Denial of Service

A Denial of Service (DoS) attack aims at the availability of a service, website or network. By disrupting or suspending normal data flow, the system is rendered unavailable. Amplifying this …

Privilege Misuse

Privilege Misuse

The misuse of ones privileges is an intentional, malicious attack pattern. Most of the data breaches in 2021 in this category were caused by privilege abuse or data mishandling. They …

Human Error

Unintentional actions are among the most common patterns in information security incidents. Miscellaneous errors of employees can directly compromise assets of an organization and lead to data breaches. According to …

System Intrusion

System Intrusion happens in an early phase of a cyber attack (Figure 1). It usually starts after attackers have collected enough data about the target and assembled tactics for their …

Social Engineering

Social Engineering

In social engineering, an attacker exploits the “human factor” as the supposed weakest link in the information security chain in order to accomplish his criminal intent. SECURNITE explains what Social Engineering is.