Types of Cyberattack
Total Page:16
File Type:pdf, Size:1020Kb
1: Cybersecurity Context & Background Types of Cyberattack On average, advanced Data Integrity cyberattacks go Malicious data manipulation can be detrimental to a business. This is a highly sophisticated, and 5 197 days undetected . easily undetectable cyberattack that causes users to SQL Injection doubt the accuracy of their information. Manipulating Deploying malicious code into an SQL-based Being aware of how public opinion through smear campaigns or changing server can force the server into revealing information in a medical system are two examples of information it wouldn’t normally reveal. cyberattackers infect systems how this type of attack poses a huge threat to society. This type of attack can allow attackers Malware can help your business detect to tamper with services enabling them to Malware refers to the practice of pose as other individuals, void transactions, abnormal activity and potentially deploying malicious software, including change data, destroy data and approve ransomware, spyware, viruses and administrative access to users. help detect an attack early on. worms to infect and breach a network. This can result in blocked access to Here are some of the common files and systems, criminals covertly types of cyberattack: obtaining sensitive information, and disruption to service, amongst others. Cyber-Collection Distributed Denial of Service Used by nation states to conduct espionage and even corporate spies to gather intelligence This type of attack uses multiple compromised on rivals, cyber collection is similar to snooping systems to attack servers, networks, and but is with the intention to scan, collect and systems to flood and exhaust resources Snooping exfiltrate sensitive information. An example forcing the network to fail and deny service Similar to the act of eavesdropping, snooping is the of this is the famous Stuxnet computer to legitimate users. practice of unauthorised access to systems and data. worm first uncovered in 2010. This can include monitoring of keystrokes, passwords, login information, communications, webcams etc. Cybersecurity | 2019 | 8.