What is Cyber-Security

    To protect the digital Computer, networks, software from digital attacks is known as cyber security. The aim of cyber attack is to accessing, or destroying the sensitive information, or interrupt the normal business, demand for money (Crypto Currency). A successful cybersecurity has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe.

Types of Cyber Threats


Malware is a software containing malicious code that is send to the victim’s system for trying to taking access over their system.

There are various types of malware for different purposes.

  • Spyware

It is used to monitor the victim’s system and trying to stolen their sensitive information without acknowledgement to the victim.

  • Trojan

Trojan is like a legitimate software, when the victim download it, and execute that software. Then it gives the target system access to the attacker.

  • Ransomware

In the Ransomware attack, attacker encrypts the victim’s system sensitive information and demand for money to decrypt that information.

  • RATs

RATs are known as remote access Trojans, that are installed and run on the backdoor at victims system and provide remote control access to the attacker so that the attacker can see all the activity that are running by the victim.

  • Phishing

Phishing is done by sending malicious email or messages to the victims that are same as legitimate emails. When the victims click on the malicious link then it redirect into some malicious downloading page or it will ask for some sensitive information like credit card details or other thing.

  • Virus

Virus is a malicious code that is installed on the victims system without their knowledge. And it can run on all the devices that will connect from that system. It is hard to detect the viruses because it travel from one system to another.

  • Worms

It works like as virus, but it doesn’t need to connect the system physically. It can travel from one system to another through emails or messages that the victims sends. And effect all the system that the victim wants to communicate virtually. It is also a malicious code like as Virus.


DOS is known as denial of services and DDOS is known as distributive denial of services. It is used to send a lot of traffic on the victims system or the browser, so that it can intrupt the handshake and the victim is not able to get response by legitimate request.

MiTM Attack

It is known as man-in-the-middle attack. The attacker intercept two party communication and put itself into the middle. When first party send any query then the attacker change it and send any other query to the second party. It is a method to get some sensitive information.


It is used to affect a millions of internet-connected devices. And it is difficult to detect even when the botnet is running.

SQL Injection

It is known as Structured Query Language (SQL). In this type of attack the attacker tries to detect some query language in the target website for getting it’s database directory. If it execute then the attacker can edit all the database of the target website.

Zero-Day Attack

It is latest type of the attack. When the exploitation method of any vulnerability goes viral on the internet before the patching of that vulnerability. This type of attack is rising on day to day by 2021.

Advance Persistent Threats (APT)

When an attacker detect any loop whole in any system or website and they do not inform the victims, capture everything on the daily basis for a long time without victim knowledge. Then it is known as APT.

DNS Attack

It is known as Domain Name System Attack. An attacker make a website same as target website, then the visitors confuse on the website and some time they try to open malicious code containing website. This is known as DNS Attack.

XSS Attack

When the attacker tries to input some malicious code mainly based on Javascript, HTML, CSS. And get output as like he want. Then it is known as XSS Attack. If any site is vulnerable with XSS Attack then you can enter into admin rights or open user’s account with putting malicious code in the place of username and password.

Brute Force Attack

If the user is generally using a simple username and password then the attacker can brute force on it. And able to get their name and password. Generally millions of username and password are given in the open source internet, and attacker detect by using these list.

Important Notice for college students

If you’re a college student and have skills in programming languages, Want to earn through blogging? Mail us at

For more Programming related blogs Visit Us Geekycodes . Follow us on Instagram.

Leave a Reply

%d bloggers like this: