Document

Threat intelligence case studies: cyber attack types

Created:  06 Oct 2016
Updated:  06 Oct 2016
CPNI Archive

Archive content originally produced by CPNI that has not yet been absorbed into the new NCSC web pages.

Case studies of real-world incidents, to help you understand how attacks are conducted. Describing real events, they also help show the potential impact of attacks and the failures that lead to compromise.

You can use the attached PDFs to raise awareness, to illustrate the need for investment in security measures, and as training aids.

  • application layer attack
  • brute force attack
  • distributed denial of service (DDoS) attack
  • known vulnerability exploitation
  • network protocol attack
  • phishing for credentials
  • phishing with malware
  • rogue update attack
  • watering hole attack
  • zero day exploitation

MWR_Threat_Intelligence_Case Study_ALA.pdf

PDF, 69.2KB

This file may not be suitable for users of assistive technology.

MWR_Threat_Intelligence_Case Study_Bruteforce.pdf

PDF, 71.35KB

This file may not be suitable for users of assistive technology.

MWR_Threat_Intelligence_Case Study_DOS.pdf

PDF, 71.25KB

This file may not be suitable for users of assistive technology.

MWR_Threat_Intelligence_Case Study_Exploitation of Publically.pdf

PDF, 71.81KB

This file may not be suitable for users of assistive technology.

MWR_Threat_Intelligence_Case Study_Network Protocol Attack.pdf

PDF, 70.49KB

This file may not be suitable for users of assistive technology.

MWR_Threat_Intelligence_Case Study_Phishing for Credentials.pdf

PDF, 71.08KB

This file may not be suitable for users of assistive technology.

MWR_Threat_Intelligence_Case Study_Phishing with Malware.pdf

PDF, 72.49KB

This file may not be suitable for users of assistive technology.

MWR_Threat_Intelligence_Case Study_Rogue update.pdf

PDF, 71.09KB

This file may not be suitable for users of assistive technology.

MWR_Threat_Intelligence_Case Study_WHA.pdf

PDF, 71.95KB

This file may not be suitable for users of assistive technology.

MWR_Threat_Intelligence_Case Study_Exploitation of Novel.pdf

PDF, 70.67KB

This file may not be suitable for users of assistive technology.

Was this document helpful?

We need your feedback to improve this content.

Yes No