Cybersecurity
Cybersecurity
CYBERCRIME TYPES
1. Malware
2. Phishing
3. Dos
4. Attack man in the middle attack
5. Drive by download attack
1. MALWARE
Malware is a broad face that encompasses a wide range of cyber-attacks such as Trojans
viruses and worms malware is simply described as code written to steal data or to
destroy things on a computer
Malware is basically any piece of software that is designed with the intent to damage
disrupt or gain unauthorized access to our device and even inflict harm to data in multiple
ways.
Types of malwares
viruses
worms
Trojans
Viruses
Viruses like their biological namesakes attach to and infect clean files
They can even spread uncontrollably causing damage to the core functionality as
well as deleting and corrupting files
they typically manifest as executable files downloaded from the internet by the
active user
virus need an already infected at active operating system or program to attack the
computer usually spread via infected websites file sharing or email attachment
downloads.
Worms
worms uses the network interface to infect an entire network or devices either
locally or remotely or via the internet.
with each infected machine it infects more machines
worms are spread via soft vulnerabilities too.
Trojans
malware that masquerades legitimate software that can be hacked
it prefers to operate and create security back doors through which other
viruses can enter the system because it looks trustworthy users download it.
Trojan themselves are a doorway unlike a worm they need to host the work.
2. PHISHING
fishing phishing frequently disguises itself as a request for information from a
trustworthy third party
consumers are sent phishing emails in which they are invited to click on a link and
enter their personal information
phishing emails have become more complex in recent years making it difficult for
some people to distinguish between a legitimate request for information and a
fraudulent one
although phishing emails are sometimes confused with spam the spam messages they
are far more dangerous than the than a simple advertisement
This type of attack involves hackers sending malicious emails attachment or URL to
users to gain access to their accounts or computer.
cyber criminals are becoming more established and many of these emails are not
flagged as spam users are tricked into emails or not flagged as spam
Phishing consists of five steps:
preparation
setup
carry out
recording the data
identity theft
preparation or planning step
the official must decide which businesses to target and how to obtain
email addresses from those businesses customers
set up
after deciding which firm to imitate and who their victims will be they
will begin the setup process
fishers create communications to distribute them and collect data the third
phase of phishing is
carry out
Carry out the attack most people are familiar with this step the fisher
sends a bogus message that appears to be from a reputable source.
recording data or data collection
The official keeps track of the information that victims enter into websites
or pop-up windows.
identity theft and fraud
Officials use the information they collect to take make fraudulent
transactions and up to a quarter of victims never fully recover from
phishing attack.
4. MAN-IN-THE-MIDDLE ATTACK
The middle attack can obtain information from the end user and the entity with which he
or she is communicating by impersonating the end point in online information exchange
a man in the middle attack is a type of aves dropping attack where attackers interrupt an
existing conversation of data transfer.
Man in the middle attack the man in: of data transfer after inserting themselves in the
middle of the transfer the attacker pretend to be both legitimate participants
How the man in the middle attack works?
first the attacker sets up a fake chat service that mimics that of a well-known bank using
the knowledge gain from the first step the attacker pretends to be the bank
and starts a chat with the target then the attacker starts a chat on the real bank website
pretending to be the target or the user and passing all the needed information to gain
access to the targets account.
CONCLUSION:
India was the country with highest number of attacks with 4.5 million cybercrime
attacks in 2020.
cybercrime is unauthorized access to computer systems and criminal behavior
Cyber security provides a thorough understanding of how cyber-attack can be
controlled or recovered online courses provide advice on.
How cybercrime and cyber hazards can be prevented.
******************