SlideShare a Scribd company logo
COMMON CYBER
ATTACK VECTORS
Fraudulent attempts to obtain
Fraudulent attempts to obtain
sensitive information by disguising as
sensitive information by disguising as
a trustworthy entity via email, text, or
a trustworthy entity via email, text, or
social media.
social media.
Inserting malicious SQL code into a
Inserting malicious SQL code into a
database query to manipulate or extract
database query to manipulate or extract
information.
information.
PHISHING ATTACKS
MALWARE (VIRUSES, WORMS,
RANSOMWARE, SPYWARE, ADWARE)
Malicious software designed to disrupt,
Malicious software designed to disrupt,
damage, or gain unauthorized access to
damage, or gain unauthorized access to
computer systems.
computer systems.
SOCIAL ENGINEERING
Manipulating individuals into divulging
Manipulating individuals into divulging
confidential information, often by
confidential information, often by
exploiting human psychology.
exploiting human psychology.
MAN-IN-THE-MIDDLE (MITM) ATTACKS
Intercepting and altering communications
Intercepting and altering communications
between two parties without their knowledge.
between two parties without their knowledge.
SQL INJECTION (SQLI)
Overloading a network, server, or
Overloading a network, server, or
website with traffic to make it
website with traffic to make it
unavailable to users.
unavailable to users.
Employees or contractors who misuse
Employees or contractors who misuse
their access to compromise security
their access to compromise security
intentionally or unintentionally.
intentionally or unintentionally.
DISTRIBUTED DENIAL OF SERVICE
(DDOS) ATTACKS
ZERO-DAY EXPLOITS
Attacking vulnerabilities that are unknown
Attacking vulnerabilities that are unknown
to the software vendor or unpatched.
to the software vendor or unpatched.
PASSWORD ATTACKS (BRUTE FORCE,
DICTIONARY ATTACKS, CREDENTIAL
STUFFING)
Attempting to gain unauthorized access
Attempting to gain unauthorized access
by cracking or guessing passwords.
by cracking or guessing passwords.
CROSS-SITE SCRIPTING (XSS)
Injecting malicious scripts into web
Injecting malicious scripts into web
applications to execute code in another
applications to execute code in another
user's browser.
user's browser.
INSIDER THREATS
DRIVE-BY DOWNLOADS
Unintended download of malicious
Unintended download of malicious
software when visiting a compromised
software when visiting a compromised
website.
website.
Poorly configured cloud environments
Poorly configured cloud environments
that expose sensitive data to the
that expose sensitive data to the
internet.
internet.
CLOUD MISCONFIGURATION
IOT VULNERABILITIES
Exploiting weak security in Internet of
Exploiting weak security in Internet of
Things (IoT) devices to gain network
Things (IoT) devices to gain network
access.
access.
Ready to secure your
business?
Take a free cybersecurity posture assessment today
Take a free cybersecurity posture assessment today
and discover vulnerabilities before cybercriminals do.
and discover vulnerabilities before cybercriminals do.
visit: www.securitytapestry.com/contact-us

More Related Content

PPTX
cyber threats introduction and cyber threats types
PPTX
Cybersecurity Training
PPTX
types of cyber attack by taufiqurrahman.pptx
PDF
Guarding the Digital Fortress.pdf
PDF
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
PPTX
cyber security
PPTX
basics of hacking- threat basics, types of attack
PDF
Understanding about Cybersecurity Threats
cyber threats introduction and cyber threats types
Cybersecurity Training
types of cyber attack by taufiqurrahman.pptx
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
cyber security
basics of hacking- threat basics, types of attack
Understanding about Cybersecurity Threats

Similar to Common Cyber Attack Vectors(Infographic).pdf (20)

PDF
Information Systems Audit - Auditing Information Systems
PPTX
Cybersecurity Threats and Cybersecurity Best Practices
PPTX
PPTX
Malware attack Social engineering attack
PPTX
week2-cybersecurityOverview of social engineering attacks.pptx
PPTX
cyber threats and attacks.pptx
PPTX
Health information security 3 vulnerability threat and risk
PPTX
Cyber.pptx
PDF
cyber security
PDF
Cyber Security Whitepaper 2018 | vTech Solution
PPTX
Lecture 3.pptx
PPTX
Cyber security
PDF
SAMPLE ATTACKS PRESENTATION.pdf
PPTX
Cybersecurity Attack Vectors: How to Protect Your Organization
PDF
Cyber Security.pdf
PDF
securityattackvectorsslidesharefinal-160405191759.pdf
PPTX
COMPUTER APPLICATIONS Module 4.pptx
PPTX
cyber security.pptx
PDF
Threats, Threat Modeling and Analysis
PPTX
Topic – cyber security, Introduction,future scope
Information Systems Audit - Auditing Information Systems
Cybersecurity Threats and Cybersecurity Best Practices
Malware attack Social engineering attack
week2-cybersecurityOverview of social engineering attacks.pptx
cyber threats and attacks.pptx
Health information security 3 vulnerability threat and risk
Cyber.pptx
cyber security
Cyber Security Whitepaper 2018 | vTech Solution
Lecture 3.pptx
Cyber security
SAMPLE ATTACKS PRESENTATION.pdf
Cybersecurity Attack Vectors: How to Protect Your Organization
Cyber Security.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
COMPUTER APPLICATIONS Module 4.pptx
cyber security.pptx
Threats, Threat Modeling and Analysis
Topic – cyber security, Introduction,future scope
Ad

More from johnlocke165764 (6)

PDF
What is Threat Hunting and Why Every SME Should Care
PDF
How to Respond to a Cyberattack - A Step by Step Guide for Business Leaders
PDF
How to Build a Cybersecurity Culture in Your Organization
PDF
The Importance of Cybersecurity Training for Employees.pdf
PDF
The Importance of Vulnerability Management for SMEs.pdf
PDF
5 Signs your business needs a managed SOC..pdf
What is Threat Hunting and Why Every SME Should Care
How to Respond to a Cyberattack - A Step by Step Guide for Business Leaders
How to Build a Cybersecurity Culture in Your Organization
The Importance of Cybersecurity Training for Employees.pdf
The Importance of Vulnerability Management for SMEs.pdf
5 Signs your business needs a managed SOC..pdf
Ad

Recently uploaded (20)

PPTX
Probability Distribution, binomial distribution, poisson distribution
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PDF
Nidhal Samdaie CV - International Business Consultant
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
MSPs in 10 Words - Created by US MSP Network
PPTX
Business Ethics - An introduction and its overview.pptx
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
How to Get Funding for Your Trucking Business
DOCX
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
PPTX
Amazon (Business Studies) management studies
PDF
Deliverable file - Regulatory guideline analysis.pdf
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
DOCX
Business Management - unit 1 and 2
PDF
Laughter Yoga Basic Learning Workshop Manual
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PDF
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf
Probability Distribution, binomial distribution, poisson distribution
ICG2025_ICG 6th steering committee 30-8-24.pptx
Nidhal Samdaie CV - International Business Consultant
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
MSPs in 10 Words - Created by US MSP Network
Business Ethics - An introduction and its overview.pptx
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
Chapter 5_Foreign Exchange Market in .pdf
How to Get Funding for Your Trucking Business
unit 2 cost accounting- Tender and Quotation & Reconciliation Statement
Amazon (Business Studies) management studies
Deliverable file - Regulatory guideline analysis.pdf
Ôn tập tiếng anh trong kinh doanh nâng cao
Belch_12e_PPT_Ch18_Accessible_university.pptx
Business Management - unit 1 and 2
Laughter Yoga Basic Learning Workshop Manual
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
COST SHEET- Tender and Quotation unit 2.pdf
20250805_A. Stotz All Weather Strategy - Performance review July 2025.pdf

Common Cyber Attack Vectors(Infographic).pdf

  • 1. COMMON CYBER ATTACK VECTORS Fraudulent attempts to obtain Fraudulent attempts to obtain sensitive information by disguising as sensitive information by disguising as a trustworthy entity via email, text, or a trustworthy entity via email, text, or social media. social media. Inserting malicious SQL code into a Inserting malicious SQL code into a database query to manipulate or extract database query to manipulate or extract information. information. PHISHING ATTACKS MALWARE (VIRUSES, WORMS, RANSOMWARE, SPYWARE, ADWARE) Malicious software designed to disrupt, Malicious software designed to disrupt, damage, or gain unauthorized access to damage, or gain unauthorized access to computer systems. computer systems. SOCIAL ENGINEERING Manipulating individuals into divulging Manipulating individuals into divulging confidential information, often by confidential information, often by exploiting human psychology. exploiting human psychology. MAN-IN-THE-MIDDLE (MITM) ATTACKS Intercepting and altering communications Intercepting and altering communications between two parties without their knowledge. between two parties without their knowledge. SQL INJECTION (SQLI)
  • 2. Overloading a network, server, or Overloading a network, server, or website with traffic to make it website with traffic to make it unavailable to users. unavailable to users. Employees or contractors who misuse Employees or contractors who misuse their access to compromise security their access to compromise security intentionally or unintentionally. intentionally or unintentionally. DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACKS ZERO-DAY EXPLOITS Attacking vulnerabilities that are unknown Attacking vulnerabilities that are unknown to the software vendor or unpatched. to the software vendor or unpatched. PASSWORD ATTACKS (BRUTE FORCE, DICTIONARY ATTACKS, CREDENTIAL STUFFING) Attempting to gain unauthorized access Attempting to gain unauthorized access by cracking or guessing passwords. by cracking or guessing passwords. CROSS-SITE SCRIPTING (XSS) Injecting malicious scripts into web Injecting malicious scripts into web applications to execute code in another applications to execute code in another user's browser. user's browser. INSIDER THREATS DRIVE-BY DOWNLOADS Unintended download of malicious Unintended download of malicious software when visiting a compromised software when visiting a compromised website. website.
  • 3. Poorly configured cloud environments Poorly configured cloud environments that expose sensitive data to the that expose sensitive data to the internet. internet. CLOUD MISCONFIGURATION IOT VULNERABILITIES Exploiting weak security in Internet of Exploiting weak security in Internet of Things (IoT) devices to gain network Things (IoT) devices to gain network access. access. Ready to secure your business? Take a free cybersecurity posture assessment today Take a free cybersecurity posture assessment today and discover vulnerabilities before cybercriminals do. and discover vulnerabilities before cybercriminals do. visit: www.securitytapestry.com/contact-us