw (Zero-Day Exploit):
Imagine finding a secret door in a new building.
In a zero-day exploit: An attacker finds a new weakness in
software.
8.
Attacking a Supplier (Supply Chain Attack):
Imagine stealing plans from a factory that makes your
favorite product.
In a supply chain attack: An attacker attacks a company's
supplier to steal information.
9. Tricking
You (Social Engineering):
Imagine someone pretending to be a bank employee to get your
money.
In a social engineering attack: An attacker tricks you into
doing something harmful.
Comments
Post a Comment