1 00:00:00,120 --> 00:00:06,090 Before getting started with cyber attacks, firstly, we need to understand the term cyber attacks and 2 00:00:06,090 --> 00:00:07,890 the purpose of cyber attacks. 3 00:00:08,940 --> 00:00:15,510 A cyber attack is any type of offensive action that target computer system, infrastructure, computer 4 00:00:15,510 --> 00:00:22,830 networks or professional computer devices by using various methods to steal or destroy data or information 5 00:00:22,830 --> 00:00:23,310 systems. 6 00:00:24,150 --> 00:00:27,250 I know it is quite difficult to understand in the first attempt. 7 00:00:27,570 --> 00:00:29,280 Let me explain in simple words. 8 00:00:29,820 --> 00:00:36,270 A cyber attack is a malicious and deliberate attempt by an individual or organization to breach the 9 00:00:36,270 --> 00:00:39,620 information system of another individual or organization. 10 00:00:39,930 --> 00:00:45,300 Usually the attacker seek some type of benefits from distributing the victims network. 11 00:00:46,150 --> 00:00:53,100 A cyberattack is also known as a computer network attack C and A, if you have ever studied it much 12 00:00:53,140 --> 00:00:55,930 metal in history, you will know that No. 13 00:00:55,930 --> 00:00:57,370 Two are exactly alike. 14 00:00:57,740 --> 00:01:03,940 Still, there are similar strategies and tactics often used in battle because they are proven to be 15 00:01:03,940 --> 00:01:04,590 effective. 16 00:01:05,610 --> 00:01:12,330 Similarly, when a criminal is trying to hack an organization, they want to reinvent the wheel unless 17 00:01:12,330 --> 00:01:13,570 they absolutely have to. 18 00:01:14,070 --> 00:01:19,830 They will draw upon common types of hacking techniques that are known to be highly effective, such 19 00:01:19,830 --> 00:01:23,240 as malware, phishing or crosseyed scripting, etc.. 20 00:01:23,700 --> 00:01:29,520 Upcoming videos are the overview of some of the most common types of cyberattacks into today.