Notes on Cyber Security and Types of Cyber Attacks

Jul 29, 2024

Cyber Security and Cyber Attacks

Introduction to Anne's Situation

  • Anne often shops online at ShoppingCart.com.
  • Her personal information and payment details are saved for convenience.
  • She received a fraudulent email claiming eligibility for a discount voucher, leading to unauthorized account access.
  • This incident is classified as a cyber attack, carried out by a hacker.

Understanding Cyber Security

  • Cyber security: Techniques to secure digital systems, networks, and data from unauthorized access.
  • Essential for individuals and organizations to prevent cyber attacks.

Types of Cyber Attacks

  1. Malware Attack

    • Includes viruses like Trojan, adware, and spyware.
    • Risk increases when downloading suspicious attachments.
  2. Phishing Attack

    • A method of fraudulently obtaining sensitive data.
    • Hackers send emails appearing to be from legitimate sources.
  3. Man-in-the-Middle Attack

    • Hacker intercepts communication between a user and a server.
    • Frequently occurs over unsecured Wi-Fi networks.
  4. Password Attack

    • Involves cracking passwords through common guesses or combinations.
    • Emphasizes the importance of strong passwords.

Cyber Security Practices Employed by Anne

  • Firewalls:

    • Acts as a barrier between the user's computer and the internet.
    • Filters incoming and outgoing traffic.
  • Honeypots:

    • Decoy systems made to attract attackers.
    • Helps defend real systems by misleading attackers.
  • Secure Practices:

    • Use of unique alphanumeric passwords.
    • Installation of antivirus software.
    • Avoiding emails from unknown senders.

Cyber Attacks Faced by Organizations

  • Organizations face more severe cyber threats, leading to significant losses.
  • Common types of attacks:
    1. Advanced Persistent Threat (APT):
      • Hackers infiltrate networks for extended periods to secure confidential information.
    2. Denial of Service (DoS) Attack:
      • Networks are overwhelmed with traffic, hindering legitimate requests.
    3. Distributed Denial of Service (DDoS):
      • Similar to DoS; uses multiple systems to attack.
    4. SQL Injection Attack:
      • Manipulation of SQL queries to edit or delete data in databases.

Cyber Security Roles

  • Various careers in cyber security include:
    • Ethical Hacker:
      • Tests network vulnerabilities to protect against actual attacks.
    • Security Architect:
      • Designs robust security systems.
    • Chief Information Security Officer (CISO):
      • Responsible for organizational information security.

Conclusion

  • Cyber attacks are expected to increase, creating a need for cybersecurity professionals.
  • A career in this field promises growth and lucrative opportunities.
  • Call to action: Get certified in cybersecurity through Simply Learn.

  • Question posed: What type of cyber attack involves taking over the client's IP address?
    • a) DDoS attack
    • b) Man-in-the-Middle attack
    • c) Phishing attack
    • d) Password attack

  • Encouragement to like, subscribe, and stay tuned for more information.