There are several forms of attack that threaten computer systems and networks. Understanding each type, how it works, and what it aims to achieve is essential for identifying and preventing vulnerabilities.
Key points
Main forms of attack: malware (viruses, trojans, spyware), social engineering (phishing), brute-force attacks, denial of service (DoS), data interception and theft, SQL injection.
Each attack has a different METHOD and PURPOSE — you need to know both.
Exam Tip:When describing an attack, always explain: (1) WHAT it is, (2) HOW it works, and (3) what the PURPOSE/goal is.
Attacks can target data (steal/modify), systems (disrupt/disable), or people (trick/deceive).