A cyber attack is a method by which an individual,
through a computer system, try to take control, destabilize or harm another
computer system (computer, private network, etc.).
There are different types of attacks. Some are:
Denial of Service Attack, 1 also called DoS (Denial of Service), is an attack on a computer system or network that causes a service or resource is inaccessible to legitimate users, usually causing the loss of connectivity by consumption of network bandwidth of the victim network or overload the system computational resources of the victim.
Man in the middle, 2 MitM sometimes abbreviated, is a situation where an attacker monitors (usually via a sniffer) a communication between two parties and falsifies the exchanges to impersonate one. REPLAY attacks, 3 a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. It is conducted by the author or by an adversary who intercepts the data and retransmits it, possibly as part of a masked attack.
Zero-day attack, attack against a computer, from which they exploit certain vulnerabilities or security holes in a program or programs before they know them, or that, after publication of the existence of the vulnerability, perform the attack before the publication of the patch that solvente.
There are different types of attacks. Some are:
Denial of Service Attack, 1 also called DoS (Denial of Service), is an attack on a computer system or network that causes a service or resource is inaccessible to legitimate users, usually causing the loss of connectivity by consumption of network bandwidth of the victim network or overload the system computational resources of the victim.
Man in the middle, 2 MitM sometimes abbreviated, is a situation where an attacker monitors (usually via a sniffer) a communication between two parties and falsifies the exchanges to impersonate one. REPLAY attacks, 3 a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed. It is conducted by the author or by an adversary who intercepts the data and retransmits it, possibly as part of a masked attack.
Zero-day attack, attack against a computer, from which they exploit certain vulnerabilities or security holes in a program or programs before they know them, or that, after publication of the existence of the vulnerability, perform the attack before the publication of the patch that solvente.
Normally the cyberattacks are produced by a group of
hackers.
One hacker is a
person who belongs to one of these communities or different but not completely
independent subcultures
At present it is used of current form to refer mainly
to the IT criminals, due to his massive utilization on the part of the mass
media from the decade of 1980. Him the so called ones can add to the criminals
" script kiddies ", people who invades computers, using programs
written by others, and who has very little knowledge on since they work.
From now the most famous groups of hackers are .
Anonymus and LulzSec and they
fight together against any government that doesn’t obey tha laws, so they hack
their system to steal their information and spread it to the public and
blocking their websites.
Ramses .
Normally we received cyber attacks daily for example, when we visit a web page
we have never seen we could be in danger and even if we don’t got the enough
protection to protect our data and information.
Genesis
.we have to be careful when we gave our information to other people we are not
only in danger but our family could be too.
Jorge
.can be used to steal your information , your identity, money, accounts
,personal information and they can do whatever they want or spread it in public
or just steal your information and money.




