Common Cyber Security Threats - WEB TECHNOLOGY

Latest

This blog is created to share Web Technology Information, Security, Product Information, Computer tips and Current News and Commentary. https://webwolttech.blogspot.com

Pages

Copyright @webwolttech.com. Powered by Blogger.

Wikipedia

Search results

Saturday, August 15, 2020

Common Cyber Security Threats

What is a  Cyber Security  Threats?

    Cyber or Cyber security threats is a malicious act that seeks to damage data, steal data or disrupt digital life. Cyber attacks  include threats like computer viruses, data breaches and denial of Service(DoS) attacks. The attacker's motives may include information theft, financial gain or any other form of sensitive data. Therefore, it is necessary for individuals and businesses to identify and protect  against cyber attacks.



 







Where do Cyber Threats come from?

    Cyber attacks come from  a variety of places people and context. Malicious actors include Terrorist groups, Corporate spies and organized crime organizations , Hackers, Natural disasters represent a cyber threat because they can disrupt your key infrastructure just like a cyber attack cloud,Accidental actions of authorized users, Hacktivists, inside threats also include third-party vendors and employees who may accidentally introduced malware into systems.

What are types of Cyber Threats?

    Common cyber threats include:

1. Malware & Spyware Attack: Attacks use many methods to get malware into a user device.Users may be asked to take an actions, such as clicking a link or opening attachment.In other cases Malware uses vulnerabilities in browsers or operating systems to install themselves without the user's knowledge or consent.One malware is installed, it can monitor user activities send confidential data to the attacker. 

    Spyware is a a form of malware that hides on a device providing real-time  information sharing to its host, enabling them to steal data like bank details and passwords.

2. Trojans: A Trojan creates a backdoor in your system, allowing the attacker to gain control of your system access confidential  information .

3. Phishing attacks: Phishing is when a cyber criminal attempts, attack sensitive data such as personally identification information , banking and credit card details and passwords.

4. Man-in-the-middle attack(MITM)attack: A MITM attack is when an attack relays and possibly alters the communication between two parties who believe they are communicating with each other. A MITM attack might be used in the military to confuse an enemy.

5.Intellectual Property Theft: Stealing or using someone else's intellectual property without permission.

6. Data Manipulation: Data manipulation s form of cyber attack that doesn't steal data but aims to change the data to make it harder for an organization to operate.

7. Data destruction: Data destruction is when a cyber attacker attempts to delete data.

8. Theft of Money: Cyber attacks may gain access to credit card numbers or bank accounts to steal money.

9. Wiper Attacks: A wiper attacks is a form f malware whose intention is to wipe the hard drive of the computer it infects.

10. Dictionary Attack: A dictionary of common passwords is used to gain access to the computer and network  of the victim.One method is to copy an encrypted file that has the passwords, apply the same encryption to a dictionary of regularly used passwords. 

11. Malvertising Attack : Online advertising controlled by hackers,which is contains malicious code that infects a user's computer when they click,or even just view the advertisement. Malvertising has been found on many leading online publications.

12. Drive-by-Downloads Attack: Attackers can hack websites and insert  malicious scripts into PHP or HTTP code on a page. When users visit the page, malware is directly installed on their computer; the attacker's script redirects users to a malicious site, which performs the download.

13. Ransomware: Prevents access to the data of the victim and threatens to delete or publish it unless a ransom is paid.

14. IP Spooling Attack: An attacker convinces a system that it is corresponding with a trusted known entity. The system thus provides the attacker with access. 

15. Malware on Mobile Apps: Mobile devices are vulnerable to malware just like other computing hardware.Attackers may embed malware in app downloads, mobile websites or phishing emails and text messages.Once compromised, a mobile device can give the malicious actor access to personal information, location data, financial accounts and more.

                                        ------------------------

                                         
 

5 comments: