You are on page 1of 15

Day-2 Cyber Security (PEC IT 702F)

Programme: B. Tech. IT
Semester: 7th
Year:2023
Session: 2020-2024
Faculty: Dr. Pankaj Pal
Cyber Threat
Cyber threat is defined by the capability that one’s opponent has in
both terms of skills and software or digital tools.
However, these tools are based on an array of equipment that must
be available along with the knowledge as how to best use tools or
skills.
Thus, cyber threat equals the capability of the opponent plus the
intent to do damage, take action, or simply monitor activities.
The manner in which we pursue these cyber threats is based on our
legal system, intelligence system, military system, and a range
of additional factors.
Characteristics of Cyber Threat

A cyber threat or cyber security threat is a malicious act


that seeks to damage data, steal data, or disrupt digital life
in general.
6 most common types of Cyber Threats
1. Malware: Malware, or malicious software, is an umbrella term used to refer to a hostile
or intrusive program or file that is designed to exploit devices at the expense of the user
and to the benefit of the attacker.

2. DDoS: A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the


normal traffic of a targeted server, service or network by overwhelming the target or its
surrounding infrastructure with a flood of Internet traffic.
DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems
as sources of attack traffic. Exploited machines can include computers and other
networked resources such as IoT devices.
From a high level, a DDoS attack is like an unexpected traffic jam clogging up the
highway, preventing regular traffic from arriving at its destination.

3. Phishing: Phishing is a type of cyber security attack during which malicious actors send
messages pretending to be a trusted person or entity. Phishing messages manipulate a
user, causing them to perform actions like installing a malicious file, clicking a malicious
link, or divulging sensitive information such as access credentials. Phishing is the most
common type of social engineering, which is a general term describing attempts to
manipulate or trick computer users.
4. SQL injection attacks: SQL injection, also known as SQLI, is a common attack vector
that uses malicious SQL code for backend database manipulation to access
information that was not intended to be displayed. This information may include any
number of items, including sensitive company data, user lists or private customer
details.
5. XSS: Cross site scripting (XSS) is an attack in which an attacker injects malicious
executable scripts into the code of a trusted application or website. Attackers often
initiate an XSS attack by sending a malicious link to a user and enticing the user to click
it.
6. Botnets: A botnet (short for “robot network”) is a network of computers infected by
malware that are under the control of a single attacking party, known as the “bot-
herder.” Each individual machine under the control of the bot-herder is known as a
bot.
Cyber warfare

Cyber warfare involves the actions by a nation-state or


international organization using series of attacks that target a
country and attempt to damage another nation's computers or
information networks through computer viruses or denial-of-
service attacks.
It has the potential to wreak havoc on government and civilian
infrastructure and disrupt critical systems, resulting in damage
to the state and even loss of life.
Surprise
Attacks Espionage

Economic
Disruption
7 Types of Cyber Sabotage
Warfare Attacks

Propaganda
Attacks
Denial-of-Service
(DoS) Attacks
Electrical
Power Grid
Espionage

It refers to monitoring other countries to steal secrets. In


cyber warfare, this can involve using botnets (short for
“robot network) or spear phishing attacks to compromise
sensitive computer systems before filtrating sensitive
information.
Sabotage

Government organizations must determine sensitive


information and the risks if it is compromised. Hostile
governments or terrorists may steal information, destroy it,
or leverage inside threats such as dissatisfied or careless
employees, or government employees with affiliation to the
attacking country.
Denial-of-Service (DoS) Attacks

Denial-of-Service (DoS) attacks prevent legitimate users


from accessing a website by flooding it with fake requests
and forcing the website to handle these requests. This
type of attack can be used to disrupt critical operations
and systems and block access to sensitive websites by
civilians, military and security personnel, or research
bodies.
Electrical Power Grid

Attacking the power grid allows attackers to disable


critical systems, disrupt infrastructure, and potentially
result in bodily harm. Attacks on the power grid can also
disrupt communications and render services such as text
messages and communications unusable.
Propaganda Attacks

Attempts to control the minds and thoughts of people living


in or fighting for a target country. Propaganda can be used
to expose embarrassing truths, spread lies to make people
lose trust in their country, or side with their enemies.
Economic Disruption

Most modern economic systems operate using computers.


Attackers can target computer networks of economic
establishments such as stock markets, payment systems,
and banks to steal money or block people from accessing
the funds they need.
Surprise Attacks

These are the cyber equivalent of attacks like Pearl Harbor


and 9/11. The point is to carry out a massive attack that the
enemy isn’t expecting, enabling the attacker to weaken
their defenses. This can be done to prepare the ground for a
physical attack in the context of hybrid warfare.
Thanks

You might also like