1. Denial-of-service: This is also called as DoS-attacks. Its intended purpose is to make a service or a website unavailable to its users. This indicates an attack that prevents proper functioning of authorised networks and prevents impairs of systems by exhausting resources. This can impact prevention of access of authorised websites by users, completing a transaction successfully, or even lead to shutdown of a governmentâs website. A critical impact of this is also seen on medical and emergency system communications or even traffic control.
2. Malware, worms, and Trojan horses: These are the most common forms of virus attacks. These spread instantly by malicious websites, spam emails, infected websites and more. If you do not have a good anti virus system installed in your machine. Some websites will automatically download malware without your knowledge. This is known as ‘drive-by-download’. If you have a good anti virus installed, then these websites will be stopped from doing any harm to your machine. And even if any malware or virus gets downloaded, the anti virus will remove it safely.
3. Botnets and zombies: A ‘bot’, short for robot, is a type of software application or script that performs tasks on command like indexing a search engine. The compromised computers are known as zombies. They are good at repeating the tasks. These can spread to newer machines when users have less technical knowledge. Botnets are designed to steal data. Their encryption capabilities have improved and thus it is now getting more and more difficult to detect botnets successfully.
4. Social Network Attacks: Millions of users are constantly accessing social networking sites. Volumes of personal data is stored here and hackers find this an easy target. Many websites have found ways to ensure that a person logging into an account is a human and the account owner. Yet, sometimes hackers find their way out to hack accounts that are not fully secured.
As a user, it becomes important for everyone to be extra aware and careful when storing data on web or while following any new links or websites. On part of website owners, you must ensure utmost security for users and make cyber security as one of the top 5 priorities while creating the website and engaging with the users on your website. Government has also started taking special initiatives to spread awareness about cyber crime. www.cybersecurityu.org is a website where users can read more about government initiatives.
There are many career opportunities in as well, for people who are interested in technology or have much knowledge about it. Helping crack cyber crime cases and its investigation, is a great career path to choose, for people interested in working in the cyber cell. www.cybersecurityu.org also lists all the job roles that this field has for aspirers.

