Cyber
warfare can be defined as the use of information technology to disrupt and
destroy the activities of a state or organization, by attacking the total information
systems for strategic or military purposes.
The impact
of Cyber-attack can be very large; it can affect different sectors of a nation
like:
1.
Government sector
2. Business sector
3. Social
Media
4.
Individual level
Cyber-attacks Recorded in the History:
(As per Wikipedia information).
- 2007 Cyber-attacks on Estonia, wide ranging attack targeting government and commercial institutions
- July 2009 Cyber-attacks against South Korea and United States
- 2010 Cyber-attacks on Burma, related to the 2010 Burmese General Election
- 2010 Japan–South Korea Cyber Warfare
- 2013 Singapore Cyber-attacks
- #OpIsrael, a broad "anti-Israel" attack
- Cyber-attacks during the Russo-Georgian War
- Operation Olympic Games, against Iranian nuclear facilities, allegedly conducted by the United States
Types of Cyber Attacks:
Many
security vulnerabilities occur due to increased internet connectivity. Cyber
attackers exploit those vulnerabilities. Different types of Cyber-attacks are
explained below:
1. Phishing
Phishing
attacks are coming in the form of Emails to inbox. While clicking the link on
the mail, it will steal user data.
2.
Denial-of-Service (DoS) Attacks
A DoS attack
causes damaging the service to a network. Attackers send bulk volumes of
traffic through the network and then the network becomes overloaded and can’t work
anymore.
In a DoS,
the attacker uses multiple computers to send the data that will overload the
system. In this case, a PC user may not even realize that his computer has been
hijacked and became a part of the DoS attack.
Due to DoS
attacks, online access would be blocked to a site, and the business or
organization can’t function properly.
3. Password
Attacks
Password
attack is that some unknown source trying to gain access your system by
cracking your password. There are programs which are used to guess passwords,
and also to compare various possible word combinations against a dictionary
file.
4. Malware
Malware is defined
as the code with malicious purpose which can steal data or destroys something
on the PC.
Malware includes
Trojans, viruses and worms.
Malware is commonly
penetrated to a system while opening email attachments, downloading a software
or through Operating System vulnerabilities.
5. Rogue
Software
A Rogue
software is a malware that pop ups as a necessary security software which can
keep your system safe and protected from hacking.
Rogue
security software gives alerts that the user system security is in trouble and
has to download the software to protect the system. While clicking “Yes”, the Rogue
software will be downloaded to the system.
6. “Man in
the Middle” (MITM)
The MITM can
grab information from the end users and the entity (like banks) which user is
communicating with.
To explain, if
you are banking online, the man in the middle will communicate with you as an
executive from Bank, and communicate with the Bank as it’s you. The man in the
middle can then receive all of the information exchanged between both parties, like
bank accounts and personal data.
7. Password
Re-use
Users have a
tendency to use the same password for many sites. Once attackers hack some
sites, they collect a list of passwords and try to use it for accessing your sensitive
information like Bank account or other crucial information.
8.
Malvertising
Malvertising
is downloading a malware through clicking an ad. Attackers would upload
infected ads to different sites through an ad network. When a user clicks on any
of these ads, some kind of malware will be downloaded to the system.
Hacking: Preventive Measures
- Banking or shopping should be done on your own device only. NEVER do it on a public computer, in a cafĂ©, or a free WiFi — there might be chances of your data to be stolen.
- Use a strong password with numbers, characters and special characters, and don’t use the same password for multiple sites. Don’t share your password with others also.
- Be careful always while clicking on suspicious attachments or email links. Confirm the URL of website the link directs you to.
- Don’t share sensitive information on social networks. Hackers can grab all those valuable data. Tighten your Social-Media security settings also.
- Give password and lock all devices and never leave them unattended. Lock flash drives and external hard drives also with password if there is sensitive information.
- Activate Firewall. It monitors all the incoming and outgoing network traffic towards your computer.
- Update operating system, browser, and other important software with the latest security patches to minimize threats from viruses and malware.
- Do not install ‘cracked’ software which can attract spyware to your system.
- Update anti-virus/anti-malware software regularly, and do a regular backup of data.
- Be careful while plugging flash drives, external hard drives, and smart phone to the PC. Malware can be transferred through it.
- Don’t share any sensitive information like Bank account PIN through Emails or phone calls if some unknown person emails or calls you and telling that they’re from the Bank.
- While uploading your personal data to any online file sharing services, do it as encrypted mode only.
Networking Security Training in Cochin
Soften Technologies offers networking security training and certification like CCNA Security, CCNP Security, CCIE Security along with MCSE, RHCE and Linux. We offer Software Programming courses also, like ASP.NET, PHP, Java, Android, Embedded Systems, Software Testing in Cochin, Kerala.
CALL: 8129199511, 0484 4037036 for your queries.
Email: softentechnologiescochin@gmail.com