I am going to create a series of blogs on the security and type of attack. Here is just a heads-up.
Today’s world cybersecurity involves protecting financial and non financial information and systems from major cyberthreats, such as cyber terrorism, cyber warfare, and cyber espionage.
In their most disruptive form, cyberthreats take aim at secret, political, military, or infrastructural assets of a institution, nation, or its people. Cybersecurity is critical part of any institutions’ security strategy.
Cyber terrorism, which involves crimes of terrorism that occur electronically. These crimes occur against individuals, businesses, organizations, and against the government itself.
Our lives are accessible electronically now, from our social details on a job application, to our bank account, to medical records and more.
With the greater convenience of using technology, we trade off some degree of security since it’s very difficult to stop every instance of cyber terrorism. Consider for a moment, how much of our own private information could a hacker potentially find online about our life? Who or what protects us against theft or other crimes related to our personal data?
Cyber spying is the act of engaging in an attack or series of attacks that let an unauthorized user or users view classified/protected material.
These attacks are often subtle, amounting to nothing more than an unnoticed bit of code or process running in the background of a mainframe or personal workstation, and the target is usually a personal, institution or government entity.
The goal is typically to acquire intellectual property or government secrets. Attacks can be motivated by greed or profit, and can be used in conjunction with a military operation or as an act of terrorism. Consequences can range from loss of competitive advantage to loss of materials, data, infrastructure, or loss of life.
Cyber espionage is very common and prominent also. Current attacks of WannaCry, Petya are recent attacks which infected millions of devices across the world. Let’s understand some of the attack type which can cause damage to any institution, country and individuals.
A cyberattack is deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyberattack uses malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft.
Cyberattacks may include the following consequences:
- Identity theft, fraud, extortion
- Malware, pharming, phishing, spamming, spoofing, spyware, Trojans and viruses
- Stolen hardware, such as laptops or mobile devices
- Denial-of-service and distributed denial-of-service attacks
- Breach of access
- Password sniffing
- System infiltration
- Website defacement
- Private and public Web browser exploits
- Instant messaging abuse
- Intellectual property (IP) theft or unauthorized access
It is not limited to above list, but it can be much more than this. On daily basis hackers uses far more advance technologies and methods than what we think normally.
Mainly there are two main categories of attacks which cause damage.
- Internal Attacks
- External Attacks
These attacks may be active and passive in nature. Active attacks is deliberate exploitation in which hacker attempts to make changes to data on target or Enroute to target. Passive attacks is a network attack in which system is monitored and scanned for vulnerabilities like open ports, week passwords etc.
In the next few articles I will discuss more on the approx 50 different type of attacks.
To be continued….