You are on page 1of 10

“Critical Cyber

Attack Concept ”

Group Members:
Ayesha Yousuf (CR-22004)
Abdullah Khalid (CR-22027)
Maryam Khan (CR-22021)
Sheheryar Amir (CR-22008)
Contents :
• Introduction
• Problem Statement
• Literature Review
• Research Methodology
• Results Based Findings
• Recommendations
• Conclusion
Introduction:
What Is A Cyber Attack?
A cyber attack is a deliberate attempt to compromise computer
systems, networks, or devices with the intent of stealing, or
destroying data.

Let Me Explain You A Cyber Attack With An


Example
Literature Review :
 Cybersecurity is the process of safeguarding sensitive data, computer systems, networks,
and software from online attacks. These attacks, which vary widely, include altering
existing information, resource misuse, unauthorized access to systems, endangering
company operations, and employing ransomware to disrupt data and extort money. As
attacks become more sophisticated, defending against them can strain companies and
security professionals.

Common Types of Attacks:

1. Phishing:
- Definition: Tricking victims into revealing sensitive information via text, phone, or email.
- Example: Cybercriminals impersonate authorized representatives to obtain data like
passwords and credit card numbers, leading to identity theft or financial losses.
2. Malware:

- Definition: Malicious software designed to harm networks or exploit devices for data
extraction.
- Example: Viruses, worms, Trojan horses, ransomware, and spyware are forms of
malware. Precautions include using antivirus software and being cautious with email
attachments.

3. DOS Attack (Denial-of-Service):

- Definition: Disrupting services to make a machine or network resource unavailable.


- Example: Overloading a system with excessive requests to prevent legitimate requests
from being fulfilled.

4. Social Engineering:

- Definition: Manipulating people to compromise security, often through psychological


tactics.
- Example: Tricking individuals into sharing sensitive information, downloading harmful
software, or making mistakes that compromise security.
Research Methodology:

 Objective:
- Understand the current state of cybercrime globally.
 Methodology:
- Examine international literature on legal aspects.
- Analyze major cybercrime events from the previous year.
 Focus:
- Study global cyber-attacks, their operations, and potential
impacts on individuals and companies.
- Concentrate on attacks identified and monitored over the past
three years.
 Data Sources:
- Limited information from businesses, so reliance on
- News reports.
- Attack histories.
- Reports and surveys by global security consulting and anti-
malware services.
Results:
- Key Findings:
- The study shows how different types of cyber-attacks target specific industries.
- Cyber espionage mainly focuses on government, media, and law enforcement, while cybercrime affects all business
sectors.
- Unauthorized access is shifting from physical to logical, and internal factors play a role in these attacks.
- Mobile attacks are increasing due to widespread smartphone use, posing risks with stored personal information.
- The results highlight changing trends in cyber threats.

- Results Categorized Into Four Practices:

1. Basic Cyber Security Awareness:


- Questions about recognizing phishing, understanding HTTP vs. HTTPS, and general awareness of cyber attacks.

2. Password Security and Authentication:


- Questions about creating strong passwords, avoiding weak ones, and using two-step authentication (2FA).

3. Cyber Security Practices and Response:


- Questions about how people respond to phishing emails, awareness of risks with public Wi-Fi, and personal
experiences with cyber-attacks.

4. Software and Social Engineering Awareness:


- Questions about the role of antivirus software and awareness of social engineering tactics.
Recommendations:
1. Train Your Team:
- Teach your employees to spot and avoid fake emails, a common way for online
criminals to get in.

2. Update Your Software:


- Always update your computer programs with a patch system to fix any
weaknesses.

3. Protect Your Devices:


- Use endpoint protection for gadgets linked to work networks and set up a
firewall to stop different online attacks.

4. Backup Your Data:


- Regularly save your information to minimize any downtime if there's an online
attack.
5. Secure Your Wi-Fi:
- Make sure your Wi-Fi is safe to block threats from devices.

6. Individual Logins:
- Have separate logins for each employee to reduce the chance of attacks.

7. Strong Passwords:
- Use a variety of strong, changing passwords for better security.
Conclusion:
- **Significant Challenge:**
Dealing with Cybercrime is a Big Problem for the Whole World.

- **Global Awareness:**
-It's really important for people and companies to know about
cybercrime all around the world so that they can fight against it
effectively

- **Shared Responsibility:**
- Every individual, company, or authority must establish and
maintain personalized security.

THANK YOU!

You might also like