What are the main types of network attacks?
There are two main types of network attacks: passive and active. In passive network attacks, malicious parties gain unauthorized access to networks, monitor, and steal private data without making any alterations. Active network attacks involve modifying, encrypting, or damaging data.
- Malware Attack. This is one of the most common types of cyberattacks. ...
- Phishing Attack. ...
- Password Attack. ...
- Man-in-the-Middle Attack. ...
- SQL Injection Attack. ...
- Denial-of-Service Attack. ...
- Insider Threat. ...
- Cryptojacking.
- Unauthorized access. Unauthorized access refers to attackers accessing a network without receiving permission. ...
- Distributed Denial of Service (DDoS) attacks. ...
- Man in the middle attacks. ...
- Code and SQL injection attacks. ...
- Privilege escalation. ...
- Insider threats.
- Malware. Malware is an umbrella term for many forms of harmful software — including ransomware and viruses — that sabotage the operation of computers. ...
- Phishing. ...
- SQL Injection Attack. ...
- Cross-Site Scripting (XSS) Attack. ...
- Denial of Service (DoS) Attack. ...
- Negative Commentary Attacks.
- Computer Virus. Computer viruses are one of the most common network security attacks that can cause sizeable damage to your data. ...
- Malware. ...
- Computer Worm. ...
- Phishing. ...
- Botnet. ...
- DoS (Denial of Service) and DDoS Attacks. ...
- Man-in-the-middle. ...
- Ransomware.
Active and Passive attacks in Information Security - GeeksforGeeks.
- packet sniffing.
- rogue access points.
- Wi-Fi phishing and evil twins.
- spoofing attacks.
- encryption cracking.
- MitM attacks.
- DoS attacks.
- Wi-Fi jamming.
- Network Security. Most attacks occur over the network, and network security solutions are designed to identify and block these attacks. ...
- Cloud Security. ...
- Endpoint Security. ...
- Mobile Security. ...
- IoT Security. ...
- Application Security. ...
- Zero Trust.
- PHASE 1 OF INTRUSION: RECONNAISSANCE.
- PHASE 2: INITIAL EXPLOITATION.
- PHASE 3: ESTABLISH PERSISTENCE.
- PHASE 4: MOVE LATERALLY.
- PHASE 5: COLLECT, EXFIL, AND EXPLOIT.
- ATTACKER'S FOCUS: GET IN, GET OUT.
- HOW TO MONITOR YOUR NETWORK LOGS WITH GRAYLOG.
- Risk management regime. Assess the risks to your organisation's information and systems by embedding an appropriate risk management regime. ...
- Secure configuration. ...
- Network security. ...
- Managing user privileges. ...
- User education and awareness. ...
- Incident management. ...
- Malware prevention. ...
- Monitoring.
What are the four types of threats?
Threats can be classified into four different categories; direct, indirect, veiled, conditional.
- Malware. Malware refers to various forms of harmful software, such as viruses and ransomware. ...
- Phishing. ...
- SQL Injection Attack. ...
- Cross-Site Scripting (XSS) ...
- Denial-of-Service (DoS)

Examples of active attacks include man-in- the middle (MitM), impersonation, and session hijacking. An attack on the authentication protocol where the attacker transmits data to the claimant, Credential Service Provider (CSP), verifier, or Relying Party (RP).
- Viruses and worms. Viruses and worms are malicious software programs (malware) aimed at destroying an organization's systems, data and network. ...
- Botnets. ...
- Drive-by download attacks. ...
- Phishing attacks. ...
- Distributed denial-of-service (DDoS) attacks. ...
- Ransomware. ...
- Exploit kits. ...
- Advanced persistent threat attacks.
The most common types of DoS and DDoS attacks are the TCP SYN flood attack, teardrop attack, smurf attack, ping-of-death attack, and botnets.
External Cybersecurity Risk
Malware, malvertizing, phishing, DDoS attacks, ransomware; these are just some of the viruses and methods that hackers use externally to gain access to your site, software, or network.
In this article, we have examined the three basic security controls – technical, administrative, and physical.
Here are some common types of active attacks: Session Hijacking Attack. Message Modification Attack.
A basic attack (also called a standard, normal, or auto attack) is the default means by which a unit deals damage.
- Crimes Against People.
- Crimes Against Property.
- Crimes Against Government.
What are three 3 vulnerabilities that exist for wireless technologies?
- Default WiFi routers. By default, wireless routers are shipped in an un-secured state. ...
- Rogue Access Points. ...
- Wireless Zero Configuration. ...
- Bluetooth exploits. ...
- WEP Weaknesses. ...
- Clear Text Encryption Passwords. ...
- Malicious Code. ...
- Autorun.
Commonly known as wireless network attacks, penetration and intrusion acts that target wireless networks pose serious threats. Wireless network attacks aim to capture the information sent across the network and/or intrude with the traffic of information.
A wireless attack is a malicious action against wireless system information or wireless networks; examples can be denial of service attacks, penetration, and sabotage.
- Ransomware. Ransomware is malware designed to use encryption to force the target of the attack to pay a ransom demand. ...
- Malware. ...
- Fileless Attacks. ...
- Phishing. ...
- Man-in-the-Middle (MitM) Attack. ...
- Malicious Apps. ...
- Denial of Service Attack. ...
- Zero-Day Exploit.
The five C's of cyber security are five areas that are of significant importance to all organizations. They are change, compliance, cost, continuity, and coverage.
The 3Cs of Best Security: Comprehensive, Consolidated, and Collaborative - Check Point Blog.
- Reconnaissance. In the first stage of an intrusion, a nation-state attacker works to understand their target. ...
- Initial Exploitation. ...
- Establish Persistence. ...
- Install Tools. ...
- Move Laterally. ...
- Collect Exfil and Exploit.
Session (Layer 5) Attacks
Manages communication sessions between computers. Manages connections with other devices. Half-duplex or full duplex.
Targeted cyber attacks
Targeted attacks may include: spear-phishing - sending emails to targeted individuals that could contain an attachment with malicious software, or a link that downloads malicious software. deploying a botnet - to deliver a DDOS (Distributed Denial of Service) attack.
Fend Off Phishing : Learn how more than 90% of all cyber attacks begin with phishing. Find out how attackers leverage phishing attacks to gain access to protected systems, hosts, and networks.
What are the most famous cyber attacks?
- The Melissa Virus. ...
- NASA Cyber Attack. ...
- The 2007 Estonia Cyber Attack. ...
- A Cyber Attack on Sony's PlayStation Network. ...
- Adobe Cyber Attack. ...
- The 2014 Cyber Attack on Yahoo. ...
- Ukraine's Power Grid Attack.
Nearly 1 billion emails were exposed in a single year, affecting 1 in 5 internet users. Data breaches cost businesses an average of $4.35 million in 2022. Around 236.1 million ransomware attacks occurred globally in the first half of 2022.
Malware. Phishing. Man-in-the-middle attack (MITM) Distributed Denial-of-Service (DDoS) attack.
authentication, authorization, and accounting (AAA)
- Turn on Multifactor Authentication. Implement multifactor authentication on your accounts and make it significantly less likely you'll get hacked.
- Update Your Software. Update your software. ...
- Think Before You Click. Think before you click. ...
- Use Strong Passwords.
A Threat may or may not malicious. An Attack is always malicious. A Threat by definition is a condition/circumstance which can cause damage to the system/asset. An Attack by definition is an intended action to cause damage to system/asset.
- Trojans.
- Viruses.
- Worms.
- Ransomware.
- Backdoor attacks.
- Social Engineering & Phishing. ...
- Malware-Injecting Devices. ...
- Missing Security Patches. ...
- Cracking Passwords. ...
- Distributed Denial-of-Service (DDOS)
Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.
Most reported types of cyber crime worldwide 2022, by number of individuals affected. In 2022, the most common type of cyber crime reported to the United States Internet Crime Complaint Center was phishing, affecting approximately 300 thousand individuals.
What are passive network attacks?
A passive attack is a network attack in which a system is monitored and sometimes scanned for open ports and vulnerabilities. The purpose of a passive attack is to gain information about the system being targeted; it does not involve any direct action on the target.
Active attacks attempt to modify, destroy or disrupt network or system resources, while passive attacks attempt to steal or monitor sensitive data. Both types of attacks can be dangerous, compromising confidentiality, integrity, and availability of systems and data, and leading to financial and reputational losses.
Example of an active attack: Hijacking session, Impersonating the user. Examples of passive attacks: Tapping, and decryption of encrypted messages.
Malware is a varied term for malicious code that hackers create to gain access to networks, steal data, or destroy data on computers. Malware usually comes from malicious website downloads, spam emails or from connecting to other infected machines or devices.
OSI model layer | Type of attack |
---|---|
Transport layer | Reconnaissance / DoS |
Network layer | Man-in-the-middle |
Data link layer | Spoofing |
Physical layer | Sniffing |
- packet sniffing.
- rogue access points.
- Wi-Fi phishing and evil twins.
- spoofing attacks.
- encryption cracking.
- MitM attacks.
- DoS attacks.
- Wi-Fi jamming.
- Malware.
- Viruses.
- Spyware.
- Adware.
- Trojan horses.
- Worms.
- Phishing.
- Spear phishing.
- malware.
- advanced persistent threats.
- distributed denial-of-service attacks.
- Malware.
- Ransomware.
- Distributed denial of service (DDoS) attacks.
- Spam and Phishing.
- Corporate Account Takeover (CATO)
- Automated Teller Machine (ATM) Cash Out.
water holing - setting up a fake website or compromising a legitimate one in order to exploit visiting users. ransomware - which could include disseminating disk encrypting extortion malware. scanning - attacking wide swathes of the Internet at random.
What is security threats and its types?
Types of security threats
It is a very general concept. In cybersecurity, it is more common to talk about threats such as viruses, trojan horses, denial of service attacks. Phishing emails is a social engineering threat that can cause, e.g., loss of passwords, credit card numbers and other sensitive data.
A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals use different methods to launch a cyber attack that includes malware, phishing, ransomware, man-in-the-middle attack, or other methods.
- Address Resolution Protocol (ARP) Attacks. ...
- Content Addressable Memory (CAM) Table Overflows. ...
- Spanning Tree Protocol (STP) Attacks. ...
- Media Access Control (MAC) Spoofing. ...
- Switch Spoofing. ...
- Double Tagging. ...
- Cisco Discovery Protocol (CDP) Reconnaissance.
The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to denial of service. Software to carry out most of these attacks is freely available on the Internet. These vulnerabilities-unless carefully controlled-can place the use of the Internet or intranet at considerable risk.
Sniffing is the most common security attack used by attackers to target the data link layer. A sniffing attack in the data link layer occurs when an attacker captures and analyzes network traffic to gather sensitive information.
Passive and active attacks
A cryptography attack can be either passive or active. Passive attacks: Passive cryptography attacks intend to obtain unauthorized access to sensitive data or information by intercepting or eavesdropping on general communication.
A wireless attack is a malicious action against wireless system information or wireless networks; examples can be denial of service attacks, penetration, and sabotage.
References
- https://commission.europa.eu/law/law-topic/data-protection/reform/rules-business-and-organisations/obligations/what-data-breach-and-what-do-we-have-do-case-data-breach_en
- https://www.nibusinessinfo.co.uk/content/common-cyber-security-measures
- https://www.techtarget.com/searchsecurity/feature/Top-10-types-of-information-security-threats-for-IT-teams
- https://www.infosectrain.com/blog/common-security-attacks-in-the-osi-layer-model/
- https://www.cisa.gov/sites/default/files/publications/infosecuritybasics.pdf
- https://kirkpatrickprice.com/blog/classifying-data/
- https://www.gov.hk/en/residents/communication/infosec/guidelines/cyberethics.htm
- https://www.guru99.com/cyber-security-interview-questions.html
- https://www.paloaltonetworks.com/cyberpedia/what-is-network-security
- https://www.metacompliance.com/blog/data-breaches/5-damaging-consequences-of-a-data-breach
- https://www.lbmc.com/blog/three-tenets-of-information-security/
- https://www.cloud4c.com/blogs/4cs-of-cloud-native-security-blog
- https://www.safetrac.com.au/most-common-breaches-in-ohs-practices/
- https://www.educause.edu/-/media/files/wiki-import/2014infosecurityguide/cybersecurity-awareness-resource-library/americanunivoitsecuritypdf
- https://www.datto.com/blog/common-types-of-cyber-security-attacks
- https://www.checkpoint.com/cyber-hub/cyber-security/what-is-cybersecurity/top-6-cybersecurity-threats/
- https://csrc.nist.gov/glossary/term/attack
- https://privacy.gov.ph/npc-circular-16-03-personal-data-breach-management/
- https://www.nicitpartner.com/six-types-cyber-attacks-protect/
- https://insights.integrity360.com/incident-or-breach
- https://www.nidirect.gov.uk/articles/breach-employment-contract
- https://www.compuquip.com/pp-back-to-cybersecurity-basics
- https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
- https://www.itgovernance.eu/blog/en/the-6-most-common-ways-data-breaches-occur
- https://www.also.com/ec/cms5/en_6000/6000/blog/future-technologies/the-best-tools-and-techniques-for-network-security.jsp
- https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-security
- https://en.wikipedia.org/wiki/Vulnerability
- https://www.cpisolutions.com/blog/security-breach-vs-data-breach/
- https://www.merriam-webster.com/dictionary/breach
- https://ualr.edu/safety/home/emergency-management-plan/threat-assessment-team/
- https://www.security.org/identity-theft/what-is-a-data-breach/
- https://purplesec.us/security-controls/
- https://www.packetlabs.net/posts/cryptography-attacks/
- https://www.strongdm.com/blog/aaa-security
- https://ermprotect.com/blog/external-vs-internal-cybersecurity-risks-know-difference/
- https://debricked.com/blog/what-is-security-threat/
- https://abc11.com/data-breach-password-stolen-social-security-number-hacked-identity/11033066/
- https://www.statista.com/statistics/184083/commonly-reported-types-of-cyber-crime-global/
- https://aag-it.com/the-latest-cyber-crime-statistics/
- https://www.veritas.com/information-center/the-seven-most-common-types-of-data-breaches-and-how-they-affect-your-business
- https://www.comparitech.com/blog/vpn-privacy/data-breach-statistics-facts/
- https://www.eeoc.net/blog/2020/march/4-types-of-contract-breaches-you-should-know-abo/
- https://www.techtarget.com/searchnetworking/tip/Top-3-network-security-threats-and-how-to-protect-against-them
- https://cybriant.com/prevent-security-breaches/
- https://www.rapid7.com/fundamentals/types-of-attacks/
- https://www.pencelawok.com/blog/four-types-of-damages-available-in-a-breach-of-contract/
- https://clearinsurance.com.au/10-biggest-cyber-attacks-in-history/
- https://www.sutcliffeinsurance.co.uk/news/8-most-common-causes-of-data-breach/
- https://millerlawpc.com/6-remedies-breach-of-contract/
- https://www.checkpoint.com/cyber-hub/threat-prevention/what-is-mobile-security/top-6-mobile-security-threats-and-how-to-prevent-them/
- https://www.coventry.ac.uk/gdpr-and-data-protection/personal-data-breaches/
- https://www.bristol.ac.uk/secretary/data-protection/data-breaches-and-incidents/
- https://www.crowdstrike.com/cybersecurity-101/malicious-code/
- https://www.upguard.com/blog/what-should-companies-do-after-a-data-breach
- https://www.first.org/
- https://www.techtarget.com/searchsecurity/definition/authentication-authorization-and-accounting
- https://www.healthcareitnews.com/news/there-are-6-cybersecurity-knowledge-areas-every-infosec-pro-must-master-nist-says
- https://www.tripwire.com/state-of-security/6-stages-of-network-intrusion-and-how-to-defend-against-them
- https://www.findlaw.com/smallbusiness/business-contracts-forms/breach-of-contract-and-lawsuits.html
- https://www.geeksforgeeks.org/active-and-passive-attacks-in-information-security/
- https://www.ftc.gov/legal-library/browse/rules/health-breach-notification-rule
- https://www.britannica.com/dictionary/breach
- https://www.trendmicro.com/vinfo/us/security/definition/data-breach
- https://info-savvy.com/top-5-key-elements-of-an-information-security/
- https://www.packetlabs.net/posts/7-common-data-breaches/
- https://7elements.global/7e-projects/
- https://en.wikipedia.org/wiki/Data_breach
- https://www.cisa.gov/news-events/news/4-things-you-can-do-keep-yourself-cyber-safe
- https://www.swierlaw.com/faqs/what-are-the-three-types-of-cyber-crimes-.cfm
- https://unstop.com/blog/difference-between-active-attack-and-passive-attack
- https://www.techtarget.com/searchsecurity/feature/A-list-of-wireless-network-attacks
- https://leagueoflegends.fandom.com/wiki/Basic_attack
- https://www.toppr.com/guides/business-laws/indian-contract-act-1872-part-ii/anticipatory-and-actual-breach-of-contract/
- https://www.dnv.com/article/the-three-pillar-approach-to-cyber-security-data-and-information-protection-165683
- https://securityscorecard.com/blog/what-is-cybersecurity-risk-factors-to-consider/
- https://www.tripwire.com/state-of-security/reexamining-laws-of-cybersecurity
- https://www.cimcor.com/blog/5-security-objectives-that-require-file-integrity-monitoring
- https://dl.acm.org/doi/10.1016/S0140-3664%2899%2900064-X
- https://www.unisys.com/glossary/what-is-cyber-attack/
- https://www.knowledgehut.com/blog/security/cyber-security-domains
- https://webdevolutions.blob.core.windows.net/blog/pdf/data-breach-vs-data-hack.pdf
- https://expertinsights.com/insights/the-top-5-biggest-cyber-security-threats-that-small-businesses-face-and-how-to-stop-them/
- https://safetyculture.com/topics/cyber-security/
- https://www.checkpoint.com/cyber-hub/network-security/what-is-network-security/
- https://www.edureka.co/blog/interview-questions/cybersecurity-interview-questions/
- https://www.cynet.com/network-attacks/network-attacks-and-network-security-threats/
- https://securityboulevard.com/2022/07/8-most-common-causes-of-a-data-breach/
- https://ico.org.uk/for-organisations/guide-to-data-protection/guide-to-the-general-data-protection-regulation-gdpr/personal-data-breaches/
- https://www.forcepoint.com/cyber-edu/network-attack
- https://hipaatrek.com/three-exceptions-hipaa-breach/
- https://cisomag.com/top-10-common-types-of-network-security-attacks-explained/
- https://hbr.org/2023/05/the-devastating-business-impacts-of-a-cyber-breach
- https://www.cisa.gov/stopransomware/general-information
- https://www.tutorialspoint.com/difference-between-threat-and-attack
- https://security.berkeley.edu/quick-links/report-security-incident
- https://www.aura.com/learn/what-to-do-after-a-data-breach
- https://www.techtarget.com/searchsecurity/feature/10-types-of-security-incidents-and-how-to-handle-them
- https://www.villanovau.com/resources/cybersecurity/breach-detection/
- https://edurev.in/question/1410250/Define-ethics-what-is-meant-by-ethics-
- https://csrc.nist.gov/glossary/term/active_attack
- https://www.rocketlawyer.com/gb/en/business/run-an-online-business/legal-guide/data-breach-reporting
- https://www.crowdstrike.com/cybersecurity-101/cyberattacks/most-common-types-of-cyberattacks/
- https://www.consumernotice.org/data-protection/breaches/biggest-in-history/
- https://www.checkpoint.com/cyber-hub/cyber-security/what-is-cybersecurity/
- https://blog.checkpoint.com/security/the-three-cs-of-best-security-comprehensive-consolidated-and-collaborative/
- https://www.logsign.com/blog/types-of-wireless-network-attacks/
- https://www.techtarget.com/whatis/definition/passive-attack
- https://ico.org.uk/for-organisations/report-a-breach/
- https://brainly.in/question/56186928
- https://www.graylog.org/post/cyber-security-understanding-the-5-phases-of-intrusion/
- https://www.ncsc.gov.uk/information/how-cyber-attacks-work
- https://www.theamegroup.com/network-security-threats/
- https://www.helpnetsecurity.com/2006/06/29/the-ten-most-critical-wireless-and-mobile-security-vulnerabilities/
- https://juro.com/learn/breach-of-contract
- https://www.nedigital.com/en/blog/data-breach-consequences
- https://www.mitnicksecurity.com/blog/common-hacking-techniques-2022
- https://www.stackscale.com/blog/osi-model/
- https://www.avast.com/c-what-is-security-breach
- https://www.checkpoint.com/cyber-hub/cyber-security/what-is-cyber-attack/types-of-cyber-attacks/
- https://www.encomputers.com/2021/05/what-is-a-network-security-breach/
- https://charlesreid1.com/wiki/Kali/Layer_5_Attacks
- https://www.crowdstrike.com/cybersecurity-101/incident-response/incident-response-steps/
- https://www.knowledgehut.com/blog/security/cyber-security-fundamentals
- https://www.nelsonslaw.co.uk/breach-contract-options/
- https://www.securingpeople.com/security-risk-assessment/threat-vulnerability-risk/
- https://www.checkpoint.com/cyber-hub/network-security/what-is-vpn/
- https://www.knowledgehut.com/blog/security/data-breach
- https://www.burnsandmosslaw.com/2020/12/09/partial-material-and-total-breach-of-contract-claims/
- https://www.securew2.com/blog/layer-2-attacks-that-defeat-psk-networks
- https://www.equifax.com.au/business-enterprise/what-security-breach-workplace
- https://wellawaresecurity.com/
- https://thrivedx.com/resources/article/4-damaging-data-breach-effects
- https://www.simplilearn.com/vulnerability-in-security-article
- https://thrivedx.com/resources/article/data-breach-types
- https://www.kaspersky.com/resource-center/definitions/data-breach
- https://lifelock.norton.com/learn/data-breaches/history-of-data-breaches
- https://www.gflesch.com/elevity-it-blog/ways-to-secure-a-computer-network
- http://www.gov.je/StayingSafe/BeSafeOnline/ProtectYourBusinessOnline/pages/10stepstocybersecurity.aspx
- https://www.gdrc.org/info-design/4-ethics.html
- https://www.itsasap.com/blog/security-incident-vs-breach
- https://www.itgovernance.eu/blog/en/the-most-common-causes-of-data-breaches-and-how-you-can-spot-them
- https://www.oaic.gov.au/privacy/privacy-guidance-for-organisations-and-government-agencies/preventing-preparing-for-and-responding-to-data-breaches/data-breach-preparation-and-response/part-3-responding-to-data-breaches-four-key-steps
- https://www.lepide.com/blog/the-15-most-common-types-of-cyber-attacks/
- https://www.synopsys.com/glossary/what-is-cyber-security.html
- https://www.securelockandalarm.com/2022/06/22/what-are-the-5-cs-of-cyber-security/
- https://www.checkpoint.com/cyber-hub/cyber-security/what-is-cybersecurity/biggest-cyber-security-challenges-in-2023/
- https://www.lepide.com/blog/how-to-perform-an-it-risk-assessment/
- https://www.simplilearn.com/tutorials/cyber-security-tutorial/types-of-cyber-attacks
- https://www.mass.gov/service-details/know-the-types-of-cyber-threats
- https://www.digitalguardian.com/blog/what-cyber-security
- https://www.codingninjas.com/codestudio/library/difference-between-active-and-passive-attacks
- https://www.bleepingcomputer.com/tag/data-breach/
- https://homework.study.com/explanation/what-are-the-three-types-of-risk-give-an-example-for-each.html
- https://www.lepide.com/blog/six-common-causes-of-data-breaches/
- https://www.ftc.gov/business-guidance/resources/data-breach-response-guide-business
- https://resourcecenter.infinit-o.com/blog/the-5-pillars-of-information-security-and-how-to-manage-them/
- https://www.ipc.on.ca/part-x-cyfsa/safeguarding-and-managing-personal-information/responding-to-privacy-breaches/
- https://www.igi-global.com/dictionary/ids-ips-systems-wireless-communication/32621
- https://blog.detection-technologies.com/the-four-elements-which-form-an-effective-security-system
- https://www.n-able.com/blog/types-of-security-breaches-and-how-to-prevent-them
- https://www.techtarget.com/searchsecurity/CyberResiliency/5-Key-Elements-of-a-Modern-Cybersecurity-Framework
- https://www.rocketlawyer.com/business-and-contracts/business-operations/contract-management/legal-guide/crash-course-four-types-of-contract-breaches
- https://www.sunnyvalley.io/docs/network-security-tutorials/what-is-active-attack
- https://byjus.com/free-ias-prep/cyber-security/
- https://www.ibm.com/topics/data-breach