0
0
Cybersecurityknowledge~10 mins

Types of cyber threats in Cybersecurity - Step-by-Step Execution

Choose your learning style9 modes available
Concept Flow - Types of cyber threats
Start: User or System
Threat Appears
Threat Action on System
Damage or Data Loss
Detection and Response
System Recovery or Protection
End
This flow shows how a cyber threat appears, is identified by type, acts on the system, causes damage, and then is detected and responded to.
Execution Sample
Cybersecurity
Threats = ["Malware", "Phishing", "Ransomware", "DoS", "MitM", "SQL Injection"]
for threat in Threats:
    print(f"Detected threat type: {threat}")
This code lists common cyber threat types and prints each one as detected.
Analysis Table
StepThreat TypeActionResult
1MalwareInfects system filesSystem compromised or slowed
2PhishingTricks user to reveal infoUser credentials stolen
3RansomwareEncrypts files for ransomFiles inaccessible until paid
4DoSOverloads networkService unavailable
5MitMIntercepts communicationData intercepted or altered
6SQL InjectionInjects malicious codeDatabase data stolen or corrupted
7EndNo more threatsSystem needs recovery or protection
💡 All common cyber threats have been identified and their actions described.
State Tracker
Threat TypeBefore ActionAfter Action
MalwareSystem normalSystem infected
PhishingUser unawareUser credentials stolen
RansomwareFiles accessibleFiles encrypted
DoSService availableService down
MitMCommunication secureCommunication intercepted
SQL InjectionDatabase safeDatabase compromised
Key Insights - 3 Insights
Why does ransomware make files inaccessible?
Ransomware encrypts files, meaning it locks them with a secret code. Until the code is removed (usually by paying ransom), files cannot be opened. This is shown in execution_table step 3.
How does phishing steal user credentials?
Phishing tricks users into giving their information by pretending to be a trustworthy source. This is a social trick, not a technical hack, as shown in execution_table step 2.
What happens during a Denial of Service (DoS) attack?
DoS floods the network or service with too many requests, making it unable to respond to real users. This causes service downtime, as shown in execution_table step 4.
Visual Quiz - 3 Questions
Test your understanding
Look at the execution_table at step 5. What does a Man-in-the-Middle attack do?
AEncrypts files for ransom
BOverloads the network with traffic
CIntercepts communication between parties
DTricks users into giving passwords
💡 Hint
Refer to execution_table row with Step 5 describing MitM action.
At which step does the system become unavailable due to network overload?
AStep 2
BStep 4
CStep 6
DStep 3
💡 Hint
Check execution_table for DoS attack causing service unavailability.
If phishing was removed from the list, how would variable_tracker change?
AUser credentials would remain safe
BFiles would be encrypted
CNetwork would be overloaded
DDatabase would be corrupted
💡 Hint
Look at variable_tracker row for Phishing showing user credentials stolen.
Concept Snapshot
Types of Cyber Threats:
- Malware: Infects and damages system
- Phishing: Tricks users to steal info
- Ransomware: Encrypts files for ransom
- DoS: Overloads network to block access
- MitM: Intercepts communication
- SQL Injection: Attacks databases
Each threat acts differently but harms security.
Full Transcript
This visual execution shows common types of cyber threats. The flow starts with a threat appearing, identifying its type such as malware or phishing, then acting on the system causing damage like data loss or service downtime. The execution table lists each threat type, its action, and result step-by-step. The variable tracker shows system state before and after each threat acts. Key moments clarify common confusions like how ransomware encrypts files or how phishing steals credentials. The quiz tests understanding by asking about specific steps and effects. This helps learners see how different cyber threats work and affect systems.