lecture 3 Flashcards
What is a cyber attack?
an attempt by cybercriminals, hackers or other digital adversaries to access a computer network or system, usually for the purpose of altering, stealing, destroying or exposing information.
What are the goals of hackers towards businesses or organizations?
the hacker’s goal is usually to access sensitive and valuable company resources, such as intellectual property (IP), customer data or payment details.
Most common types of Cyber Attacks
Gaining, or attempting to gain, unauthorized access to a computer system or its data.
Unwanted disruption or denial of service attacks, including the take down of entire web sites.
Installation of viruses or malware - that is malicious code on a computer system.
Unauthorized use of a computer system for processing or storing data.
Changes to the characteristics of a computer system’s hardware, firmware or software without the owner’s knowledge, instruction or consent, and
Inappropriate use of computer systems by employees or former employees.
Types of cyber Attacks
Malware
Phishing
Ransomware
Denial of Service
Man in the middle
Cryptojacking
SQL injection
Exploits
Denial of service
A denial-of-service (DoS) attack is designed to prevent online services from working efficiently, also known as abrute-force attack. It is typically caused by an attacker flooding a website with huge amounts of traffic or requests, in an attempt to overwhelm its systems and take them offline.
A more advanced DoS form is a distributed denial-of-service(DDoS) attack, through which an attacker takes control of several computers to overload its target.
Man in the middle attacks
MITMattacks enable a malicious actor to position themselves between the target victim and an online service the user accesses. An example of this is an attacker creating a spoofed, free-to-access Wi-Fi network. When the user connects to or signs into the network, the attacker can steal the login credentials and data they use while on it.