Cyber-attack

• Attack, via cyberspace – targets an enterprise’s use of cyberspace for the purpose
of disrupting, disabling, destroying, or maliciously controlling a computing
environment/infrastructure or destroying the integrity of the data or stealing controlled information.
• Leads to loss of money, theft of personal information, theft of financial and medical
information – damages reputation and safety.
• common types – Malware, Phishing, Man-in-the-
middle attack, Denial-of-service attack, SQL injection etc.
Malwares
• Malicious software.
• Software installed on a victim’s computer
without consent.
• Compromises the operation of a system by performing an unauthorized function or process.
• Breaches a network through a vulnerability –
typically when a user clicks a dangerous link or email attachment → installs risky software.
• Includes spyware, ransomware, viruses, and
worms.
Ransomware
• A type of malware – prevents from accessing someone’s computer or data on it.
• Encrypts files on a device and blocks access to key
components of the network.
• Result – computer becomes locked or the data is stolen,
deleted or encrypted.
• Extortion attack – payment demanded to unlock the
computer or access the data.
Victim asked to contact the attacker via an anonymous email address or follow instructions on an anonymous web page.
Payment demanded in a cryptocurrency such as
Bitcoin
• Impact:
Loss of money.
devastating to an individual or organization.
severely impacts business
processes.
• Infamous ransomware attacks
WannaCry malware/ransomware – 2017
Petya Ransomware – 2016
Ryuk ransomware – 2018 etc.

You must be logged in to post a comment.