Cyber Security Attacks – Clear & Interview‑Focused Guide 🛡️
🔐 What is a Cyber Security Attack?
A cyber attack is an attempt to gain unauthorized access, disrupt, damage, or steal data from systems, networks, or users.
🧨 Major Types of Cyber Attacks
1️⃣ Malware Attacks
Malicious software designed to harm systems.
Types:
- Virus – Attaches to files
- Worm – Self‑spreading
- Trojan – Fake legitimate software
- Ransomware – Encrypts files for money
- Spyware – Steals data
- Rootkit – Hides malware
📌 Example: WannaCry ransomware
2️⃣ Phishing Attacks (Very Common)
Trick users into giving sensitive data.
Types:
- Email phishing
- Spear phishing (targeted)
- Whaling (executives)
- Smishing (SMS)
- Vishing (voice)
📌 Example: Fake PayPal email
3️⃣ Password Attacks
Attackers try to break passwords.
Methods:
- Brute force
- Dictionary attack
- Credential stuffing
- Keylogging
4️⃣ Denial of Service (DoS / DDoS)
Overwhelms a system to make it unavailable.
- DoS – Single attacker
- DDoS – Multiple systems (botnet)
📌 Example: Flooding web server with traffic
5️⃣ Man‑in‑the‑Middle (MITM)
Attacker intercepts communication.
📌 Example: Public Wi‑Fi attack
6️⃣ SQL Injection (SQLi)
Malicious SQL code injected into forms.
📌 Example:
' OR '1'='1
7️⃣ Cross‑Site Scripting (XSS)
Injecting malicious scripts into websites.
- Stored XSS
- Reflected XSS
- DOM‑based XSS
8️⃣ Zero‑Day Attack
Exploits unknown vulnerabilities before patches are released.
9️⃣ Insider Threat
Attack from employees or trusted users.
🔎 Attack Categories (CIA Triad)
CategoryAttacksConfidentialityPhishing, SpywareIntegritySQL InjectionAvailabilityDDoS
🧰 Common Attack Tools (Interview Knowledge)
- Metasploit
- Nmap
- Burp Suite
- Wireshark
- Hydra
🛡️ Prevention & Defense
Technical Controls:
- Firewalls
- IDS / IPS
- Antivirus
- Patch management
- MFA
User Controls:
- Security awareness training
- Strong passwords
- Avoid suspicious links
🎯 Interview Quick Questions
Q: What is phishing?
A: Social engineering attack to steal credentials.
Q: Difference between virus and worm?
A: Worm spreads automatically.
Q: What is DDoS?
A: Traffic flooding attack.
Q: What is SQL Injection?
A: Injecting malicious SQL queries.
🧠 Beginner Tip
Start learning:
- Networking basics
- Linux
- Common attacks
- Security tools
- Blue team + Red team concepts