Types of Cyber Attacks — Security Framework
Security Framework
Cyber attacks represent malicious attempts to compromise computer systems, networks, or digital devices for various purposes including financial gain, espionage, or disruption. The primary categories include network-based attacks (DDoS, Man-in-the-Middle, DNS spoofing) that target communication infrastructure; application-layer attacks (SQL injection, XSS, zero-day exploits) that exploit software vulnerabilities; social engineering attacks (phishing, spear phishing, pretexting) that manipulate human psychology; physical attacks involving direct device access; insider threats from within organizations; and state-sponsored attacks representing sophisticated cyber warfare capabilities.
India faces increasing cyber threats due to rapid digitalization, with significant incidents including the 2016 debit card breach affecting 3.2 million cards and the 2022 AIIMS ransomware attack disrupting healthcare services.
The legal framework includes IT Act 2000 provisions (Sections 43, 66, 69, 70) and IPC sections covering fraud and forgery. CERT-In serves as the national incident response agency, while NCIIPC protects critical infrastructure.
Understanding these attack types is crucial for UPSC Internal Security as cyber threats increasingly impact national security, economic stability, and citizen welfare in digital India.
Important Differences
vs Advanced Persistent Threats
| Aspect | This Topic | Advanced Persistent Threats |
|---|---|---|
| Scope | Broad classification covering all malicious cyber activities | Specific category of sophisticated, long-term targeted attacks |
| Duration | Can be one-time attacks or ongoing campaigns | Characterized by persistent, long-term presence in target networks |
| Sophistication | Ranges from simple phishing to complex state-sponsored operations | Always highly sophisticated with custom tools and techniques |
| Attribution | Can be criminal, hacktivist, or state-sponsored | Typically associated with nation-state actors or advanced criminal groups |
| Detection | Detection difficulty varies by attack type and sophistication | Specifically designed to evade detection through advanced techniques |
vs Ransomware and Malware
| Aspect | This Topic | Ransomware and Malware |
|---|---|---|
| Classification | Comprehensive taxonomy including all attack vectors and methods | Specific category of malicious software with defined characteristics |
| Delivery Method | Multiple vectors including social engineering, network attacks, physical access | Primarily delivered through email attachments, malicious websites, or network propagation |
| Objective | Varied objectives including espionage, disruption, financial gain, or demonstration | Primarily financial extortion through data encryption and ransom demands |
| Impact Timeline | Can have immediate or long-term impacts depending on attack type | Immediate impact through data encryption, with ongoing effects until resolution |
| Recovery Approach | Recovery methods vary significantly based on attack type and damage | Specific recovery procedures involving backup restoration or ransom payment decisions |