1 00:00:01,760 --> 00:00:06,530 Cybersecurity attacks, no, we have to put the brute force attack. 2 00:00:07,400 --> 00:00:13,280 A brute force attack uses trial and error to guess login information, encryption keys or find a hidden 3 00:00:13,280 --> 00:00:17,750 Web page, hackers work through all possible combinations, hoping to get security. 4 00:00:19,350 --> 00:00:25,680 These attacks are done by brute force, meaning they use excessive force for an attempt to try and force 5 00:00:25,680 --> 00:00:27,600 their way into your private accounts. 6 00:00:29,290 --> 00:00:35,200 Phishing attacks, not what is a type of social engineering attack, often used to steal user data, 7 00:00:35,230 --> 00:00:37,810 including login credentials and credit card numbers. 8 00:00:38,230 --> 00:00:45,820 It occurs when an attacker makes a victim to click a malicious link in email, instant message or text 9 00:00:45,820 --> 00:00:52,120 message, which can lead to the installation of malware freezing the system as part of a ransomware 10 00:00:52,120 --> 00:00:55,300 attack or revealing of sensitive information. 11 00:00:55,480 --> 00:00:58,810 Now, malware, it is malicious software and the ransomware. 12 00:00:58,960 --> 00:01:07,480 Actually, this type of the malware, it is used to encrypt all of the system data and you need to pay 13 00:01:07,480 --> 00:01:07,870 money. 14 00:01:08,470 --> 00:01:15,310 So to get that in the decryption key, we will talk about this later on Noailles. 15 00:01:16,690 --> 00:01:23,440 Bots and buttons, but it is a collection of Internet connected devices infected by malware, and it 16 00:01:23,440 --> 00:01:30,010 is called the but so the boat is a single device and botnet is about networks. 17 00:01:30,280 --> 00:01:38,170 OK, so that allow hackers to control the cyber criminals, use botnet to instigate botnet attacks, 18 00:01:38,170 --> 00:01:44,050 which include malicious activities such as credentialled leaks and unauthorized access, data theft. 19 00:01:44,050 --> 00:01:45,360 And they do attacks. 20 00:01:45,370 --> 00:01:49,810 And these are the most important one, actually, the denial of service attacks. 21 00:01:50,740 --> 00:01:57,220 Now it's time to talk about the US or between us, and the difference is that the U.S. attack floods 22 00:01:57,220 --> 00:02:03,760 a server with traffic making a website or resource and available, that the OS, which is the distributed 23 00:02:03,760 --> 00:02:10,360 denial of service, is a device attack that uses multiple computers or machines to float a targeted 24 00:02:10,570 --> 00:02:11,010 response. 25 00:02:11,260 --> 00:02:16,570 So the only difference between them, the US, is that it is a single computer or a single machine. 26 00:02:16,900 --> 00:02:19,450 The device which is distributed. 27 00:02:19,930 --> 00:02:22,000 We use multiple computers or machines. 28 00:02:23,030 --> 00:02:24,320 Many of the media ethics. 29 00:02:26,000 --> 00:02:33,950 It is attack when an attacker intercept communications between two parties either to secretly eavesdrop 30 00:02:33,950 --> 00:02:36,800 or modify traffic travelling between the two. 31 00:02:37,790 --> 00:02:43,730 And attackers might use many of the attacks to steal login credentials or personal information, spy 32 00:02:43,730 --> 00:02:47,600 on the victim or several communications or corrupt data. 33 00:02:48,700 --> 00:02:55,510 We have asked you injections, the extra injection is a good injection technique that might destroy 34 00:02:55,510 --> 00:03:01,450 your database, and it is one of the most common with packing technologies, and it is the placement 35 00:03:01,450 --> 00:03:05,020 of malicious code Enescu and statements via warpage in what?