***Welcome to ashrafedu.blogspot.com * * * This website is maintained by ASHRAF***

Posts

    Latest Updates

    Sunday, April 24, 2022

    Cyber threats

    Cyber threats are security incidents or circumstances with the potential to have a negative outcome for your network or other data management systems.

    Examples of common types of security threats include phishing attacks that result in the installation of malware that infects your data, failure of a staff member to follow data protection protocols that cause a data breach, or even a tornado that takes down your company’s data headquarters, disrupting access.

    Threats can be categorized as circumstances that compromise the confidentiality, integrity or availability of an asset, and can either be intentional or accidental.

    Motive of Attackers

    The categories of cyber-attackers enable us to better understand the attackers' motivations and the actions they take.

    Cyber security risks arise from three types of actions:

    i) inadvertent actions (generally by insiders) that are taken without malicious or harmful intent. ii) deliberate actions (by insiders or outsiders) that are taken intentionally and are meant to do harm and

    iii) inaction (generally by insiders), such as a failure to act in a given situation, either because of a lack of appropriate skills, knowledge, guidance, or availability of the correct person to take action.


    Primary concern here are deliberate actions, of which there are three categories of motivation.

    1. Political motivations: examples include destroying, disrupting, or taking control of targets; espionage; and making political statements, protests, or retaliatory actions.

    2. Economic motivations: examples include theft of intellectual property or other economically valuable assets (e.g., funds, credit card information); fraud; industrial espionage and sabotage; and blackmail.

    3. Socio-cultural motivations: examples include attacks with philosophical, theological, political, and even humanitarian goals. Socio-cultural motivations also include fun, curiosity, and a desire for publicity or ego gratification.

    Types of cyberthreats include:

    I. Cyber warfare refers to the use of digital attacks -- like computer viruses and hacking -- by one country to disrupt the vital computer systems of another, with the aim of creating damage, death and destruction. Future wars will see hackers using computer code to attack an enemy's infrastructure, fighting alongside troops using conventional weapons like guns and missiles. 

    Cyber warfare involves the actions by a nation-state or international organization to attack and attempt to damage another nation's computers or information networks through, for example, computer viruses or denial-of-service attacks.

    II. Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device.Cybercrime is committed by cybercriminals or hackers who want to make money. Cybercrime is carried out by individuals or organizations.

    Some cybercriminals are organized, use advanced techniques and are highly technically skilled. Others are novice hackers.

    III. Cyber terrorism is the convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.

    Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, Denial-of-service attacks, or terroristic threats made via electronic communication.

    IV. Cyber espionage or Cyber spying, is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information from

    individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet.


     


    No comments:

    Post a Comment

    Network session analysis

    Network session analysis Network session analysis is a method of monitoring network activity and availability to identify issues, such as ...