Types of Attacks in Cyber Security

list of types of cyber attacks

Some Major Types of Attacks in Cyber Security which you must know. See the following

An Internet has become to be a powerful and effective tool for billion people worldwide. Whether it is in regarding with e-commerce, education or social networking, every people are spending lots of time on the Internet to get something interesting. But, there is another black side of it.

About 50% of people experience cyber security issues in every year and this data is constantly increasing.

Let’s take a quick look at Some Major Types of Attacks in Cyber Security

Malware or malicious software

Malicious software is a software which consists of computer program or code which can install on your computer without your knowledge and it can affect your operating system or even crash your hard drive. It can be  virus, worms and Trojan Horse are examples of the malicious software referred to as Malware.

Cyber Criminals

Cyber criminals or hacker is often known as Black hat hacker who use a software to intrude your computer in order to break the security and take out your personal information for illegal activity.


A botnet is also refers to as zombies mainly attack a large network and it slows down the whole network. A collection of the computer across the Internet is get by under attacker called botmaster. Mostly Trojan horse program is used to affect the network.  A bot is a malicious software that enables cyber-criminal to control computer without owner knowledge and use it to execute illegal activities such as send spam, spreading virus etc.


What is virus computer? The virus is commonly known harmful computer program that is designed to spread from system to system through computer operation like exchanging disk, sending electronic mail etc. 

virus in computer can corrupt or delete your data from the computer and damage your hard drive. But the negative point of a virus is that it cannot get executed until its trigger. Some of the types of virus are Master boot record virus which attacks bootable media, File infector virus which attacks files or software, Macro virus.


The worm is a very interesting malicious program which is similar of virus but the difference is that it is a self-replicated program which uses a computer network to send copies of itself to another computer on the same network. They remain in memory and they use their own power to spread. Stuxnet was one of the mightiest types of computer worms.

Trojan Horse

A Trojan Horse virus is malicious code which is use for destructive purpose. Trojan horse attack is mainly attached to an email or free program like game. When you click it, it gets install into your computer without your knowledge and do some unusual activity like booting problem, changing in system setting. To avoid this your antivirus should be up to date.


Keylogger is not malicious code, but it can attach by botnet to monitor the keystrokes.It is an activity which is record by attacker when you use typing word from keyboard. A keylogger can record your messages, email, password which you type from keyboard.


Spyware software and adware are the two unwanted software which is bundled with shareware or freeware software which you use in your computer normally. These unwanted software has a capability of monitoring your surfing activity on the Internet and it can transfer important data like e-mail, credit card number or password to the creator of spyware.

Phishing attack

Phishing attack is a type of online identity theft that uses email and fraud websites to steal your money with your personal data such as username, password, account data etc.

These email and website look like genuine, when you click on this it will often ask you to fill a  form in which you have to fill your user name or password, or it will redirect to another fraud website.

These are the threat which often attacks to user by an attacker.

Leave a Reply