0% found this document useful (0 votes)
16 views11 pages

Cyber Attack

The document discusses different types of cyber attacks including malware, phishing, man-in-the-middle attacks, and ransomware. It provides details on what each type of attack entails and how attackers carry them out. Prevention methods are also covered such as using strong passwords, two-factor authentication, updating security software, avoiding public WiFi, and backing up data regularly.

Uploaded by

Mansha Kumari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views11 pages

Cyber Attack

The document discusses different types of cyber attacks including malware, phishing, man-in-the-middle attacks, and ransomware. It provides details on what each type of attack entails and how attackers carry them out. Prevention methods are also covered such as using strong passwords, two-factor authentication, updating security software, avoiding public WiFi, and backing up data regularly.

Uploaded by

Mansha Kumari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CYBER ATTACKS

MEANING OF CYBER ATTACKS


• A cyber attacks is a malicious and deliberate attempt by an individual or organisation
to breach the information system of another individual or organisation
• It is an attempt to damage disrupt or gain un authorised access to a computer system
or electronic communication network.
• According to the internet crime report (2020),the FBI stated that it receives an
average of 2000 cybercrime complaints per day

• According to Cisco Annual cyber security report, the total volume of events has
increased almost fourfold between January 2016 and October 2017.
• These attacks will cost $10.5 trillion annually by 2025
• 53% of cyber attacks resulted in damage of $ 500000 or more.
Classification of cyber attacks
Active attacks Passive attacks

• In active attack attacker may change the • In passive attacks attacker goal is just obtain
data or harm the computer resources. In the information. Attackers do not modify the
this attack attackers attempt to alter the data and harm the system. Passive attack can
operations of a computer system and be prevented by encryption.
resources.
• In passive attacks intruder monitor the
• In other words attack which lead to network and scan for open part and
interruption, modification and vulnerabilities. The purpose is to gain
fabrication of that are come under the information about the target and no data is
category of active attacks. changed in the target system.
TYPES OF CYBER ATTACK

• Malware
• Phishing
• Man-in-the-middle
• Denial-of-service attack
• Cross- Site Scripting
• Ransomware
• Password Attack
• Trojan Horses
• Drive-By Download Attack
MALWARE
Malware is considered as software that deliberately developed to disrupt computers,
servers, and other computer networks.

• Blocks access to key components.


• Install harmful software.
• Steal valuable information from your system.
• Can damage certain hardware components.
PHISHING
Phishing is a form of social engineering commonly used to steal user data such as credit
Card numbers and credentials for logging in.

• Take fraudulent action to cheat users.


• Steal restricted and private information.
MAN-IN-THE-MIDDLE
In Man-in-the-middle (MitM), the invader can modify the chats and dialogues between two
individuals who communicates with each other

• Interference from the third party.


• Modify chats.
RANSOMWARE
Ransomware is a kind of malware attack that restricts access to your devices or files and
displays pop-up message that demands payment for the restriction to be removed.

• Restricts access to devices


• Contains malicious attachments.
TROJAN HORSES
Trojans are considered among the most dangerous types of all malware, as they are
often designed to steal financial information

• Influence a victim to install it.


• They are specially designed to steal financial information.
PREVENTION OF CYBER ATTACKS
1. To protect your accounts, practice good security hygiene These include using strong passwords, two factor authentication and
downloading the latest security updates. The two step isn’t the strongest as the SMS can be intercepted by internet provider,
government.
2. Prevent from unnecessary downloads Delete all the unnecessary apps and try to browse from the browser as they can’t access
the much information as an app can.
• Secured Network
Avoid using public Wi-Fi as your data might be vulnerable for hacking.
. For secured network, you should still use the firewall.
• Protect your identity
Don’t share your public information publicly. Less information, much safer.
• Use VPN( Virtual Private Network)
An online service to hide your real IP address an encrypt your online communications.
Don’t keep Bluetooth and location services on.
• Act responsibly when disposing of your old computer. Use disk-wipe utility program which can wipe your data and overwrites it
many times.
Physically destroy the hard drive
• Shut down when you’re done using your computer.
• Back up your data on a regular basis.
• Turn off ad personalisation to resist from invasive tracking.
Submitted by Mansha Kumari
Course: Bcom ( Hons)
Roll no: 23/com/076

You might also like