What is Cyber Attacks ? Types OF Cyber-Attacks



A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals can use a variety of methods to launch a cyber attack including malware, phishing, ransomware, man-in-the-middle attack, and other methods. 

In other situations, cyber attacks can be part of nation-states' cyber warfare or cyber terrorism efforts. 

Strong organizational-wide cybersecurity and network security controls are now more important than ever.

A cybercriminal may steal, alter, or destroy a specified target by hacking into a susceptible system. Cyber threats can range in sophistication from installing malicious software like malware or a ransomware attack (such as WannaCry) on a small business to attempting to take down critical infrastructure like a local government or government agency like the FBI or Department of Homeland Security. One common by product of a cyber attack is a data breach, where personal data or other sensitive information is exposed. 

As more organizations bring their most important data online, there is a growing need for information security professionals who understand how to use information risk management to reduce their cybersecurity risk. This paired with the increasing use and regulatory focus on outsourcing means that vendor risk management and third-party risk management frameworks are more important than ever.


Type Of Cyber Attacks

1. Cyber Criminal - Cyber Criminal is are  individual grop of people . Who use technology to commit cybercrime with the intetion of stealing sensitive company informatoin  or personal data and genarting profile .


 In today are the most prominet and most active type of attacker.

  •   Select Computer as their target - In this they attack other people computer to do cybercrime , such as spreading viruses data theft , identity itheft. 

  • Use the computer as their weapon - In this , they use the computer to do  conventinal crime such as spam , froud , illegal work etc. 

  • Uses the computer as their accessory - In this use the computer to steal data illegally . 

 

2. Hacktivists  - Hacktivsts are indivduals group of hackers . Who carry out malicious activity to promote a political agenda, religious belif or social idology . According to chief security officer for security mentor a national security training firm that work with states said Hacktvists are not like cybercriminal . Who hack computer networks to steal data for the cash . They are individuals or group of hacker . Who work together and see themselves are fighiting injustice.

 


3.Sate - Sponsored Attacker - Have particular aligned with either the potical commercial or miltory interests of their country of origin. These type of attackers are not inn a hurry . The gorvenment organization have higly skilled hackers and speciatize in detecting valnerabilities and exoploiting  these before the holes  are patched .It is very challanging  to defeat these attacker due to the vast resources at their disposal.


4. Insider Threats - The insider threats is a threats to an organization security or data  that comes from within . These type of threats are use occurred from employess or former  employess . But may also arise from third parties , including contractor , temporary workers , employess or costumer.


 

Comments

Popular posts from this blog

What is Site Isolation in Web Brower's? How it Works.

What Is System Attacks ? Types OF System Based Attacks