Denial-of-service (DoS) Attacks
Hackers flood a network with requests to exhaust bandwidth. In many cases, DoS attacks are meant to be more of a nuisance than anything else.
Man-in-the-middle (MitM) Attack
This attack happens when hackers insert themselves into a two-party communication. Once they’re in, they can steal data.
Phishing uses fake emails and text messages to get people to give hackers access to private information. It is one of the most regular attacks, especially against the general public.
This attack method is broken down into spyware, ransomware, worms, and viruses. Emails or downloads usually deliver these attacks from suspicious sites.
SQL Injection Attack
Hackers insert malicious code onto an SQL-using server, usually via a vulnerable website search box. Once carried out successfully, the attack lets the hacker see information otherwise kept off-limits.
Just what it sounds like. Hackers try to crack a password, usually a poorly chosen one and gain network entry.