Content deleted Content added
Evacapperson (talk | contribs) mNo edit summary Tags: Reverted Visual edit |
Reverted 1 edit by Evacapperson (talk): Does not seem to correspond to anything written in the article |
||
Line 22:
Normal internet users are most likely to be affected by untargeted cyberattacks.<ref name="Cyber attacks">{{Cite web |title=How cyber attacks work |url=https://www.ncsc.gov.uk/information/how-cyber-attacks-work |access-date=2023-11-30 |website=www.ncsc.gov.uk |language=en}}</ref> These are where attackers indiscriminately target as many devices, services, or users as possible. They do this using techniques that take advantage of the openness of the Internet. These strategies mostly include [[phishing]], [[ransomware]], [[Watering hole attack|water holing]] and scanning.<ref name="Cyber attacks" />
To secure a computer system, it is important to understand the attacks that can be made against it, and these [[threat (computer)|threats]] can typically be classified into one of the following categories:
|