- Clint Independent School District
- Cybersecurity
Technology and Information Services
Page Navigation
- TIS Tech Team
- Student Information Services (PEIMS)
- Infrastructure Services
- Enterprise Information Services
- Instructional Technology Services
- Technical Assistance Center (FKA HelpDesk)
- Technical Services
- Technology Quote Request Form
- Cybersecurity
- Incident IQ
- WIFI Hotspots
- Multi-Factor Authentication
- Google 2-Step Verification
- Change Password
- Organizational Chart
- S2Q (Skyward SMS 2.0 to Qmlativ)
- Internet Safety Plan
- Technical Documentation
-
Types of cybersecurity attacks
1. Phishing
- Definition: A type of attack where cyber criminals trick you into providing personal information (like passwords) by pretending to be someone trustworthy, usually via email.
- Example: An email from someone pretending to be your principal asking for your login information.
2. Malware
- Definition: Malicious software designed to harm or exploit your computer or network.
- Types: Viruses, worms, spyware, and ransomware.
- Example: Downloading a game that secretly installs software to steal your personal information.
3. Ransomware
- Definition: A type of malware that locks or encrypts your files and demands money (a ransom) to unlock them.
- Example: A message that appears on your computer demanding money to regain access to your schoolwork.
4. Denial-of-Service (DoS) Attacks
- Definition: An attack where a website or network is overwhelmed with traffic, making it unavailable to users.
- Example: A school website being flooded with fake traffic so students and staff can’t access it.
5. Man-in-the-Middle (MitM) Attacks
- Definition: When an attacker secretly intercepts and potentially alters communication between two parties.
- Example: A hacker intercepting your connection while using public Wi-Fi, allowing them to steal your login details.
6. Data Breaches
- Definition: When sensitive information (like student records or staff data) is accessed without authorization.
- Example: A hacker breaking into the school database and stealing student records.
7. Password Attacks
- Definition: Attempts to steal or guess a user’s password.
- Example: Using common passwords like "password123" makes it easy for attackers to guess.
8. SQL Injection
- Definition: An attack where cybercriminals insert malicious code into a website’s database to steal or alter information.
- Example: Exploiting a school’s website form to access and modify student grades.
9. Zero-Day Exploits
- Definition: Attacks that take advantage of software vulnerabilities that developers don’t know about yet.
- Example: A hacker using a security flaw in a school’s learning management system before it gets fixed.
10. Social Engineering
- Definition: Manipulating people into divulging confidential information.
- Example: A hacker pretending to be from the IT department asking for your password to “fix” an issue.