Advanced persistent threat (APT) attack:
A sophisticated cyberattack occurring over a prolonged period, during which an undetected attacker (or group) gains access to an enterprise’s network and data.
Botnet:
Derived from the term “robot network,” a botnet comprises a network of connected devices an attacker infects with malicious code and controls remotely.
DDoS attacks utilize botnets to overwhelm an organization’s website or application, resulting in a crash or a denial of service to valid users or visitors.
Drive-by download attack:
A malicious piece of code that automatically downloads onto a user’s device upon visiting a website, making that user vulnerable to further security threats.
Exploit kit:
A comprehensive set of tools that utilize exploits to detect vulnerabilities and infect devices with
malware.
The possibility that an organizational insider will exploit authorized access, intentionally or not, and harm or make vulnerable the organization’s systems, networks, and data.
Man-in-the-middle (MitM) attack:
A malicious attacker interrupts a line of communication or data transfer, impersonating a valid user, in order to steal information or data.
Phishing attacks impersonate legitimate organizations or users in order to steal information via email, text message, or other communication methods.
A malware extortion attack that encrypts an organization or person’s information, preventing access until a ransom is paid.
Social engineering:
Cyberattacks that originate with human interaction, in which the attacker gains a victim’s trust through baiting, scareware, or phishing, gathers personal information, and utilizes the information to carry out an attack.
Social media attack:
Cyberattacks that target social media platforms, exploiting the platforms as delivery mechanisms, or stealing user information and data.
Viruses and worms:
Malicious, undetected malware that can self-replicate across a user’s network or system.
Follow Microsoft Security