Vous êtes sur la page 1sur 28

Contents

 Cyber?
 Cyber Attack?
 Types of Cyber Attacks
 History of Cyber Attack
 Cyber Crime?
 Cyber Security?
 Advantage of Cyber Security
 Safety Tips To Cyber Attack
Cyber attack
• An Attack is any attempt to expose, alter, disable, destroy, steal or
gain unauthorized access to or make unauthorized use of an asset.
• An Attacker is a person or process that attempts to access data,
functions or other restricted areas of the system without
authorization, potentially with malicious intent.
• A cyber attack is any type of offensive maneuver that targets
computer information systems, infrastructures, computer networks,
or PC devices.
Vulnerabilities

• is a weakness in design,
implementation, operation or
internal control.
• is a weakness which can be
exploited by a threat actor, such
as an attacker, to perform
unauthorized actions within a
computer system.
Types of Cyber Attacks

1. Hacking
• refers to activities that seek to compromise digital devices, such as
computers, smartphones, tablets, and even entire networks.
• Simply it means an illegal intrusion into a computer system and/or
network.

Hacker
• The person engaged in
hacking activities.
Types of Hackers:

• Individuals with • Individuals • Individuals


extraordinary
computing who work both professing hacker
skills, resorting offensively and skills and using them
to malicious or defensively at for defensive
destructive various times. purposes.
activities.
• Crackers. • Security Analysts.
2. Denial-of-service attack(Dos)
• is a cyber-attack in which the perpetrator seeks to make a machine or
network resource unavailable to its intended users by temporarily or
indefinitely disrupting services of a host connected to the Internet.
• Act by the criminal, who floods the bandwidth of the victims
network.
3. Malware
• The word "malware" comes from the term "MALicious softWARE."
• Malicious software is any software intentionally designed to cause
damage to a computer, server, client, or computer network.
• Malware does the damage after it is implanted or introduced in some
way into a target's computer and can take the form of executable
code, scripts, active content, and other software.
4. Viruses
• A Virus is a “program that is loaded onto your computer without your
knowledge and runs against your wishes.
• Malicious software that attaches itself to other software. (worms,
Trojan Horse, web jacking, e-mail bombing etc.)
5. Trojan Horses
• Trojan horses are email viruses that can duplicate themselves, steal
information, or harm the computer system.
• These viruses are the most serious threats to computers
6. Spyware
• Spyware is software that aims to gather information about a person
or organization, sometimes without their knowledge, that may send
such information to another entity.
7. Keystroke logging
• Often referred to as keylogging or keyboard capturing
• Is the action of recording (logging) the keys struck on a keyboard,
typically covertly, so that person using the keyboard is unaware that
their actions are being monitored.
• A keylogger can be either software or hardware.
8. Phishing
• Phishing is the fraudulent attempt to obtain sensitive information
such as usernames, passwords and credit card details.
• It is tying to get you to follow a link and provide information to the
sender, like a password or an account number.
9. Backdoor
• A Backdoor in a system is a method of bypassing normal
authentication and gain access.
• The Backdoor access method is sometimes written by the programmer
who develops the program.
• Hackers use backdoors to install malicious software or programs,
modify code or detect files and gain system access.
History of Cyber Attack
• The first recorded cyber attack took place in 1820.
• The first spam email took place in 1976 when it was sent out over the
ARPANT.
• The first virus was installed on an Apple computer in 1982 when a
high school student, Rich skrenta, developed the EIK Cloner.
• The number of cyber attacks has grown up steadily during the last few
years.
• A report (sponsored by McAfee), published in 2014, estimated that
the annual damage to the global economy was $445 billion.
Continued…

• In 2016, 758 million malicious attacks occurred according to


Kaspersky Lab, (an attack launched every 40 seconds).
• In 2018, a study by Center for Strategic and International Studies
(CSIS), in partnership with McAfee, concludes that close to $600
billion, nearly 1% of global GDP, is lost to cybercrime each year.
• Ransomware was under the spotlight with the WannaCry and
NotPetya attacks which temporarily paralyzed many large
companies and organizations.
Here is Top 10 world's largest cyber attacks
the dating site

2.9M accounts 400M


10. 4.
accounts

9. 77M accounts 3. Marriott hotel

500M accounts
The South Korean nightmare
8. 100M accounts 2. Hold Security by Russian
Hackers
2nd largest US discount retail
chain
1.2B accounts
7. 110M accounts 1.
Yahoo mail
A marketing analytics firm
6. 3B accounts
123M accounts
American credit company
HBO lost 1.5 terabytes of
5. data, including TV show
143M accounts episodes, scripts, manager
emails and some Game of
Thrones actors’ phone
numbers
Cybercrime
• Cyber crime is an activity done using computers and internet. We can
say that it is an unlawful acts wherein the computer either a tool or
target or both.
• is a crime that involves a computer and a network.
• Cybercrime may threaten a person or a nation's security and financial
health.
Categories of Cybercrime
• We can categorize cybercrime in 2 ways:

1. The computer as a target :-


e.g. Hacking, virus/worms attacks, Dos
using a computer to attacks other
attack etc.
computer

2. The computer as a weapon :-


e.g. cyber terrorism, credit card fraud
using a computer to commit real
and pornography etc.
world crime
Cyber Attack vs Cyber Crime
Cyber attack is just a part
of Cyber Crime.

CIA Model

Cyber Crime
– This term falls under Confidentiality and Integrity. i.e. breaking into systems to steal
sensitive information or modifying it to render it useless to the organization being
attacked.
Cyber Attack
– This could very well full under each category, but it best fits under Availability.
Individuals who are performing cyber attacks are most likely attempting Denial Of
Service(DOS) or Distributed Denial Of Service(DDOS) to bring down websites or
resources that users are attempting to use.
Cyber Security

• Also known as Computer security,


or information technology security
(IT security).
• It is the protection of computer
systems from theft or damage to
their hardware, software or
electronic data, as well as from
disruption or misdirection of the
services they provide.

• It is practice of defending computers, servers, mobile devices,


electronic systems, networks, and data from malicious attacks.
Continued…
• The field is growing in importance due to increasing reliance on
computer systems, the Internet and wireless networks such
as Bluetooth andWi-Fi, and due to the growth of "smart" devices.
• With an increasing amount of people getting connected to Internet,
the security threats that cause massive harm are increasing also.
• It's objective is to establish rules and measure to use against attacks
over the Internet.
Some common categories:
• Network security is the practice of securing a computer network
from intruders.
• Application security focuses on keeping software and devices free
of threats. A compromised application could provide access to the data
its designed to protect.
• Information security protects the integrity and privacy of data,
both in storage and in transit.
• Internet security is a branch of computer security specifically related
to not only the Internet, often involving browser security and the
WWW.
• Mobile security, or more specifically mobile device security.
Advantage of Cyber Security
• Defend us from critical attacks.
• Browse the safe website.
• Internet security process all the incoming and outgoing data on our
computer.
• It will defend us from hacks and virus.
• Application of cyber security used in our PC needs update every week.
Safety Tips To Cyber Attack
• Train employees in cyber security • Use a firewall for your Internet
principles. connection.

• Install, use and regularly update • Download and install software


antivirus and antispyware software updates for your operating systems
on every computer used in your and applications as they become
business. available.
Continued…
• Make backup copies of important • Secure your Wi-Fi networks & make
business data and information. it hidden.

• Control physical access to your • Regularly change passwords.


computers and network
components.

Vous aimerez peut-être aussi