Industry-relevant training in Business, Technology, and Design to help professionals and graduates upskill for real-world careers.
Fun, engaging games to boost memory, math fluency, typing speed, and English skills—perfect for learners of all ages.
Cyber threats encompass a range of malicious acts aimed at damaging or stealing data and disrupting digital activities. Key categories include malware, phishing, denial of service attacks, and social engineering tactics. Understanding these threats and their implications is essential for developing robust defenses and educating users to mitigate risks.
Enroll to start learning
You’ve not yet enrolled in this course. Please enroll for free to listen to audio lessons, classroom podcasts and take practice test.
References
Chapter 2_ Common Types of Cyber Threats.pdfClass Notes
Memorization
What we have learnt
Final Test
Revision Tests
Term: Malware
Definition: Software designed to cause damage or unauthorized access to computers or networks.
Term: Phishing
Definition: Tricking users into revealing personal information via fake emails or websites.
Term: Denial of Service (DoS) Attack
Definition: Attacks that flood a system with traffic, making it unavailable to users.
Term: ManintheMiddle (MitM) Attack
Definition: An attack where the attacker intercepts and possibly alters communication between two parties.
Term: SQL Injection
Definition: Exploiting vulnerabilities in an application's database by injecting malicious SQL commands.
Term: ZeroDay Exploits
Definition: Attacks on vulnerabilities as soon as they are discovered and before a fix is available.
Term: Password Attacks
Definition: Techniques used to crack passwords, including brute force and credential stuffing.
Term: Social Engineering
Definition: Manipulating individuals into giving up confidential information.