You are on page 1of 1

BASHER, Al-fais P.

Summary

Any attempt to obtain unauthorized access to a computer, computing system, or computer network
with the intention of causing harm is referred to as a cyber attack. The goal of a cyber attack is to
disable, disrupt, destroy, or take control of a computer system, as well as to change, block, delete,
modify, or steal the data stored on it. A cyber attack can be launched by any person or group from
any location using one or more different attack tactics. An assault carried out by online criminals
using one or more computers on one or more computers or networks is known as a cyber attack.
A cyber attack has the potential to steal data, deliberately disable machines, or utilize a
compromised computer as a launching pad for more attacks.
Malware, ransomware, and social engineering are just an among the techniques used by
cybercriminals to launch a cyberattack. Malicious software that targets information systems is
known as malware. Malware includes programs like Trojans, spyware, and ransomware. Malware
can be used by hackers to steal or covertly copy private information, restrict access to files,
interfere with system performance, or even make systems unusable, depending on the sort of
malicious code deployed. Phishing is when hackers manipulate email messages so that recipients
are persuaded to open them. By clicking on an embedded link or an attachment in the email,
recipients are tricked into installing the malware.
SMiShing is an advancement of the text-based phishing assault approach. It is also known as SMS
phishing or smishing (technically known as Short Message Service, or SMS). Socially engineered
texts are sent by hackers, and when receivers click on them, the texts download malware. Malware
known as ransomware uses encryption to demand a ransom for access to a victim's data. Critical
data for a user or organization is encrypted to prevent access to files, databases, or applications.
Then access is requested in exchange for a ransom. Ransomware can easily shut down an entire
company since it is frequently made to spread over a network and target database and file servers.
It is an expanding threat that brings in billions of dollars in payments to hackers while causing
serious harm and high costs for businesses and governmental institutions.

You might also like