ethics in computing
ethics in computing
MUMBERE DERIC
2021/U/MMU/BIT/021
INDIVIDUAL ASSIGNMENT 1
While there are dozens of different types of attacks, the list of cyber-attacks includes the 20 most
common examples.
MITM Attacks
Phishing Attacks
Phishing combines social engineering and technology, where attackers send emails that appear
to be from trusted sources. The goal is to trick recipients into clicking on malicious links,
downloading malware, or sharing sensitive information. The danger lies in the fact that users
may not realize they’ve been compromised, allowing the attacker to target others within the same
organization.
Whale-phishing Attacks
Whale phishing targets high-level executives or “big fish” within an organization. These
individuals are often targeted due to their access to sensitive information. If they fall victim to
ransomware or another attack, they may pay the ransom to avoid public embarrassment. To
avoid whale phishing, organizations should adopt the same best practices used to avoid regular
phishing.
Spear-phishing Attacks
This is a more personalized version of phishing, where the attacker researches their target to craft
a message that seems relevant to the individual. Often using spoofed emails and cloned websites,
these attacks are difficult to detect. To guard against spear phishing, recipients must carefully
scrutinize email details and avoid clicking on unfamiliar links.
Ransomware
Ransomware is malware that locks or encrypts a user’s system, demanding a ransom in exchange
for restoring access. It often exploits unpatched vulnerabilities and can spread across networks,
encrypting multiple devices. Preventing ransomware involves regularly updating systems,
employing strong firewalls, and avoiding suspicious websites or emails.
Password Attacks
These attacks aim to gain access to a system by figuring out a user’s password. Attackers may
use brute-force attacks, social engineering, or intercept unencrypted network transmissions.
Weak passwords or default credentials (like “1234567” or “admin”) are especially vulnerable.
To protect against these attacks, organizations should enforce strong password policies and
implement account lock-out mechanisms after failed attempts.
SQL injection attacks exploit vulnerabilities in web applications that use databases. The attacker
injects malicious code into the database query to access, modify, or delete data. Limiting
database access to only those who need it (following the least-privileged model) and sanitizing
inputs can prevent SQL injection attacks.
URL Interpretation
In this attack, hackers manipulate URLs to gain unauthorized access to systems. By altering parts
of a website’s URL, they can potentially reach administrative sections or other restricted areas.
Secure authentication mechanisms, such as multi-factor authentication and secure passwords, are
crucial to preventing URL interpretation attacks.
DNS Spoofing
Also known as DNS poisoning, this attack involves altering the DNS records to redirect users to
malicious websites. Users might unknowingly enter personal information on a fake site, which
the attacker can then use or sell. Keeping DNS servers up-to-date and secure helps protect
against these attacks.
Session Hijacking
An attacker takes control of an active session between a user and a server by substituting their IP
address for the client’s. Using VPNs can prevent this by encrypting communications.
Attackers attempt to guess login credentials by systematically trying combinations. Bots often
automate this process. Lockout policies and strong, random passwords can help prevent these
attacks.
Web Attacks
Exploit vulnerabilities in web applications. Common forms include SQL injection, cross-site
scripting (XSS), and cross-site request forgery (CSRF). Web applications should be regularly
inspected and protected using anti-CSRF tokens and SameSite flags.
Insider Threats
Employees or insiders with access to critical systems can misuse their knowledge. Limiting
access and using multi-factor authentication (MFA) are effective preventive measures.
Trojan Horses
Malicious software is disguised as legitimate. When executed, it opens a backdoor for attackers.
To avoid this, users should only download from trusted sources and use Next-Generation
Firewalls (NGFWs) for inspection.
Drive-by Attacks
Attackers inject malicious scripts into a web page, executed when clicked by a user. Using
whitelists and sanitizing inputs can help defend against XSS.
Eavesdropping
Attackers intercept network traffic to steal sensitive information like passwords or credit card
details. Encrypting data can prevent both active and passive eavesdropping.
Birthday Attack
Exploits hash algorithms by creating matching hashes to replace legitimate messages. Using
longer hashes for verification significantly reduces risk.
Malware Attack
General term for malicious software designed to harm or spy on devices. Preventive measures
include educating users, using firewalls, and being cautious with software downloads and email
links.
REFERENCES