Renan Batista Sequestro | Types of Cyberattacks

Page 1

Types of Types of Cyberattacks Cyberattacks

Learn about the two most common threats to cybersecurity!

MALWARE PHISHING

What is it?

Applications or links that install malicious software

What is it?

Attackers pretending to be a genuine entity

What does it do?

Accesses the computer's network, deals damage, and gathers private information

What does it do?

Installs malware or leaks sensitive information

What are examples? Viruses, worms, ransomware

What are examples? Emails, voice calls

How is it prevented?

Avoid suspicious websites or applications; update and secure your system

How is it prevented?

Avoid opening suspicious emails and links; do not disclose personal information

R e n a n B a t i s t a S e q u e s t r o
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.