Research Paper
Research Paper
Network attacks:
Phishing
It starts with a fraudulent email or other communication that is designed to lure a
victim. The message is made to look as though it comes from a trusted sender.
If it fools the victim, he or she is coaxed into providing confidential
information, often on a scam website. Sometimes malware is also downloaded onto the
target’s computer.
Insider threats, Privilege escalation, Code and SQL injection attacks, Man in the
middle attacks, Distributed denial of service attacks, Unauthorized access
The major issue is that people are not aware about these attacks and hence, they
become the victims to these attack. so, in this modern era of technology first of
all we have to make
people aware about it. Even the latest technologies like cloud computing, mobile
computing, E-commerce, net banking etc also needs high level of security. Since
these technologies hold
some important information regarding a person their security has become a must
thing. Enhancing cyber security and protecting critical information infrastructures
are essential to
each nation's security and economic wellbeing. Making the Internet safer (and
protecting Internet users) has become integral to the development of new services.
It is observed that out of total data breaches occurred in 2012 worldwide, 37% of
breaches are of financial organizations, 24% of breaches of retail environments and
restaurants,
20% of network intrusions involved manufacturing, transportation, and utilities,
and 20% of network intrusions hit information and professional services firms.
Cyber crooks performed these data breaches by using various tricks such as hacking,
stolen credentials, installing Malware, physically attacking the systems, etc. It
is reported
by the Verizon in their annual report of 2013, 52% of breachers occurred used some
form of hacking, 76% of network intrusions exploited weak or stolen credentials,
40% incorporated Malware, 35% involved physical attacks, 29% leveraged social
tactics and 13% resulted from privilege misuse and abuse.
Cyber crooks used various methods of attack to gain entry into the system network.
These are referred to as attack vectors. Figure 4 lists some of the more prevalent
attack
vectors, with the corresponding percentage of organizations that suffered from
them. Memory corruption, buffer overflow and DoS topped the list of most popular
attack vectors.
Traditionally, these security attacks and their risk is being classified into
worms, virus, botnets, spam, phishing, etc. Potts. Accordingly, security defenses
have been
developed as anti-virus, anti-spam, anti-phishing and many more. Now, attacks are
more advanced and sophisticated. So, it is more significant to think of attacks
in terms of the motivations behind them rather than classifying and defending
against them only based on the attack method. Better understating of motivation
behind various cyber
attacks, we can more clearly weigh their risks and determine which kinds of
defenses are required to protect our critical resources.
Every organization has to protect all data and prepare for the worst and they need
to put an Incident Response plan in place, using;
Measures to mitigate these threats vary, but security basics stay the same: Keep
the systems and anti-virus databases up to date, train your employees, configure
the firewall
to whitelist only the specific ports and hosts needed, keep the passwords strong,
use a least-privilege model in the IT environment, make regular backups, and
continuously audit
the IT systems for suspicious activity.
conclusion:
Privacy and security of the data will always be top security measures that any
organization takes care. We are presently living in a world where all the
information is maintained in a
digital or a cyber form. Social networking sites provide a space where users feel
safe as they interact with friends and family. In the case ofhome users, cyber-
criminals would continue
to target social media sites to steal personal data. Not only social networking but
also during bank transactions a person must take all the required security
measures.
Computer security is becoming more important because the world is becoming highly
interconnected, with networks being used to carry out critical transactions.
Cyber crime continues to diverge down different paths with each New Year that
passes and so does the security of the information. The latest and disruptive
technologies,
along with the new cyber tools and threats that come to light each day, are
challenging organizations with not only how they secure their infrastructure, but
how
they require new platforms and intelligence to do so. There is no perfect solution
for cyber crimes but we should try our level best to minimize them in order to have
a safe and
secure future in cyber space.