8 Serangan Siber Tertinggi - 2024

  1. Phising Attack - The use of deceptive emails, texts, or websites to gain sensitive information.
  2. Ransomware - Malware that can encrypt data and make you pay to get them back.
  3. Denial-of-Service (DoS) - Loading excessive load on a machine or network so that it stops working normally.
  4. Man-in-the-Middle (MitM) - Engaging in covert interception and manipulation of communication between two parties without noticing it.
  5. SQL Injection - To get the access to the database, Vulnerabilities in Database queries can be exploited.
  6. Cross-Site-Scripting (XSS) - Putting malicious code into websites that other people visit.
  7. Zero-Day Exploits - Attacks take advantage of unknown vulnerabilities before programmers can fix them.
  8. DNS Spoofing - Sending DNS queries to malicious sites so that they can be accessed without permission.

Keywords: Sustainable Development Goals (SDG) 9, Industry, Innovation.

Comments :