Students Try to teach about Cyber Threats/Attacks on Teacher's Day | Practical | | CSPunjab.Com

CSPunjab

Type : Computer Science-Mix

Language(s) : Punjabi

Title : Cyber Cyber Threats/Attacks
Students : Jasmeen Kaur & Amandeep Kaur
Class : 11th, 2024-25
Subject: Computer Science
Teacher's Day 05-Sep-2024
----------------------------------------
CSPunjab » » https://cspunjab.com/mix/5ND271MdRXQ

YouTube » » https://youtu.be/5ND271MdRXQ

Facebook » » https://fb.watch/uphOWeGvkp/

Instagram » » https://www.instagram.com/p/C_iGY2sveJ3/
----------------------------------------
*What is a Cyber Attack?*
Before heading to the different types of cyber attacks, we will first walk you through a cyber attack. When there is an unauthorized system/network access by a third party, we term it as a cyber attack. The person who carries out a cyberattack is termed as a hacker/attacker. 

Cyber-attacks have several negative effects. When an attack is carried out, it can lead to data breaches, resulting in data loss or data manipulation. Organizations incur financial losses, customer trust gets hampered, and there is reputational damage. To put a curb on cyberattacks, we implement cybersecurity. Cybersecurity is the method of safeguarding networks, computer systems, and their components from unauthorized digital access.

The COVID-19 situation has also had an adverse impact on cybersecurity. According to Interpol and WHO, there has been a notable increase in the number of cyberattacks during the COVID-19 pandemic. 

Now that you know what a cyber attack is, let look at the different types of cyberattacks.

*Types of Cyber Attacks*
1. Malware Attack
2. Phishing Attack
3. Password Attack
4. Man-in-the-Middle Attack
5. SQL Injection Attack 
6. Denial-of-Service Attack
7. Insider Threat
8. Cryptojacking
9. Zero-Day Exploit
10. Watering Hole Attack
11. Spoofing
12. Identity-Based Attacks
13. Code Injection Attacks
14. Supply Chain Attacks
15. DNS Tunneling
16. DNS Spoofing
17. IoT-Based Attacks
18. Ransomware
19. Distributed Denial of Service (DDos) Attacks
20. Spamming
21. Corporate Account Takeover (CATO)
22. Automated Teller Machine (ATM) Cash Out
23. Whale-Phishing Attacks
24. Spear-Phishing Attacks:
25. URL Interpretation
26. Session Hijacking
27. Brute Force Attack
28. Web Attacks
29. Trojan Horses
30. Drive-by Attacks
31. Cross-Site Scripting (XSS) Attacks 
32. Eavesdropping Attacks
33. Birthday Attack
34. Volume-Based Attacks
35. Protocol Attacks:
36. Application Layer Attacks
37. Dictionary Attacks
38. Virus
39. Worm
40. Backdoors
41. Bots
42. Business Email Compromise (BEC)
43. Cross-Site Scripting (XSS) Attacks
44. AI-Powered Attacks
45. Rootkits
46. Spyware
47. Social Engineering
48. Keylogger
49. Botnets
50. Emotet
51. Adware
52. Fileless Malware
53. Angler Phishing Attacks
54. Advanced Persistent Threat (APT)
----------------------------------------
#cspunjab #cyberattack #teacherday #students 
#computerfaculty #bintuchaudhary #python 
----------------------------------------
https://www.cspunjab.com/
https://www.youtube.com/@CSPunjab
https://www.instagram.com/cspunjab/
https://www.facebook.com/CSPunjabCom
https://twitter.com/CSPunjabCom/

Admin

Innovative tech professional with 17+ years of experience working as a Government Computer Faculty & Programmer. Capable of working with a variety of technology and software solutions and managing databases. Valuable team member who has experience diagnosing problems and developing solutions.

When there's a task that can be done manually in 10 minutes but you find a way to automate it in 10 days. I'm gonna do what's called a Programmer move.