An Academic presentation by Dr. Nancy Agnes, Head, Technical Operations, Group www.phdassistance.com Email: info@phdassistance.com
7MAJORTYP CYBERSECU THREATS
sDiscussion
er Security Threat?
ber Security Threats
Computer systems are constantly protected against various cyberthreats by professionals in cyber security. Every day, private systems and enterprises are the targets of cyberattacks, whose variety hasrapidlyexpanded.
There are two categories of businesses, according to former Cisco CEO John Chambers: those that havebeenhackedandthosewhoarestillunawarethatthey'vebeenattacked(Cisco,2021).
Cyberattacks can have a variety of purposes. There are two. Cyber criminals may take a system offline and demand money to make it functional again. More complex than ever, ransomware is an assaultthatdemandspaymenttounlockinordertorestoreservices.
Introduction
contd...
Cyber-attacks targetsboth businesses and individuals, often as a result of thepersonalinformationpeoplesaveontheirmobiledevicesandtheusage ofunsecurepublicnetworks(Almaiahetal.,2021).
To improve cyber security, it is essential to monitor changing and more frequent cyberattacks. An online cyber security master's degree may be quite helpful for workers working to expand their understanding of dangers andcybersecurityinformation.
Graduates of the online Master of Science in Cyber Security programme at the University of North Dakota may anticipate acquiring a thorough and sophisticatedknowledgeofcyber-attacktechniques.
WhatIsaCyberSecur Threat?
Any potential malicious attack that a unauthorised access to data, interfere activities, or contaminate information is re cybersecuritythreat.
Cyber threats may come from a varie including corporate espionage, hackti organisations, adversarial nation-sta organisations,lonehackers,andaggrieved
contd...
Sensitive data was disclosed as a result of multiple high-profile cyberattacks in recent years. 143millionpeople'spersonalinformation,includingbirthdates,addresses,andSocialSecurity numbers,wereleakedinthe2017Equifaxbreach,forinstance.
Marriott International said in 2018 that hackers had gained access to its systems and taken datafromalmost500millioncustomers.
In all cases, the organization's inability to develop, test, and retest technological measures includingencryption,authentication,andfirewallsallowedthecybersecuritydangertopersist (Banyaletal.,2020).
Cyber security experts are crucial for maintaining the security of private data since cyber attackers might utilise sensitive data to steal information or access bank accounts of an individualoracorporation,amongotherpotentiallydetrimentalacts.
7TypesofCyberSecu Threats
The following categories of cyber security bethoroughlyunderstoodbycybersecurity
Malware
Malware, which includes spyware, virus andworms,isharmfulsoftware.Whena malicious link or attachment, harm installed, and malware is triggered. Acc oncetriggered,malwarecan:
contd...
preventingaccesstoimportantnetworkcomponents(ransomware)
Installmoremalicioussoftware.
Collectdatasecretlybysendingdatafromthestoragedevice(spyware)
Individualcomponentscanbeharmed,renderingthesystemuseless.
DenialofService
A cyber-attack knownasadenialofservice(DoS)bombardsacomputerornetworkwith requests,preventingitfromresponding.ThesametechniqueisaccomplishedviaadistributedDoS (DDoS),excepttheassaultcomesfromacomputernetwork.Floodattacksarefrequentlyusedby cyberattackerstodisruptthe"handshake"procedureanddoaDoS.
Thereareseveralothermethodsthatmaybeemployed,andsomecybercriminalsmakeuseof networksbeingdowntoconductadditionalattacks (Li&Liu,2021).AccordingtoJeffMelnickofthe informationtechnologysecuritysoftwarebusinessNetwrix,abotnetisasortofDDoSinwhich millionsofdevicesmaybeinfectedwithmalwareandmanagedbyahacker.Theprocessing powerofatargetistargetedandoverpoweredbybotnets,alsoknownaszombiecomputers. Botnetsaredifficulttotrackdownandspreadoverseveralplaces.
Emotet
Emotetisdescribedas"ansophisticated,modularbankingTrojanthatprimarilyservesasa downloaderordropperofotherbankingTrojans"bytheCybersecurityandInfrastructure SecurityAgency(CISA).Emotetisstillamongthepriciestandmostharmfulspyware.
ManintheMiddle
Whenhackersinterjectthemselvesintoatwo-partytransaction,aman-in-the-middle (MITM)assaulttakesplace.AccordingtoCisco,theymayfilterandtakedataafterdisrupting thetransmission.WhenavisitormakesuseofanunprotectedpublicWi-Finetwork,MITM assaultsfrequentlyhappen.Attackersplacethemselvesinthewayofthevisitorandthe network,thenemploymalwaretosetupdangeroussoftwareandaccessdata(Podderetal., 2021).
SQLInjection
AspecifickindofcyberattackcalledaStructuredQueryLanguage(SQL)injectionhappens whenmaliciouscodeisinsertedintoaserverthatsupportsSQL.Theserverdivulges informationwheninfected.Simplytypingthemaliciouscodeintoasearchboxona susceptiblewebsitecansubmitit.
Phishing
Phishingattacksemployfakecorrespondence,suchanemail,tocontherecipientinto openingitandfollowingtheinstructionscontainedtherein,likeenteringacreditcard information.AccordingtoCisco,theintentionistostealpersonalinformationlikecreditcard numbersandlogincredentialsortoinfectthevictim'scomputerwithmalware.
PasswordAttacks
Anonlinehackermaygainaccesstoavarietyofdatawiththeproperpassword.DataInsider describessocialengineering,asortofpasswordassault,as"atacticcyberattackersutilise thatdependslargelyonhumanconnectionandfrequentlyentailspersuadingindividualsinto violatingbasicsecuritymeasures."Accessingapassworddatabaseorguessingapassword straightaretwomoremethodsofpasswordattacks(Patiletal.,2020).
Therefore,tosafeguardtheiroperationsanddata,businessesandgovernmentbodies requirethehighestlevelofcybersecurity.Forcybersecurityspecialists,itiscrucialto comprehendhowtohandlethemostrecent,changingcyberthreats.
Atphdassistance,Ourprofessionalexpertsalwaysstivetogivethebestresultsinassisting thePhDscholars
UNITEDKINGDOM
EMAIL INDIA info@phdassistance.com
GET IN TOUCH +447537144372
+91-9176966446