Cyber Security Concepts
Cyber Security Concepts
What is cybersecurity?
Cybersecurity is defined as the practice of protecting systems, networks, and programs
from digital or virtual attacks. These cyber-attacks tend to access, change or even destroy
sensitive information to the extent of extorting money from users or causally interrupt a
normal business process. It is necessary to implement effective cybersecurity measures,
considering the innovations in these attacks, and the upward graph of technology and its
tools today.
Not so long ago, cybersecurity attacks were solely the problem of techies. However,
things have changed since, and no one can afford to ignore the importance of
cybersecurity. Gadgets, phones, and anything that can be connected to a computer or
the internet are susceptible to cyber-attacks from criminals. The possibility of data
breaches, losing confidential information, and tarnishing the image of a business
heightens with these attacks. Therefore, it is crucial that you know the types of cyber
threats and how to buff up your cybersecurity to prevent them.
Types of Cyber-attacks
1/11
A cyber-attack is an intentional activity that exploits computers, networks, and
enterprises that rely heavily on technology. Cybercriminals use malicious codes to alter
the data, logic, or code on the computer.
2/11
7. Password Attack
8. Ransomware Attack
9. Eavesdropping Attack
10. AI-powered Attack
11. Malware
12. Zero-day exploit
13. Advanced Persistent Threats
1. Phishing Attacks
Phishing is the technique to steal a user’s data from the internet or computer-connected
device. Login credentials, credit card numbers, and passwords are usually what such
hackers obtain from their victims.
Such criminals use disguise, pretending to be someone their victims can trust. Then they
trick them into opening a message, email, or link. Usually, the victim’s system freezes
shortly after clicking the link or message, and their sensitive information becomes
accessible to the hacker.
For example, you probably receive spam in your email every day. Also, it is very likely that
a few of them would have links to buy a product, or read an article. Such spams can be a
window for hackers to steal funds, make unauthorized purchases, or take over your entire
computer.
Phishing is one security breach that can have disastrous, and long-lasting effects on a
victim. There are several types of phishing attacks which include:
Whale Phishing
Here, high-profiled employees like CEOs are targeted and tricked into making
transfers to the attacker
Spear Attack
Pharming
Pharming is a fraudulent act that directs users to a fake page that looks like the
original, to steal from them
For example, an attacker can create a web page that looks exactly like that of the
victim’s bank to trick them into entering their pin
3/11
Don’t give your information to an unsecured site
Change passwords regularly
Don’t ignore updates
Install firewalls
Don’t be tempted by pop-ups
Don’t give out important information unless it is important
Have a Data Security Platform to spot signs of an attack
2. Man-in-the-middle attack
The man-in-the-middle attack is a security breach where cybercriminals place
themselves between the communication system of a client and the server. For example,
you are on a call with your boss, and he has just given you some sensitive information
over the phone. Hence, in man-in-the-middle attacks, a criminal will be listening to that
conversation and obtain the information you spoke about.
Session Hijacking
In this cyber-attack, the hacker takes control of the session between the network
server and the victim
For instance, the hacker can replace the user’s connection, or even create a fake
server and trick the victim into connecting to it
IP spoofing
This security breach provides access to the hacker by tricking the user into
communicating with a known entity
For instance, a packet of internet addresses, including that of a trusted site like
google, can be sent to the victim
Replay
In this Man-in-the-middle threat, the hacker saves old messages and then uses it
later to impersonate the user
For example, if a hacker gets hold of your Instagram page, he or she can use it to
impersonate you
4/11
3. SQL Injection Treat
SQL is an acronym for Structured Query Language, and an SQL attack is one of the oldest
cybersecurity breaches. In SQL you make queries. Therefore, in the SQL injection
threat, the attacker sends a malicious query to the device (a computer, phone, etc.) or a
server. The server is then forced to expose sensitive information.
For instance, a cybercriminal can create a query that disrupts and gets into the database
of your webpage through SQL injection. All the data, like your customers’ details, amount
paid, and other confidential information, can then be released by the query.
The daunting part of this cyber-attack is that the attacker can not only get hold of
sensitive information but also alter or wipe them completely.
5/11
example, a gardening website that notices a sky-rocketed number of visits of unknown
users in a day may be under a DDoS attack.
Distributed Denial of Service attacks does not usually result in identity theft or loss of
vital information. However, it will cost a lot of money to get the server running again.
5. Drive-by Attack
Drive-by attacks are security threats that download unwanted materials from a website.
It is also one of the most common ways of spreading malware. All the hacker has to do is
to plant code on the page. You have probably seen a few pop-ups that do not relate in any
way to what you are searching on the internet. Such pop-ups are drive-by attacks.
Unlike other cyber-attacks, a drive-by download does not need you to do anything to
enable the attack on your computing device. The best way to protect yourself from such
threats is to update your internet browsers frequently. Also, do not leave too many apps
and programs on your devices open.
For example, if you see a funny-looking code on your government’s page, then an attacker
is probably trying to get access to your device through Cross-Site Scripting.
6/11
Content Security Policy.
7. Password Attack
As its name implies, password attack is an attempt to steal passwords from a user. Since
passwords are the most common authentication means, attackers are always on the
lookout for ways to use this cyber-attack. Two common techniques they use to get a
user’s password are:
Brute-force guessing
This entails using different random words, hoping that one of them would be the
correct password
If the hacker knows his or her victim, they can apply logic while guessing and try the
person’s title, name, job, or hobbies as the password
Dictionary Attack
In this case, the hacker uses some of the common passwords to gain access to the
user’s device
For instance, 1234 or ‘abcde’ are passwords that a lot of people use on their devices
and these two are at the top of the list of common ones an attacker will try out
To protect yourself from either of these two types of password attacks, implement a
lockout policy to your cybersecurity.
8. Ransomware Attack
One cyber threat with scary consequences is the ransomware attack. Moreover, in this
type of security breach, the malware prevents users from accessing the data they stored
on a server or database. The hacker then sends out a threat demanding a ransom, else
they would expose or delete the data.
9. Eavesdropping Attack
Other names for eavesdropping attack are snooping, network security threat, or sniffing.
It is very similar to the man-in-the-middle attack, but it does not allow a secure
connection between the user and a server. Theft of data and information occurs after you
send them out, so they do not get across to the server.
Unsecured and weak network transmissions allow this security breach to thrive. Any
device within the network is susceptible to an eavesdropping attack from hackers.
7/11
Artificial intelligence (AI) has been making ground-breaking success in recent years.
Almost every gadget has some application of AI in it, which heightens the scare of an AI-
powered cyber-attack. Such security threats will have the most devastating effects as
autonomous cars, drones, and computer systems can be hacked by artificial intelligence.
AI can also shut down power supplies, national security systems, and hospitals.
11. Malware
Malware is a common type of cyber threat, defined as malicious software which gets
installed into the system when the user clicks on a dangerous link or email.
8/11
Why is it called a Zero-day attack?
After announcing the vulnerabilities publicly, security professionals have “zero-day” to
fix the problem, and this is when attackers try to steal information. This is the reason for
calling this attack a “zero-day” attack.
Examples: In 2017, Microsoft Word was hit with a zero-day exploit that compromised
personal bank accounts. Here victims were common people who opened malicious word
document that displayed a” load remote content” prompt and requested external access
from another program. This is when Microsoft word was hit by a “zero-day” attack.
Also Read: 4 Biggest Cyber Security Threats for Indian Banking Sector
Cyber Espionage
eCrime for financial gain
Hacktivism
Destruction
One such example is Stuxnet, In 2010 U.S. and Israeli cybersecurity forcers attacked the
Iranian nuclear program to slow down the country’s ability to enrich uranium and took
down Iran’s nuclear program, and Hydraq. Stuxnet was not any virus or a worm, instead,
it was computer hijacks that stole information and physically destroyed the centrifuges
that enriched the uranium.
9/11
Enable Email Protection
State-sponsored
Terrorists
Industrial spies
Organized crime groups
Hackers
Hacktivists
Malicious insider
Cyber espionage
Given the nature of these cyber-attacks, it is vital for all businesses, regardless of the size,
to understand cybersecurity threats and methods to mitigate them. This includes regular
training on the subject, and a framework to work with – that aims to reduce its risks of
data leaks and breaches.
Importance of Cybersecurity
In the present day world, everyone benefits from advanced cyber defense programs.
Apart from businesses and organisations, at an individual level, a cybersecurity attack can
result in everything from identity theft, extortion attempts, to the loss of basic important
data like family photos. Cybersecurity is extremely essential because it encompasses
everything that includes protecting our sensitive data, Personally Identifiable Information
(PII), Protected Health Information (PHI), personal information, intellectual property
data, and many more from theft and damages attempted digitally by criminals.
Cybersecurity risk is increasing, driven by global connectivity and usage of cloud services
to store sensitive data and personal information. Poor configuration of cloud services
paired with increasingly sophisticated cyber-criminals means the risk that your
10/11
organisation suffers from a successful cyber-attack or data breach is on the rise. A
successful cybersecurity approach contains numerous layers of protection that is spread
across the computers, networks, and programs. In an organisation, hence, it is essential to
ensure that the people, the processes, and technology in it must all complement one
another in order to create an effective defence from cyber attacks.
To sum up, listed above are some of the cyber-attacks that you can face as a business
owner or user of technological devices. The data, accounts, passwords, and sensitive
information that can be lost, deleted, or made public by cyber-attacks is alarming. Tech
companies to do not get to exempt from the scare. Facebook had a security breach where
hundreds of millions of Facebook user records were exposed on the Amazon cloud server,
and Equifax spent an estimated $439 million to recover from a cyber breach.
Cyber threats are attacks that you should stand up to and protect yourself and the
company from the harm that comes with it. If you wish to pursue a career in Advance
computer security, sign up for Stanford’s cyber security course, supported and
delivered by Great Learning.
11/11