Cyber Attacks. Akash Khurana
Cyber Attacks. Akash Khurana
Cyber Attacks. Akash Khurana
by Akash Khurana
What Are Cyber Attacks?
1 Definition
Cyber attacks are deliberate attempts to
breach the security of computer systems,
networks, or digital devices for malicious
purposes.
2 Impact
Such attacks can lead to data breaches,
theft of sensitive information, financial
loss, reputation damage, and even
disruption of critical services.
Malware: A Hidden E nemy
Malware is malicious software that damages or disrupts
computer systems.
Malware can infect networks and devices and is designed to
harm those devices, networks and/or their users in some way.
Depending on the type of malware and its goal, this harm may
present itself differently to the user or endpoint. In some
cases, the effect malware has is relatively mild and benign,
and in others, it can be disastrous.
No matter the method, all types of malware are designed to
exploit devices at the expense of the user and to the benefit
of the hacker -- the person who has designed and/or deployed
the malware..
by Akash Khurana
Real-life examples include the notorious Stuxnet and NotPetya
attacks.
Phishing: Hook, Line and Sinker
Phishing attacks are fraudulent emails, text messages,
phone calls or web sites designed to trick users into
downloading malware, sharing sensitive information
or personal data (e.g., Social Security and credit card
numbers, bank account numbers, login credentials),
or taking other actions that expose themselves or
their organizations to cybercrime.
Successful phishing attacks often lead to identity
theft, credit card fraud, ransomware attacks, data
breaches, and huge financial losses for individuals
and corporations.
x`
person stalking, can take the form of e-mails, text messages,
social media posts, and more and is often methodical,
deliberate, and persistent.Most of the time, the interactions do
not end even if the recipient expresses their displeasure or asks
the person to stop. The content directed at the target is often
inappropriate and sometimes even disturbing, which can leave
the person feeling fearful, distressed, anxious, and worried.
x`
certain individual.
The first step is to manipulate the victim’s contacts into
thinking the fake profile belongs to a real person they can trust.
Then, the end goal is to use that impression of authenticity to
exploit those who interact with the fake account (by asking for
information, money, or discrediting the owner of the account).