Types of Cyber Attacks

Internal Security
Constitution VerifiedUPSC Verified
Version 1Updated 5 Mar 2026

Section 43 of the Information Technology Act, 2000 defines cyber contraventions as 'If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network accesses or secures access to such computer, computer system or computer network or downloads, copies or extracts any data, computer data base or information from such computer, comp…

Quick Summary

Cyber attacks represent malicious attempts to compromise computer systems, networks, or digital devices for various purposes including financial gain, espionage, or disruption. The primary categories include network-based attacks (DDoS, Man-in-the-Middle, DNS spoofing) that target communication infrastructure; application-layer attacks (SQL injection, XSS, zero-day exploits) that exploit software vulnerabilities; social engineering attacks (phishing, spear phishing, pretexting) that manipulate human psychology; physical attacks involving direct device access; insider threats from within organizations; and state-sponsored attacks representing sophisticated cyber warfare capabilities.

India faces increasing cyber threats due to rapid digitalization, with significant incidents including the 2016 debit card breach affecting 3.2 million cards and the 2022 AIIMS ransomware attack disrupting healthcare services.

The legal framework includes IT Act 2000 provisions (Sections 43, 66, 69, 70) and IPC sections covering fraud and forgery. CERT-In serves as the national incident response agency, while NCIIPC protects critical infrastructure.

Understanding these attack types is crucial for UPSC Internal Security as cyber threats increasingly impact national security, economic stability, and citizen welfare in digital India.

Vyyuha
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single.…
  • Network attacks: DDoS, MITM, DNS spoofing target infrastructure
  • Application attacks: SQL injection, XSS, zero-day exploit software vulnerabilities
  • Social engineering: Phishing, spear phishing, pretexting exploit human psychology
  • Physical attacks: USB drops, shoulder surfing require direct access
  • Insider threats: Malicious/negligent employees abuse legitimate access
  • State-sponsored: APTs conduct long-term espionage campaigns
  • Legal framework: IT Act Sections 43 (civil penalties), 66 (criminal), 69 (interception), 70 (protected systems)
  • Key institutions: CERT-In (incident response), NCIIPC (critical infrastructure)
  • Major incidents: 2016 debit card breach (3.2M affected), 2022 AIIMS ransomware

Vyyuha Quick Recall - SHIELD Framework for Cyber Attack Types: S - Social engineering attacks (phishing, spear phishing, pretexting) exploiting human psychology and trust relationships; H - Hardware and physical attacks (USB drops, shoulder surfing, tailgating) requiring direct access to systems or observation; I - Insider threats from malicious employees or negligent staff abusing legitimate access privileges; E - External network attacks (DDoS, Man-in-the-Middle, DNS spoofing) targeting communication infrastructure; L - Logic and application attacks (SQL injection, XSS, zero-day exploits) exploiting software vulnerabilities; D - Data breaches and state-sponsored espionage (APTs) conducting long-term intelligence gathering campaigns.

Memory aid: 'SHIELD protects against all cyber attack vectors' - each letter represents a major attack category that comprehensive cyber security must address.

Featured
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.
Ad Space
🎯PREP MANAGER
Your 6-Month Blueprint, Updated Nightly
AI analyses your progress every night. Wake up to a smarter plan. Every. Single. Day.