Chapter 2
Getting to Know Common Cyberattacks
IN THIS CHAPTER
Exploring attacks that can inflict all sorts of damage
Discovering the difference between impersonation, data interception, and data theft
Looking at the various types of malware, poisoning, and malvertising
Finding out about advanced forms of cyberattacks
Many different types of cyberattacks exist — so many that I could write an entire series of books about them and add many new chapters every year. In this book, however, I do not cover all types of threats in detail because the reality is, you’re likely reading this book to learn about how to keep yourself cybersecure, not to learn about matters that have no impact on you, such as forms of attacks that are normally directed at espionage agencies, industrial equipment, or military armaments.
In this chapter, you find out about the different types of problems that cyberattackers can create using attacks that commonly impact individuals and small businesses.
Attacks That Inflict Damage
Attackers launch some forms of cyberattacks with the intent to inflict damage on victims. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access