logo

Types of network security threats: Malware, DoS attacks, etc.

🦠 1️⃣ Malware (Malicious Software)

Malware refers to any software intentionally designed to cause damage to a network, system, or device.

  • Types of Malware:
    • Viruses: Attach to files and spread when executed.
    • Worms: Self-replicate and spread without user interaction.
    • Trojans: Disguise as legitimate software to trick users.
    • Spyware: Secretly monitors user activity and steals information.
    • Ransomware: Encrypts data and demands payment for decryption.
    • Adware: Displays unwanted ads, sometimes with hidden malware.
  • How It Spreads:
    • Infected email attachments, downloads, malicious websites, USB drives.
  • Prevention:
    • Use antivirus software, keep systems updated, avoid clicking suspicious links.

🌊 2️⃣ Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks

These attacks flood a network or server with excessive traffic, making services unavailable to legitimate users.

  • Types of DoS/DDoS Attacks:
    • Volumetric Attacks: Overwhelm bandwidth (e.g., UDP floods).
    • Protocol Attacks: Exploit weaknesses in network protocols (e.g., SYN floods).
    • Application Layer Attacks: Target web apps (e.g., HTTP floods).
  • Prevention:
    • Use firewalls, rate limiting, and DDoS protection services like Cloudflare or AWS Shield.

🕵️ 3️⃣ Man-in-the-Middle (MitM) Attacks

Attackers secretly intercept and potentially alter communications between two parties.

  • Common MitM Techniques:
    • Session Hijacking: Stealing session tokens to gain unauthorized access.
    • Eavesdropping: Listening to unencrypted data transmission.
    • SSL Stripping: Downgrading secure HTTPS connections to HTTP.
  • Prevention:
    • Use end-to-end encryption (SSL/TLS), secure Wi-Fi, and VPNs.

💉 4️⃣ SQL Injection (SQLi)

Attackers insert malicious SQL queries into input fields to manipulate databases.

  • Impact:
    • Unauthorized data access, data modification, or deletion.
  • Example:sql' OR '1'='1';
  • Prevention:
    • Use prepared statements, parameterized queries, and input validation.

🕳️ 5️⃣ Zero-Day Exploits

Attacks that target vulnerabilities in software before developers release a fix.

  • Why Dangerous:
    • No known defense exists at the time of the attack.
  • Prevention:
    • Apply security patches promptly, monitor for unusual activity, and use threat intelligence tools.

📧 6️⃣ Phishing & Social Engineering

Tricks users into revealing sensitive information by pretending to be a trustworthy entity.

  • Types of Phishing:
    • Email Phishing: Fake emails with malicious links or attachments.
    • Spear Phishing: Targeted attacks aimed at specific individuals.
    • Whaling: Targets high-level executives.
    • Smishing/Vishing: Phishing via SMS (smishing) or voice calls (vishing).
  • Prevention:
    • Educate users, verify suspicious requests, and implement email filters.

logo

বিসিএস, ব্যাংক, শিক্ষক নিয়োগ, পিএসসি ও অন্যান্য চাকরির পরীক্ষার জন্য একটি সহায়ক প্লাটফর্ম।

Contact Us

Email: contact@openexamschool.com


© 2025 Open Exam School. All rights reserved. Developed By Nuton.