You are on page 1of 25

What is a Cyber

Attack?

Most Common Types of Cybersecurity


Attacks
A common cyber attack definition is the process of attempting to steal data or
gaining unauthorized access to computers and networks using one or more
computers. A cyber attack is often the first step an attacker takes in gaining
unauthorized access to individual or business computers or networks before
carrying out a data breach.

The goal of a cyber attack is either to disable the target computer and take it offline
or gain access to the computer’s data and infiltrate connected networks and systems.
Cyber attacks also differ broadly in their sophistication, with cyber criminals
launching both random and targeted attacks on businesses. Attackers deploy a wide
range of methods to begin a cyber attack, such as denial of service, malware,
phishing, and ransomware.
Cyber attack News: How
Often Do Cyber attacks
Occur?
Cyber crime now occurs on a frequent basis, causing damage to individuals and
businesses of all sizes. According to a research report from Risk Based Security, in
the first six months of 2019 alone, approximately 4.1 billion records were exposed
because of cyber attacks. This represented a 54% increase in reported breaches and
a 52% rise in the number of records exposed.
What is Cyber Security?
Cyber security is the practice of defending computers, servers, mobile devices,
electronic systems, networks, and data from malicious attacks. It's also known as
information technology security or electronic information security. The term applies
in a variety of contexts, from business to mobile computing, and can be divided into
a few common categories.
Network security is the practice of securing a computer network from intruders,
whether targeted attackers or opportunistic malware.

· Application security focuses on keeping software and devices free of threats.


A compromised application could provide access to the data its designed to protect.
Successful security begins in the design stage, well before a program or device is
deployed.

· Information security protects the integrity and privacy of data, both in storage
and in transit.
Operational security includes the processes and decisions for handling and protecting data assets.
The permissions users have when accessing a network and the procedures that determine how and
where data may be stored or shared all fall under this umbrella.

· Disaster recovery and business continuity define how an organization responds to a cyber-
security incident or any other event that causes the loss of operations or data. Disaster recovery
policies dictate how the organization restores its operations and information to return to the same
operating capacity as before the event. Business continuity is the plan the organization falls back on
while trying to operate without certain resources.

· End-user education addresses the most unpredictable cyber-security factor: people. Anyone
can accidentally introduce a virus to an otherwise secure system by failing to follow good security
practices. Teaching users to delete suspicious email attachments, not plug in unidentified USB
drives, and various other important lessons is vital for the security of any organization.
How to Prevent Cyber
Attacks?
1. Change your passwords regularly and use strong alphanumeric passwords which
are difficult to crack. Refrain from using too complicated passwords that you
would tend to forget. Do not use the same password twice.
2. Update both your operating system and applications regularly. This is a primary
prevention method for any cyber attack. This will remove vulnerabilities that
hackers tend to exploit. Use trusted and legitimate Anti-virus protection software.
3. Use a firewall and other network security tools such as Intrusion prevention
systems, Access control, Application security, etc.
4. Avoid opening emails from unknown senders. Scrutinize the emails you receive
for loopholes and significant errors.
5. Make use of a VPN. This makes sure that it encrypts the traffic between the VPN
server and your device.
6. Regularly back up your data. According to many security professionals, it is ideal to have
three copies of your data on two different media types and another copy in an off-site
location (cloud storage). Hence, even in the course of a cyber attack, you can erase your
system’s data and restore it with a recently performed backup.
7. Employees should be aware of cybersecurity principles. They must know the various
types of cyberattacks and ways to tackle them.
8. Use Two-Factor or Multi-Factor Authentication. With two-factor authentication, it
requires users to provide two different authentication factors to verify themselves. When
you are asked for over two additional authentication methods apart from your username and
password, we term it as multi-factor authentication. This proves to be a vital step to secure
your account.
9. Secure your Wi-Fi networks and avoid using public Wi-Fi without using a VPN.
10. Safeguard your mobile, as mobiles are also a cyberattack target. Install apps from only
legitimate and trusted sources, make sure to keep your device updated. .
5
What is a Cyber Attack?
What are the four types of attacks?
What happens during a Cyber Attack?
What are the different ways to prevent Cyber Attacks?
1. DoS and DDoS Attacks
DIFFERENCE BETWEEN DoS AND DDoS Attacks
TYPES OF DoS AND DDoS ATTACKS
DDoS PROTECTION AND PREVENTION
2. MITM( MAN IN THE
MIDDLE)
WHAT IS MITM?
TYPES OF MITM ATTACK
HOW TO PREVENT MITM
3.PHISHING ATTACKS
WHAT IS PHISHING ATTACK?
HOW TO SPOT PHISHING ATTEMPS?
TYPES OF PHISHING ATTACKS?
HOW TO PROTECT AND PREVENT PHISHING ATTACKS
4. RANSOMWARE
WHAT IS A RANSOM WARE?
WHAT DOES RANSOMWARE DO?
WHAT CAUSES RANSOMWARE ATTACKS?
WHAT ARE THE TYPES OF RANSOMWARE?
RANSOMWARE DISTRIBUTION TECHNIQUES
RANSOMWARE PROTECTION AND PREVENTION
5. PASSWORD ATTACK
COMMON METHODS TO DO PASSWORD ATTACK
TYPES OF PASSWORD ATTACK
WAYS TO DEFED AGAINST PASSWORD ATTACK
HOW TO PREVENT PASSWORD ATTACK
6. TROJAN HORSE
HOW DO IT WORKS
COMMON TYPES OF TROJAN HORSE
HOW TO RECOGNIZE IT
HOW TO PROTECT AND PREVENT TROJAN HORSE
EXAMPLES OF TROJAN HORSE
7. WEB ATTACKS
TYPES OF WEB ATTACKS
COMMON WEB ATTACKS
HOW TO PROTECT AND PREVENT WEB ATTACKS
8. SQL INJECTION ATTACK
CLASSES OF SQL INJECTION ATTACK
HOW TO PROTECT AND PREVENT SQL INJECTION ATTACK
9. INSIDER THREAT
EXAMPLES OF INSIDER THREAT
TYPES OF INSIDER THREAT
INSIDER THREAT AND PREVENTION
10. BRUTE FORCE ATTACK
TYPES OF BRUTE FORCE ATTACK
MOTIVE
HOW TO PROTECT AND PREVENT BRUTE FORCE ATTACK
11. MALWARE
TYPES OF MALWARE
HOW TO PROTECT AGAINST MALWARE
HOW TO GUARD AGAINST MALISCIOUS SOFTWARE ATTACKS
EXAMPLES
12. DNS Spoofing
What is DNS Spoofing
What is an example of DNS spoofing?
What are types of spoofing attacks?
What causes DNS spoofing?
How is DNS Spoofing Done?
How to Prevent DNS Spoofing
DNS Spoofing vs. DNS Poisoning

You might also like