Chapter 2

Getting to Know Common Cyberattacks

IN THIS CHAPTER

Bullet Exploring attacks that can inflict damage

Bullet Discovering the difference between impersonation, data interception, and data theft

Bullet Looking at the various types of malware, poisoning, and malvertising

Bullet Finding out about advanced forms of cyberattacks

Although many types of cyberattacks exist, this book focuses on those that are most likely to affect you or your business. The reality is, you’re likely reading this book to learn about how to keep yourself cybersecure, not to learn about matters that have no impact on you, such as forms of attacks that are normally directed at espionage agencies, industrial equipment, or military armaments.

In this chapter, you find out about the different types of problems that cyberattackers can create through the use of attacks that commonly impact individuals and small businesses.

Attacks That Inflict Damage

Attackers launch some forms of cyberattacks with the intent to inflict damage to victims. The threat posed by such attacks is not that a criminal will directly steal your money or ...

Get Cybersecurity All-in-One For Dummies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.