Unraveling Cyber Threats: A Closer Look at Different Attack Types

Tibin Tomy
3 min readJul 20, 2023

--

Cybersecurity refers to the practice of protecting computer systems, networks, and data from digital attacks, unauthorized access, and damage to prevent theft, disruption, or destruction of sensitive information. As technology advances and businesses rely more on digital infrastructure, cybersecurity has become a critical aspect of safeguarding confidential data and maintaining the integrity of digital systems.

Photo by Sora Shimazaki

let’s dive into Cyber-attacks and their categories: Web-based attacks and System-based attacks.

Web-based Attacks:

Web-based attacks target vulnerabilities in websites, web applications, and web servers. Hackers exploit weaknesses in web code, databases, or user inputs to gain unauthorized access or manipulate data. These attacks are primarily executed through web browsers and often aim to steal sensitive information or take control of the targeted system. Let’s explore some common web-based attacks:

  1. SQL Injection (SQLi):

This attack involves inserting malicious SQL code into web forms or URLs to gain unauthorized access to a website’s database. Attackers can manipulate or retrieve sensitive data stored in the database.

2. Cross-Site Scripting (XSS):

In XSS attacks, malicious scripts are injected into trusted websites, potentially affecting users who visit the site. These scripts can steal user information, hijack sessions, or redirect users to malicious websites.

3. Cross-Site Request Forgery (CSRF):

CSRF attacks force users to unknowingly perform actions on websites where they are authenticated. This allows attackers to execute unwanted actions using the victim’s credentials.

4. Clickjacking:

Clickjacking involves concealing malicious elements, such as buttons or links, beneath legitimate ones on a website. When users interact with the visible element, they unwittingly interact with the hidden malicious element as well.

System-based Attacks:

System-based attacks target weaknesses in computer systems, networks, and software. These attacks are more focused on compromising the infrastructure of the targeted system or network. They can result in system disruptions, data breaches, or unauthorized access. Here are some common system-based attacks:

  1. Malware:

Malware, short for malicious software, includes viruses, worms, Trojans, and ransomware. Malware infects systems and networks with the intent of causing damage, stealing information, or extorting money.

2. Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks:

In DoS attacks, attackers flood a system or network with excessive traffic to overwhelm its resources and render it unavailable to legitimate users. DDoS attacks amplify this by using multiple compromised devices to execute the attack.

3. Man-in-the-Middle (MitM) Attacks:

MitM attacks intercept and manipulate communication between two parties. Attackers can eavesdrop on sensitive information or alter the communication without the parties’ knowledge.

4. Zero-Day Exploits:

Zero-day exploits target vulnerabilities in software or hardware that are not yet known to the vendor or have not been patched. Attackers exploit these vulnerabilities before a fix is available.

5. Advanced Persistent Threats (APTs):

APTs are prolonged and sophisticated attacks, often carried out by well-funded and highly-skilled attackers. They aim to steal sensitive information, disrupt operations, or gain persistent access to the target’s systems.

In conclusion, both web-based and system-based attacks pose significant threats to cybersecurity. To protect against such attacks, individuals and organizations must implement robust security measures, regularly update software and systems, and maintain a strong cybersecurity posture. Staying informed about emerging threats and following best practices can help mitigate the risks of cyber-attacks.

--

--