Académique Documents
Professionnel Documents
Culture Documents
Cyber?
Cyber Attack?
Types of Cyber Attacks
History of Cyber Attack
Cyber Crime?
Cyber Security?
Advantage of Cyber Security
Safety Tips To Cyber Attack
Cyber attack
• An Attack is any attempt to expose, alter, disable, destroy, steal or
gain unauthorized access to or make unauthorized use of an asset.
• An Attacker is a person or process that attempts to access data,
functions or other restricted areas of the system without
authorization, potentially with malicious intent.
• A cyber attack is any type of offensive maneuver that targets
computer information systems, infrastructures, computer networks,
or PC devices.
Vulnerabilities
• is a weakness in design,
implementation, operation or
internal control.
• is a weakness which can be
exploited by a threat actor, such
as an attacker, to perform
unauthorized actions within a
computer system.
Types of Cyber Attacks
1. Hacking
• refers to activities that seek to compromise digital devices, such as
computers, smartphones, tablets, and even entire networks.
• Simply it means an illegal intrusion into a computer system and/or
network.
Hacker
• The person engaged in
hacking activities.
Types of Hackers:
500M accounts
The South Korean nightmare
8. 100M accounts 2. Hold Security by Russian
Hackers
2nd largest US discount retail
chain
1.2B accounts
7. 110M accounts 1.
Yahoo mail
A marketing analytics firm
6. 3B accounts
123M accounts
American credit company
HBO lost 1.5 terabytes of
5. data, including TV show
143M accounts episodes, scripts, manager
emails and some Game of
Thrones actors’ phone
numbers
Cybercrime
• Cyber crime is an activity done using computers and internet. We can
say that it is an unlawful acts wherein the computer either a tool or
target or both.
• is a crime that involves a computer and a network.
• Cybercrime may threaten a person or a nation's security and financial
health.
Categories of Cybercrime
• We can categorize cybercrime in 2 ways:
CIA Model
Cyber Crime
– This term falls under Confidentiality and Integrity. i.e. breaking into systems to steal
sensitive information or modifying it to render it useless to the organization being
attacked.
Cyber Attack
– This could very well full under each category, but it best fits under Availability.
Individuals who are performing cyber attacks are most likely attempting Denial Of
Service(DOS) or Distributed Denial Of Service(DDOS) to bring down websites or
resources that users are attempting to use.
Cyber Security