• Types of cybersecurity attacks

    1. Phishing

    • Definition: A type of attack where cyber criminals trick you into providing personal information (like passwords) by pretending to be someone trustworthy, usually via email.
    • Example: An email from someone pretending to be your principal asking for your login information.

    2. Malware

    • Definition: Malicious software designed to harm or exploit your computer or network.
    • Types: Viruses, worms, spyware, and ransomware.
    • Example: Downloading a game that secretly installs software to steal your personal information.

    3. Ransomware

    • Definition: A type of malware that locks or encrypts your files and demands money (a ransom) to unlock them.
    • Example: A message that appears on your computer demanding money to regain access to your schoolwork.

    4. Denial-of-Service (DoS) Attacks

    • Definition: An attack where a website or network is overwhelmed with traffic, making it unavailable to users.
    • Example: A school website being flooded with fake traffic so students and staff can’t access it.

    5. Man-in-the-Middle (MitM) Attacks

    • Definition: When an attacker secretly intercepts and potentially alters communication between two parties.
    • Example: A hacker intercepting your connection while using public Wi-Fi, allowing them to steal your login details.

    6. Data Breaches

    • Definition: When sensitive information (like student records or staff data) is accessed without authorization.
    • Example: A hacker breaking into the school database and stealing student records.

    7. Password Attacks

    • Definition: Attempts to steal or guess a user’s password.
    • Example: Using common passwords like "password123" makes it easy for attackers to guess.

    8. SQL Injection

    • Definition: An attack where cybercriminals insert malicious code into a website’s database to steal or alter information.
    • Example: Exploiting a school’s website form to access and modify student grades.

    9. Zero-Day Exploits

    • Definition: Attacks that take advantage of software vulnerabilities that developers don’t know about yet.
    • Example: A hacker using a security flaw in a school’s learning management system before it gets fixed.

    10. Social Engineering

    • Definition: Manipulating people into divulging confidential information.
    • Example: A hacker pretending to be from the IT department asking for your password to “fix” an issue.