Tuesday, 2 May 2017

The Cyber Warfare





Cyber warfare can be defined as the use of information technology to disrupt and destroy the activities of a state or organization, by attacking the total information systems for strategic or military purposes.

The impact of Cyber-attack can be very large; it can affect different sectors of a nation like:
1. Government sector
2. Business sector
3. Social Media
4. Individual level


Cyber-attacks Recorded in the History:

(As per Wikipedia information).

  • 2007 Cyber-attacks on Estonia, wide ranging attack targeting government and commercial institutions
  • July 2009 Cyber-attacks against South Korea and United States
  • 2010 Cyber-attacks on Burma, related to the 2010 Burmese General Election
  • 2010 Japan–South Korea Cyber Warfare
  • 2013 Singapore Cyber-attacks
  • #OpIsrael, a broad "anti-Israel" attack
  • Cyber-attacks during the Russo-Georgian War
  • Operation Olympic Games, against Iranian nuclear facilities, allegedly conducted by the United States





Types of Cyber Attacks:

Many security vulnerabilities occur due to increased internet connectivity. Cyber attackers exploit those vulnerabilities. Different types of Cyber-attacks are explained below:

1. Phishing
Phishing attacks are coming in the form of Emails to inbox. While clicking the link on the mail, it will steal user data.

2. Denial-of-Service (DoS) Attacks
A DoS attack causes damaging the service to a network. Attackers send bulk volumes of traffic through the network and then the network becomes overloaded and can’t work anymore.
In a DoS, the attacker uses multiple computers to send the data that will overload the system. In this case, a PC user may not even realize that his computer has been hijacked and became a part of the DoS attack.
Due to DoS attacks, online access would be blocked to a site, and the business or organization can’t function properly.

3. Password Attacks
Password attack is that some unknown source trying to gain access your system by cracking your password. There are programs which are used to guess passwords, and also to compare various possible word combinations against a dictionary file.

4. Malware
Malware is defined as the code with malicious purpose which can steal data or destroys something on the PC.
Malware includes Trojans, viruses and worms.
Malware is commonly penetrated to a system while opening email attachments, downloading a software or through Operating System vulnerabilities.

5. Rogue Software
A Rogue software is a malware that pop ups as a necessary security software which can keep your system safe and protected from hacking.
Rogue security software gives alerts that the user system security is in trouble and has to download the software to protect the system. While clicking “Yes”, the Rogue software will be  downloaded to the system.

6. “Man in the Middle” (MITM)
The MITM can grab information from the end users and the entity (like banks) which user is communicating with.
To explain, if you are banking online, the man in the middle will communicate with you as an executive from Bank, and communicate with the Bank as it’s you. The man in the middle can then receive all of the information exchanged between both parties, like bank accounts and personal data.

7. Password Re-use
Users have a tendency to use the same password for many sites. Once attackers hack some sites, they collect a list of passwords and try to use it for accessing your sensitive information like Bank account or other crucial information.

8. Malvertising
Malvertising is downloading a malware through clicking an ad. Attackers would upload infected ads to different sites through an ad network. When a user clicks on any of these ads, some kind of malware will be downloaded to the system.

Hacking: Preventive Measures

  • Banking or shopping should be done on your own device only. NEVER do it on a public computer, in a cafĂ©, or a free WiFi — there might be chances of your data to be stolen.
  • Use a strong password with numbers, characters and special characters, and don’t use the same password for multiple sites. Don’t share your password with others also.
  • Be careful always while clicking on suspicious attachments or email links. Confirm the URL of website the link directs you to.
  • Don’t share sensitive information on social networks. Hackers can grab all those valuable data. Tighten your Social-Media security settings also.
  • Give password and lock all devices and never leave them unattended. Lock flash drives and external hard drives also with password if there is sensitive information.
  • Activate Firewall. It monitors all the incoming and outgoing network traffic towards your computer.
  • Update operating system, browser, and other important software with the latest security patches to minimize threats from viruses and malware.
  • Do not install ‘cracked’ software which can attract spyware to your system.
  • Update anti-virus/anti-malware software regularly, and do a regular backup of data.
  • Be careful while plugging flash drives, external hard drives, and smart phone to the PC. Malware can be transferred through it.
  • Don’t share any sensitive information like Bank account PIN through Emails or phone calls if some unknown person emails or calls you and telling that they’re from the Bank.
  • While uploading your personal data to any online file sharing services, do it as encrypted mode only.

Networking Security Training in Cochin 

Soften Technologies offers networking security training and certification like CCNA Security, CCNP Security, CCIE Security along with MCSE, RHCE and Linux. We offer Software Programming courses also, like ASP.NET, PHP, Java, Android, Embedded Systems, Software Testing in Cochin, Kerala. 


CALL: 8129199511, 0484 4037036 for your queries.

Email: softentechnologiescochin@gmail.com








No comments:

Post a Comment