SlideShare a Scribd company logo
Network Security
Network Security Types and Specifications
Md. Asifur Rahman Siddiki
ID: 1834902563
Batch: 49
There are many security system networking. Some of them given below:
 Cyber security
Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks.
It's also known as information technology security or electronic
information security. The term applies in a variety of contexts, from
business to mobile computing, and can be divided into a few common
categories.
We discuss about Web-Based Attacks and System-Based Attacks.
Web-Based Attacks:
When criminals take advantage of vulnerabilities in coding to gain
access to a server or database, these types of cyber vandalism threats are
known as application layer attacks. Users trust that the sensitive personal
information they divulge on your website will be kept private and safe.
SQL Injection:
This happens when a hacker submits destructive code into an input form.
If your systems fail to clean this information, it can be submitted into the
database where it can change, delete or reveal data to the attacker.
Code injection:
Code injection also called Remote Code Execution (RCE), occurs when
an attacker exploits an input validation flaw in software to introduce and
execute malicious code. Code is injected in the language of the targeted
application and executed by the server-side interpreter. Any application
that directly uses unvalidated input is vulnerable to code injection, and
web applications are a prime target for attackers. This article shows how
code injection vulnerabilities arise and how you can protect your web
applications from injection.
DNS spoofing:
DNS poisoning, also known as DNS cache poisoning or DNS spoofing,
is a highly deceptive cyber attack in which hackers redirect web traffic
toward fake web servers and phishing websites. These fake sites
typically look like the user’s intended destination, making it easy for
hackers to trick visitors into sharing sensitive information.
Session hijacking:
Session hijacking is an attack where a user session is taken over by an
attacker. A session starts when you log into a service, for example your
banking application, and ends when you log out. The attack relies on the
attacker’s knowledge of your session cookie, so it is also called cookie
hijacking or cookie side-jacking. Although any computer session could
be hijacked, session hijacking most commonly applies to browser
sessions and web applications.
Phishing:
Phishing is a type of social engineering attack often used to steal user
data, including login credentials and credit card numbers. It occurs when
an attacker, masquerading as a trusted entity, dupes a victim into
opening an email, instant message, or text message. The recipient is then
tricked into clicking a malicious link, which can lead to the installation
of malware, the freezing of the system as part of a ransomware attack or
the revealing of sensitive information.
Spear phishing
Spear phishing targets a specific person or enterprise, as opposed
to random application users. It’s a more in-depth version of
phishing that requires special knowledge about an organization,
including its power structure.
An attack might play out as follows:
A perpetrator researches names of employees within an
organization’s marketing department and gains access to the latest
project invoices.
Posing as the marketing director, the attacker emails a
departmental project manager (PM) using a subject line that reads,
Updated invoice for Q3 campaigns. The text, style, and included
logo duplicate the organization’s standard email template.
A link in the email redirects to a password-protected internal
document, which is in actuality a spoofed version of a stolen
invoice.
The PM is requested to log in to view the document. The attacker
steals his credentials, gaining full access to sensitive areas within
the organization’s network.
Whaling
Whale phishing, or whaling, is a form of spear phishing aimed at
the very big fish — CEOs or other high-value targets. Many of
these scams target company board members, who are considered
particularly vulnerable: they have a great deal of authority within a
company, but since they aren't full-time employees, they often use
personal email addresses for business-related correspondence,
which doesn't have the protections offered by corporate email.
Vishing:
Vishing, or voice phishing, involves a malicious caller purporting
to be from tech support, a government agency or other
organization and trying to extract personal information, such as
banking or credit card information.
Email phishing scams:
Email phishing is a numbers game. An attacker sending out
thousands of fraudulent messages can net significant information
and sums of money, even if only a small percentage of recipients
fall for the scam. As seen above, there are some techniques
attackers use to increase their success rates.
For one, they will go to great lengths in designing phishing
messages to mimic actual emails from a spoofed organization.
Using the same phrasing, typefaces, logos, and signatures makes
the messages appear legitimate.
Brute Force Attack:
A brute force attack uses trial-and-error to guess login info, encryption
keys, or find a hidden web page. Hackers work through all possible
combinations hoping to guess correctly.
These attacks are done by ‘brute force’ meaning they use excessive
forceful attempts to try and ‘force’ their way into your private
account(s).
Dictionary attack:
A dictionary attack is a method of breaking into a password-protected
computer, network or other IT resource by systematically entering every
word in a dictionary as a password. A dictionary attack can also be used
in an attempt to find the key necessary to decrypt an encrypted message
or document.
URL Interpretation Attack:
This attack is also called URL poisoning as the attackers manipulates the
URL by changing its semantics but keeping the syntax intact. The
parameters of the URL are adjusted so that information beyond what is
intended can be retrieved from the web server.
File inclusion Attack:
A file inclusion vulnerability allows an attacker to access unauthorized
or sensitive files available on the web server or to execute malicious
files on the web server by making use of the 'include' functionality.
Man-in-the-Middle Attack:
A man-in-the-middle attack is a type of eavesdropping attack, where
attackers interrupt an existing conversation or data transfer. After
inserting themselves in the "middle" of the transfer, the attackers pretend
to be both legitimate participants. This enables an attacker to intercept
information and data from either party while also sending malicious
links or other information to both legitimate participants in a way that
might not be detected until it is too late.
System-based attacks:
It is a type of malicious software program that spread throughout the
computer files without the knowledge of a user. It is a self-replicating
malicious computer program that replicates by inserting copies of itself
into other computer programs when executed.
Virus attack:
A computer virus, much like a flu virus, is designed to spread from host
to host and has the ability to replicate itself. Similarly, in the same way
that flu viruses cannot reproduce without a host cell, computer viruses
cannot reproduce and spread without programming such as a file or
document. Once a virus has successfully attached to a program, file, or
document, the virus will lie dormant until circumstances cause the
computer or device to execute its code. In order for a virus to infect your
computer, you have to run the infected program, which in turn causes
the virus code to be executed.
Worm:
A computer worm is a type of malware whose primary function is to
self-replicate and infect other computers while remaining active on
infected systems. A computer worm duplicates itself to spread to
uninfected computers. It often does this by exploiting parts of an
operating system that are automatic and invisible to the user.
Computer worms often rely on the actions of, and vulnerabilities in,
networking protocols to propagate.
After a computer worm loads and begins running on a newly infected
system, it will typically follow its prime directive: to remain active on an
infected system for as long as possible and to spread to as many other
vulnerable systems as possible.
Trojan Horse Virus:
A Trojan horse is a type of malware that downloads onto a computer
disguised as a legitimate program. A Trojan horse is so-called due to its
delivery method, which typically sees an attacker use social engineering
to hide malicious code within legitimate software.
Backdoor Attack:
The backdoor attack is a type of malware that is used to get unauthorized
access to a website by the cybercriminals. The cybercriminals spread the
malware in the system through unsecured points of entry, such as
outdated plug-ins or input fields. The malware is entered in the system
through the backdoor and it makes it ways to the company’s sensitive
data including customer personally identifiable information.
Bot Attack:
A botnet attack is a type of cyber attack carried out by a group of
internet-connected devices controlled by a malicious actor. Botnets
themselves are simply the network of devices. It is when cyber criminals
inject malware into the network to control them as a collective that they
get used for launching cyber attacks.
Malware attack:
A malware attack is a common cyber attack where malware (normally
malicious software) executes unauthorized actions on the victim's
system. The malicious software (a.k.a. virus) encompasses many
specific types of attacks such as ransomware, spyware, command and
control, and more.

More Related Content

PDF
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
Cyber security professional services- Detox techno
 
PDF
1 ijaems sept-2015-3-different attacks in the network a review
INFOGAIN PUBLICATION
 
PPT
Types of attacks and threads
srivijaymanickam
 
DOCX
Cyber crime
Sahil Daw
 
PPTX
Cyber security
ankit yadav
 
PPTX
Different types of attacks in internet
Rohan Bharadwaj
 
PDF
8 Types of Cyber Attacks That Can Bother CISOs in 2020
SecPod Technologies
 
PPTX
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 
10 Types Of Cyber Attacks And How They Can Affect You- Detox technologies.pdf
Cyber security professional services- Detox techno
 
1 ijaems sept-2015-3-different attacks in the network a review
INFOGAIN PUBLICATION
 
Types of attacks and threads
srivijaymanickam
 
Cyber crime
Sahil Daw
 
Cyber security
ankit yadav
 
Different types of attacks in internet
Rohan Bharadwaj
 
8 Types of Cyber Attacks That Can Bother CISOs in 2020
SecPod Technologies
 
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 

What's hot (19)

PPTX
Cyber Attacks
Insiya Tarwala
 
PDF
Fire eye spearphishing
Zeno Idzerda
 
PDF
Spear Phishing 101
Sendio
 
PDF
A novel way of integrating voice recognition and one time passwords to preven...
ijdpsjournal
 
PPTX
Ransomware and email security ver - 1.3
Denise Bailey
 
PDF
Spear phishing attacks-by-hari_krishna
Raghunath G
 
PPTX
Access Controls Attacks
Hafiza Abas
 
PPT
Introduction to Web Server Security
JITENDRA KUMAR PATEL
 
PDF
What-is-computer-security
iamvishal2
 
PPT
P H I S H I N G
bensonoo
 
PPT
Hacking
Anil Shrivastav
 
PDF
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Cybersecurity Education and Research Centre
 
DOCX
External threats to information system: Malicious software and computer crimes
Souman Guha
 
PPTX
Web Server Web Site Security
Steven Cahill
 
PPTX
Client server security threats
rahul kundu
 
PPT
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim
 
PPTX
Top 10 web server security flaws
tobybear30
 
PPTX
What's new in​ CEHv11?
EC-Council
 
Cyber Attacks
Insiya Tarwala
 
Fire eye spearphishing
Zeno Idzerda
 
Spear Phishing 101
Sendio
 
A novel way of integrating voice recognition and one time passwords to preven...
ijdpsjournal
 
Ransomware and email security ver - 1.3
Denise Bailey
 
Spear phishing attacks-by-hari_krishna
Raghunath G
 
Access Controls Attacks
Hafiza Abas
 
Introduction to Web Server Security
JITENDRA KUMAR PATEL
 
What-is-computer-security
iamvishal2
 
P H I S H I N G
bensonoo
 
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Cybersecurity Education and Research Centre
 
External threats to information system: Malicious software and computer crimes
Souman Guha
 
Web Server Web Site Security
Steven Cahill
 
Client server security threats
rahul kundu
 
Phishing, Pharming, and the latest potholes on the Information Highway
Kevin Lim
 
Top 10 web server security flaws
tobybear30
 
What's new in​ CEHv11?
EC-Council
 
Ad

Similar to Network security (20)

PPTX
basics of hacking- threat basics, types of attack
PILAMPIRAYAsstProfes
 
PPTX
Types of attacks in cyber security
Bansari Shah
 
PDF
Chapter 2 konsep dasar keamanan
newbie2019
 
PPTX
Ethical hacking ppt
Nitesh Dubey
 
PPTX
A Taken on Cyber Attacks - The Cyber Physical System.pptx
animeshdabral007
 
PDF
Network security
nafisarayhana1
 
PPTX
CYBER SECURITY PPT.pptxhshhshshdgddggdgddgdg
pk2837898
 
PPT
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 
PDF
Chapter 2 konsep dasar keamanan
newbie2019
 
PPTX
Top 10 Hacking Techniques Explained In 10 Minutes | Ethical Hacking Tutorial ...
Simplilearn
 
DOCX
CNS unit -1.docx
Padamata Rameshbabu
 
PPTX
Computer security
sruthiKrishnaG
 
PPTX
Health information security 3 vulnerability threat and risk
Dr. Lasantha Ranwala
 
PPTX
Cyber Security - All Over World
Bhawani Singh Chouhan
 
PDF
7 Types of Cyber Security Threats | The Lifesciences Magazine
The Lifesciences Magazine
 
PPT
L N Yadav Cyber SECURITY2.ppt
lowlesh1
 
PPT
L N Yadav Cyber SECURITY.ppt
lowlesh1
 
PPTX
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
PDF
What is a malware attack?
AariyaRathi
 
PPTX
Cybersecurity
A. Shamel
 
basics of hacking- threat basics, types of attack
PILAMPIRAYAsstProfes
 
Types of attacks in cyber security
Bansari Shah
 
Chapter 2 konsep dasar keamanan
newbie2019
 
Ethical hacking ppt
Nitesh Dubey
 
A Taken on Cyber Attacks - The Cyber Physical System.pptx
animeshdabral007
 
Network security
nafisarayhana1
 
CYBER SECURITY PPT.pptxhshhshshdgddggdgddgdg
pk2837898
 
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 
Chapter 2 konsep dasar keamanan
newbie2019
 
Top 10 Hacking Techniques Explained In 10 Minutes | Ethical Hacking Tutorial ...
Simplilearn
 
CNS unit -1.docx
Padamata Rameshbabu
 
Computer security
sruthiKrishnaG
 
Health information security 3 vulnerability threat and risk
Dr. Lasantha Ranwala
 
Cyber Security - All Over World
Bhawani Singh Chouhan
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
The Lifesciences Magazine
 
L N Yadav Cyber SECURITY2.ppt
lowlesh1
 
L N Yadav Cyber SECURITY.ppt
lowlesh1
 
Cybersecurity Awareness Training for Employees.pptx
Mustafa Amiri
 
What is a malware attack?
AariyaRathi
 
Cybersecurity
A. Shamel
 
Ad

Recently uploaded (20)

PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Doc9.....................................
SofiaCollazos
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
Software Development Methodologies in 2025
KodekX
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Doc9.....................................
SofiaCollazos
 

Network security

  • 1. Network Security Network Security Types and Specifications Md. Asifur Rahman Siddiki ID: 1834902563 Batch: 49
  • 2. There are many security system networking. Some of them given below:  Cyber security Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to mobile computing, and can be divided into a few common categories. We discuss about Web-Based Attacks and System-Based Attacks. Web-Based Attacks: When criminals take advantage of vulnerabilities in coding to gain access to a server or database, these types of cyber vandalism threats are known as application layer attacks. Users trust that the sensitive personal information they divulge on your website will be kept private and safe. SQL Injection: This happens when a hacker submits destructive code into an input form. If your systems fail to clean this information, it can be submitted into the database where it can change, delete or reveal data to the attacker. Code injection: Code injection also called Remote Code Execution (RCE), occurs when an attacker exploits an input validation flaw in software to introduce and execute malicious code. Code is injected in the language of the targeted application and executed by the server-side interpreter. Any application that directly uses unvalidated input is vulnerable to code injection, and
  • 3. web applications are a prime target for attackers. This article shows how code injection vulnerabilities arise and how you can protect your web applications from injection. DNS spoofing: DNS poisoning, also known as DNS cache poisoning or DNS spoofing, is a highly deceptive cyber attack in which hackers redirect web traffic toward fake web servers and phishing websites. These fake sites typically look like the user’s intended destination, making it easy for hackers to trick visitors into sharing sensitive information. Session hijacking: Session hijacking is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out. The attack relies on the attacker’s knowledge of your session cookie, so it is also called cookie hijacking or cookie side-jacking. Although any computer session could be hijacked, session hijacking most commonly applies to browser sessions and web applications. Phishing: Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, the freezing of the system as part of a ransomware attack or the revealing of sensitive information.
  • 4. Spear phishing Spear phishing targets a specific person or enterprise, as opposed to random application users. It’s a more in-depth version of phishing that requires special knowledge about an organization, including its power structure. An attack might play out as follows: A perpetrator researches names of employees within an organization’s marketing department and gains access to the latest project invoices. Posing as the marketing director, the attacker emails a departmental project manager (PM) using a subject line that reads, Updated invoice for Q3 campaigns. The text, style, and included logo duplicate the organization’s standard email template. A link in the email redirects to a password-protected internal document, which is in actuality a spoofed version of a stolen invoice. The PM is requested to log in to view the document. The attacker steals his credentials, gaining full access to sensitive areas within the organization’s network. Whaling Whale phishing, or whaling, is a form of spear phishing aimed at the very big fish — CEOs or other high-value targets. Many of these scams target company board members, who are considered particularly vulnerable: they have a great deal of authority within a company, but since they aren't full-time employees, they often use
  • 5. personal email addresses for business-related correspondence, which doesn't have the protections offered by corporate email. Vishing: Vishing, or voice phishing, involves a malicious caller purporting to be from tech support, a government agency or other organization and trying to extract personal information, such as banking or credit card information. Email phishing scams: Email phishing is a numbers game. An attacker sending out thousands of fraudulent messages can net significant information and sums of money, even if only a small percentage of recipients fall for the scam. As seen above, there are some techniques attackers use to increase their success rates. For one, they will go to great lengths in designing phishing messages to mimic actual emails from a spoofed organization. Using the same phrasing, typefaces, logos, and signatures makes the messages appear legitimate. Brute Force Attack: A brute force attack uses trial-and-error to guess login info, encryption keys, or find a hidden web page. Hackers work through all possible combinations hoping to guess correctly. These attacks are done by ‘brute force’ meaning they use excessive forceful attempts to try and ‘force’ their way into your private account(s).
  • 6. Dictionary attack: A dictionary attack is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary as a password. A dictionary attack can also be used in an attempt to find the key necessary to decrypt an encrypted message or document. URL Interpretation Attack: This attack is also called URL poisoning as the attackers manipulates the URL by changing its semantics but keeping the syntax intact. The parameters of the URL are adjusted so that information beyond what is intended can be retrieved from the web server. File inclusion Attack: A file inclusion vulnerability allows an attacker to access unauthorized or sensitive files available on the web server or to execute malicious files on the web server by making use of the 'include' functionality. Man-in-the-Middle Attack: A man-in-the-middle attack is a type of eavesdropping attack, where attackers interrupt an existing conversation or data transfer. After inserting themselves in the "middle" of the transfer, the attackers pretend to be both legitimate participants. This enables an attacker to intercept information and data from either party while also sending malicious links or other information to both legitimate participants in a way that might not be detected until it is too late.
  • 7. System-based attacks: It is a type of malicious software program that spread throughout the computer files without the knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting copies of itself into other computer programs when executed. Virus attack: A computer virus, much like a flu virus, is designed to spread from host to host and has the ability to replicate itself. Similarly, in the same way that flu viruses cannot reproduce without a host cell, computer viruses cannot reproduce and spread without programming such as a file or document. Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you have to run the infected program, which in turn causes the virus code to be executed. Worm: A computer worm is a type of malware whose primary function is to self-replicate and infect other computers while remaining active on infected systems. A computer worm duplicates itself to spread to uninfected computers. It often does this by exploiting parts of an operating system that are automatic and invisible to the user. Computer worms often rely on the actions of, and vulnerabilities in, networking protocols to propagate. After a computer worm loads and begins running on a newly infected system, it will typically follow its prime directive: to remain active on an infected system for as long as possible and to spread to as many other vulnerable systems as possible.
  • 8. Trojan Horse Virus: A Trojan horse is a type of malware that downloads onto a computer disguised as a legitimate program. A Trojan horse is so-called due to its delivery method, which typically sees an attacker use social engineering to hide malicious code within legitimate software. Backdoor Attack: The backdoor attack is a type of malware that is used to get unauthorized access to a website by the cybercriminals. The cybercriminals spread the malware in the system through unsecured points of entry, such as outdated plug-ins or input fields. The malware is entered in the system through the backdoor and it makes it ways to the company’s sensitive data including customer personally identifiable information. Bot Attack: A botnet attack is a type of cyber attack carried out by a group of internet-connected devices controlled by a malicious actor. Botnets themselves are simply the network of devices. It is when cyber criminals inject malware into the network to control them as a collective that they get used for launching cyber attacks. Malware attack: A malware attack is a common cyber attack where malware (normally malicious software) executes unauthorized actions on the victim's system. The malicious software (a.k.a. virus) encompasses many specific types of attacks such as ransomware, spyware, command and control, and more.