Unit 4 Cyber Security
Unit 4 Cyber Security
Phishing scams are the most common type of Social Engineering attacks these
days. Tools such as SET(Social Engineering Toolkit) also make it easier to create
a phishing page but luckily many companies are now able to detect phishing such
as Facebook. But it does not mean that you cannot become a victim of phishing
because nowadays attackers are using iframe to manipulate detection techniques.
An example of such hidden codes in phishing pages is cross-site-request-forgery
“CSRF” which is an attack that forces an end user to execute unwanted actions on
a web application. Example: In 2018 we have seen a great rise in the use of
ransomware which has been delivered alongside Phishing Emails. What an
attacker does is usually deliver an attachment with a subject like “Account
Information” with the common file extension say .pdf/.docx/.rar etc. The user
generally clicks and the attacker’s job gets done here. This attack often encrypts
the entire Disk or the documents and then to decrypt these files it requires
cryptocurrency payment which is said to be “Ransom(money)”. They usually
accept Bitcoin/Ethereum as the virtual currency because of its non-traceable
feature. Here are a few examples of social engineering attacks that are used to be
executed via phishing:
Insider Attack
Cyber attacks are attacks on Cyber networks involving the internet carried out by
professional cyber-hacking experts. The main motivation, which drives the
growing cyber crimes, is the ever-growing internet dependency. Over the years,
the use of computer networks making use of the internet has increased
enormously. Cyber criminals have taken advantage of this increasing demand for
internet-related services to exploit the privacy of users and organisations that use
computer networks to store their private information for ease among many other
advantages of using the internet.
Here, in this article, we will discuss a very risky form of cyber attack – Insider
Attacks in detail.
Insider Attack:
Insider Attack gets their name as these are the attacks that people having
inside access to information cause.
The inside people may be current or former employees, business partners,
contractors, or security admins who had access to the confidential information
previously.
Insider Attacks are carried out by people who are familiar with the computer
network system and hold authorised access to all the information.
This form of cyber attack is extremely dangerous as the attack is led by the
system employees, which makes the entire process extremely vulnerable.
Computer organisations , most likely focus on external cyber attack protection
and rarely have their attention focused on internal cyber-attacks.
Insider Types:
Insider threats are the types of security risk. It happens when in a company the
past employees or the current employees misuse your company's sensitive data
and those who have more knowledge about the company fundamentals. These
threats damage the company's reputation.
Insider threat as the name suggests insider means someone in your company or
organization steals the sensitive data or harms the organization. In this article,
we will cover a brief explanation of insider threats and their types. Also, we
will cover how to prevent insider threats.
Defence Strategies