What is a Cyberattack? Types & Methods

Share on facebook
Share on google
Share on twitter
Share on linkedin
May 28, 2020

What is a Cyberattack?

When speaking of cybersecurity and meeting compliance standards, it is equally important to define and discuss cyberattacks. A cyberattack is generally defined as the use of computers and/or networks to attack other computers and/or networks. The attack can be targeted against the computer, the network it operates within, information management systems, data systems, and more. The attack can take a myriad of forms and as technology evolves, so, too, do the attacks. Below is a summary of some of the common forms of cyberattacks.

Types and Methods of Cyberattack

The term ‘cyberattack’ often evokes an image of hackers sitting in a dark room doing nefarious things, but an attack can be launched by not just individuals, but also criminal organizations and, even, states. Here are 3 common types of cyberattack:


Depending on your email’s junk folder settings, you will most likely have come across phishing attacks. Often, phishing occurs when you receive an email with a harmful link. For example, you can receive a fake email from a service you subscribe to, letting you know that there is something wrong with your account information. The link sends you to a website, masquerading as the genuine one, which requires you to provide your username and password. However, your information has now been sent to the criminal. This is just one of the ways phishing can be done.


Man-in-the-middle (MitM) attacks occur by having the attacker in between different users or a user and their intended service, thereby giving the attacker access to the user’s information. MitM attacks can take many different forms and can be quite complex. In some situations, the attacker may just want to steal the information the user is inputting into the service, or it may actively affect the user’s experience.

Denial of Service

incident response teamThis type of cyberattack(Denial of Service) aims to disrupt the normal operations of a network or online provider. The attacker either floods the service or crashes it. Flooding occurs by having so much traffic sent to a service that it eventually is unable to cater to genuine users. The users are then denied the service.

While this post briefly explained three common types of cyberattacks, there are many more attacks out there in the world. At CDG, we want to help you and your organization stay safe and secure. If you are experiencing a cyber incident and need an emergency incident response, please contact us today to find out more information.

CDG Team

CDG Team

About CDG

Cyber Defense Group (CDG) is a focused cyber security specialist that provides maximum defense using exceptional knowledge and the most advanced technology against today’s advanced threats.

Subscribe to CDG Blogs

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Recent Articles

Incident Response

If you have been the victim of a cyber attack, contact us right now.