Notice: This page requires JavaScript to function properly.
Please enable JavaScript in your browser settings or update your browser.
Learn Common Cyber Threats | Introduction to Cyber Security
Cybersecurity Fundamentals

bookCommon Cyber Threats

Before delving into cyber security techniques, it's essential to understand the threats we aim to counteract. Below is a list of the most prevalent cyber threats:

We will discover some of these threats in more detail in the next chapters.

question-icon

Match threats types with their descriptions:

Malware:
Phishing:

DDoS:

SQL Injection:

Click or drag`n`drop items and fill in the blanks

Everything was clear?

How can we improve it?

Thanks for your feedback!

SectionΒ 1. ChapterΒ 2

Ask AI

expand

Ask AI

ChatGPT

Ask anything or try one of the suggested questions to begin our chat

Suggested prompts:

Ask me questions about this topic

Summarize this chapter

Show real-world examples

Awesome!

Completion rate improved to 5

bookCommon Cyber Threats

Swipe to show menu

Before delving into cyber security techniques, it's essential to understand the threats we aim to counteract. Below is a list of the most prevalent cyber threats:

We will discover some of these threats in more detail in the next chapters.

question-icon

Match threats types with their descriptions:

Malware:
Phishing:

DDoS:

SQL Injection:

Click or drag`n`drop items and fill in the blanks

Everything was clear?

How can we improve it?

Thanks for your feedback!

SectionΒ 1. ChapterΒ 2
some-alt