Cyber Attacks
The 4 main types are computer viruses, worms, trojan horses, and ransomware
Malware
Check Point
make a machine or network resource unavailable
Denial-of-Service (DoS) Attacks
leading cybersecurity company
Palo Alto Networks
scam where attackers deceive people into revealing information
Phishing
Looks like fortnite
Fortinet
when someone or something pretends to be something else in an attempt to gain access to system
Spoofing
Best to for end user data security
Proofpoint
credentials for malicious access
Identity-Based Attacks
best for AI-powered security
dark trace