Home > Cybersecurity glossary > Cyber attack πŸ”΄ Attack

Cyber attack πŸ”΄ Attack

A cyber attackalso known as cyber attack or cyber attack (for cyber), is a malicious action carried out via computer networks (mainly the Internet) with the aim of compromising the security, confidentiality, integrity or availability of a system, network or data.

These attacks can target individuals, businesses and critical infrastructures.

 


πŸ‘‰ Types of cyber attacks

Cyber attacks take many forms, including :

  • Malicious software (malware)
    Virus, Trojan horsesworms, spyware, ransomware: malicious software that spreads to damage, steal or spy on others
  • Phishing (phishing) / Harpooning (spear phishing)
    Phishing attempts by e-mail or messaging service, aimed at deceiving the user in order to obtain sensitive information (identifiers, bank details, etc.).
  • Attacks by denial of service (DoS/DDoS)
    Saturation of a server or network to interrupt normal operation.
  • Operation of vulnerabilities (Zero-day)
    Attacks that take advantage of security flaws not yet corrected by developers.
  • Injection (e.g. SQL injection)
    Exploiting vulnerabilities in web applications to access, modify or destroy data.
  • Social engineering
    Psychological manipulation to encourage people to divulge sensitive information or make security errors.
  • APT (Advanced Persistent Threat)
    Sophisticated and prolonged attacks, often carried out by state actors or organised groups, which remain concealed for long periods in order to extract sensitive data.
  • Attacks by theman in the middle (MitM)
    Interception of communications between two parties to steal or modify information.

 


🎯 Objectives of cyber attacks

The motivations behind cyber attacks are manifold and can include :

  • Financial gain : theft of financial information, extortion (ransomware), fraud, etc.
  • Industrial or political espionage : theft of commercial secrets, strategic information and government data.
  • Sabotage : disruption or destruction of critical systems and infrastructures.
  • Activism and ideology: actions carried out for political, social or ideological reasons.
  • Reputation and destabilisation : damage an organisation's reputation, sow chaos and destabilise institutions.
  • Simple vandalism or a challenge : In some cases, the aim may simply be to expose a security flaw or cause disruption without any specific financial or ideological motivation.
Towards the ORSYS Cyber Academy: a free space dedicated to cybersecurity