Podcast
Questions and Answers
Why is it easy for an insider attacker to steal sensitive information?
Why is it easy for an insider attacker to steal sensitive information?
What is the purpose of an internal intrusion detection system (IDS) in an organization?
What is the purpose of an internal intrusion detection system (IDS) in an organization?
What is the result of a cyber attack on an organization?
What is the result of a cyber attack on an organization?
How can external attacks be traced?
How can external attacks be traced?
Signup and view all the answers
What type of attack is performed by amateur attackers?
What type of attack is performed by amateur attackers?
Signup and view all the answers
What is the characteristic of a structured attack?
What is the characteristic of a structured attack?
Signup and view all the answers
Why do unstructured attacks occur?
Why do unstructured attacks occur?
Signup and view all the answers
What is the main difference between an insider attack and an external attack?
What is the main difference between an insider attack and an external attack?
Signup and view all the answers
What type of individuals usually perform sophisticated cyber attacks?
What type of individuals usually perform sophisticated cyber attacks?
Signup and view all the answers
What motivates people to commit cyber crimes for quick and easy money?
What motivates people to commit cyber crimes for quick and easy money?
Signup and view all the answers
What is the primary reason why cyber crimes are on the rise?
What is the primary reason why cyber crimes are on the rise?
Signup and view all the answers
What type of cyber crime is motivated by revenge?
What type of cyber crime is motivated by revenge?
Signup and view all the answers
Why do some individuals commit cyber crimes just for fun?
Why do some individuals commit cyber crimes just for fun?
Signup and view all the answers
What motivates some individuals to commit cyber crimes for recognition?
What motivates some individuals to commit cyber crimes for recognition?
Signup and view all the answers
What is a major factor that motivates individuals to commit cyber crimes?
What is a major factor that motivates individuals to commit cyber crimes?
Signup and view all the answers
What is the primary goal of hacking?
What is the primary goal of hacking?
Signup and view all the answers
What is the result of a URL injection attack?
What is the result of a URL injection attack?
Signup and view all the answers
Why do some individuals commit cyber crimes despite being respectable citizens?
Why do some individuals commit cyber crimes despite being respectable citizens?
Signup and view all the answers
What is cross-site scripting (XSS) used for?
What is cross-site scripting (XSS) used for?
Signup and view all the answers
What is a traditional view of hackers?
What is a traditional view of hackers?
Signup and view all the answers
What can a malicious hacker do due to weaknesses in IT infrastructure?
What can a malicious hacker do due to weaknesses in IT infrastructure?
Signup and view all the answers
What is the common association of hacking with illegal activity?
What is the common association of hacking with illegal activity?
Signup and view all the answers
What can be the result of a visitor's action on a webpage infected with XSS?
What can be the result of a visitor's action on a webpage infected with XSS?
Signup and view all the answers
What devices can be misused by hackers?
What devices can be misused by hackers?
Signup and view all the answers
What is the common way spywares are downloaded into a host computer?
What is the common way spywares are downloaded into a host computer?
Signup and view all the answers
What is the primary function of a keylogger-type spyware?
What is the primary function of a keylogger-type spyware?
Signup and view all the answers
What is the main difference between a virus and a worm?
What is the main difference between a virus and a worm?
Signup and view all the answers
How do Trojan horses typically spread to a host computer?
How do Trojan horses typically spread to a host computer?
Signup and view all the answers
What is the primary characteristic of a worm?
What is the primary characteristic of a worm?
Signup and view all the answers
What is the effect of a worm on a network?
What is the effect of a worm on a network?
Signup and view all the answers
What is the primary function of a virus?
What is the primary function of a virus?
Signup and view all the answers
What is required to activate a virus in a host computer?
What is required to activate a virus in a host computer?
Signup and view all the answers
What is the primary goal of an IP address spoofing attack in a DoS attack?
What is the primary goal of an IP address spoofing attack in a DoS attack?
Signup and view all the answers
What is the purpose of ARP in a LAN?
What is the purpose of ARP in a LAN?
Signup and view all the answers
What is the result of a successful ARP spoofing attack?
What is the result of a successful ARP spoofing attack?
Signup and view all the answers
What is the main difference between IP address spoofing and ARP spoofing attacks?
What is the main difference between IP address spoofing and ARP spoofing attacks?
Signup and view all the answers
What is the common use of IP address spoofing attacks?
What is the common use of IP address spoofing attacks?
Signup and view all the answers
What is the purpose of an attacker in an ARP spoofing attack?
What is the purpose of an attacker in an ARP spoofing attack?
Signup and view all the answers
What is the target of an IP address spoofing attack?
What is the target of an IP address spoofing attack?
Signup and view all the answers
What is the goal of an attacker in spoofing a computer or device's IP address?
What is the goal of an attacker in spoofing a computer or device's IP address?
Signup and view all the answers
What is the primary goal of a Trojan horse?
What is the primary goal of a Trojan horse?
Signup and view all the answers
What is the main difference between a rootkit and other types of malware?
What is the main difference between a rootkit and other types of malware?
Signup and view all the answers
What is the primary goal of ransomware?
What is the primary goal of ransomware?
Signup and view all the answers
What is the result of a Denial-of-Service (DoS) attack?
What is the result of a Denial-of-Service (DoS) attack?
Signup and view all the answers
What is the primary function of a rootkit?
What is the primary function of a rootkit?
Signup and view all the answers
What is the common association of Trojans?
What is the common association of Trojans?
Signup and view all the answers
What is the primary target of a ransomware attack?
What is the primary target of a ransomware attack?
Signup and view all the answers
What is the result of a successful rootkit infection?
What is the result of a successful rootkit infection?
Signup and view all the answers
What is the goal of a phishing attack?
What is the goal of a phishing attack?
Signup and view all the answers
What is a common characteristic of phishing emails?
What is a common characteristic of phishing emails?
Signup and view all the answers
What type of cyber attack involves tricking a user into installing malware?
What type of cyber attack involves tricking a user into installing malware?
Signup and view all the answers
What is the primary goal of a cyber espionage attack?
What is the primary goal of a cyber espionage attack?
Signup and view all the answers
What type of malware is used to capture a user's keystrokes?
What type of malware is used to capture a user's keystrokes?
Signup and view all the answers
What is the primary function of a worm?
What is the primary function of a worm?
Signup and view all the answers
What type of cyber attack involves an attacker claiming to be a wealthy Nigerian prince?
What type of cyber attack involves an attacker claiming to be a wealthy Nigerian prince?
Signup and view all the answers
What is a common way spyware is downloaded onto a host computer?
What is a common way spyware is downloaded onto a host computer?
Signup and view all the answers
What type of malware is designed to track the cookies of a host computer?
What type of malware is designed to track the cookies of a host computer?
Signup and view all the answers
Which type of malware can replicate itself without human intervention?
Which type of malware can replicate itself without human intervention?
Signup and view all the answers
What is the primary function of a Trojan Horse?
What is the primary function of a Trojan Horse?
Signup and view all the answers
What is the effect of a worm on a network?
What is the effect of a worm on a network?
Signup and view all the answers
What is required to activate a virus in a host computer?
What is required to activate a virus in a host computer?
Signup and view all the answers
What type of malware is typically downloaded into a host computer while downloading freeware?
What type of malware is typically downloaded into a host computer while downloading freeware?
Signup and view all the answers
What is the primary function of a keylogger-type spyware?
What is the primary function of a keylogger-type spyware?
Signup and view all the answers
What is the main difference between a virus and a worm?
What is the main difference between a virus and a worm?
Signup and view all the answers
What is the primary goal of whaling?
What is the primary goal of whaling?
Signup and view all the answers
What is the purpose of Adware?
What is the purpose of Adware?
Signup and view all the answers
What is the primary function of Spyware?
What is the primary function of Spyware?
Signup and view all the answers
What is the purpose of Malware?
What is the purpose of Malware?
Signup and view all the answers
What is the primary function of a Virus?
What is the primary function of a Virus?
Signup and view all the answers
What is the primary characteristic of a Worm?
What is the primary characteristic of a Worm?
Signup and view all the answers
What is the result of a Worm on a network?
What is the result of a Worm on a network?
Signup and view all the answers
What is the primary function of a Keylogger-type Spyware?
What is the primary function of a Keylogger-type Spyware?
Signup and view all the answers
What was the primary goal of the Stuxnet virus in the Natanz nuclear facility?
What was the primary goal of the Stuxnet virus in the Natanz nuclear facility?
Signup and view all the answers
What was the result of the fake Twitter message sent by the Syrian Electronic Army?
What was the result of the fake Twitter message sent by the Syrian Electronic Army?
Signup and view all the answers
How did the hackers gain access to the Associated Press' Twitter account?
How did the hackers gain access to the Associated Press' Twitter account?
Signup and view all the answers
What type of attack is characterized by the use of a fake tweet message to cause financial loss?
What type of attack is characterized by the use of a fake tweet message to cause financial loss?
Signup and view all the answers
What is the primary function of a spyware?
What is the primary function of a spyware?
Signup and view all the answers
What is the difference between a virus and a worm?
What is the difference between a virus and a worm?
Signup and view all the answers
What is the primary goal of an IP address spoofing attack?
What is the primary goal of an IP address spoofing attack?
Signup and view all the answers
What is the result of a successful ARP spoofing attack?
What is the result of a successful ARP spoofing attack?
Signup and view all the answers
What is the main reason for insider attacks in an organization?
What is the main reason for insider attacks in an organization?
Signup and view all the answers
What is the primary difference between an insider attack and an external attack?
What is the primary difference between an insider attack and an external attack?
Signup and view all the answers
What type of attack is usually performed by individuals who are trying to test a tool readily available over the internet?
What type of attack is usually performed by individuals who are trying to test a tool readily available over the internet?
Signup and view all the answers
What can be used to trace external attacks?
What can be used to trace external attacks?
Signup and view all the answers
What is the primary goal of an internal intrusion detection system (IDS) in an organization?
What is the primary goal of an internal intrusion detection system (IDS) in an organization?
Signup and view all the answers
What is the result of a cyber attack on an organization?
What is the result of a cyber attack on an organization?
Signup and view all the answers
What type of attack is performed by highly skilled and experienced individuals?
What type of attack is performed by highly skilled and experienced individuals?
Signup and view all the answers
What is the primary motivation behind a structured attack?
What is the primary motivation behind a structured attack?
Signup and view all the answers
What is the primary objective of a cyber attack?
What is the primary objective of a cyber attack?
Signup and view all the answers
What is the primary goal of a phishing attack?
What is the primary goal of a phishing attack?
Signup and view all the answers
What is the main difference between white hat hackers and grey hat hackers?
What is the main difference between white hat hackers and grey hat hackers?
Signup and view all the answers
What is a common phishing scam?
What is a common phishing scam?
Signup and view all the answers
What type of cyber attack is performed by an individual with authorized system access?
What type of cyber attack is performed by an individual with authorized system access?
Signup and view all the answers
What is the primary goal of grey hat hackers?
What is the primary goal of grey hat hackers?
Signup and view all the answers
What is the motive of an insider attack?
What is the motive of an insider attack?
Signup and view all the answers
What is the purpose of an attachment or link in a phishing email?
What is the purpose of an attachment or link in a phishing email?
Signup and view all the answers
What did Romanion Hacker TinKode aka Razvan Cernaianu exploit in PayPal's system?
What did Romanion Hacker TinKode aka Razvan Cernaianu exploit in PayPal's system?
Signup and view all the answers
What is the result of a successful insider attack?
What is the result of a successful insider attack?
Signup and view all the answers
Why are phishing attacks often successful?
Why are phishing attacks often successful?
Signup and view all the answers
What is the primary motivation behind cyber espionage?
What is the primary motivation behind cyber espionage?
Signup and view all the answers
What is the primary advantage of an insider attack?
What is the primary advantage of an insider attack?
Signup and view all the answers
What type of hackers are hired by organizations to test and discover potential holes in their security defenses?
What type of hackers are hired by organizations to test and discover potential holes in their security defenses?
Signup and view all the answers
What is a typical feature of phishing emails?
What is a typical feature of phishing emails?
Signup and view all the answers
What is a common characteristic of cyber attacks?
What is a common characteristic of cyber attacks?
Signup and view all the answers
What is the common good that grey hat hackers attempt to achieve?
What is the common good that grey hat hackers attempt to achieve?
Signup and view all the answers
What is the difference between white hat hackers and black hat hackers?
What is the difference between white hat hackers and black hat hackers?
Signup and view all the answers
What is the objective of a cyber attack that involves the installation of viruses or malware?
What is the objective of a cyber attack that involves the installation of viruses or malware?
Signup and view all the answers
What is the goal of a phishing attack?
What is the goal of a phishing attack?
Signup and view all the answers
What is the result of the exploit found by TinKode in PayPal's system?
What is the result of the exploit found by TinKode in PayPal's system?
Signup and view all the answers
What is the purpose of a phishing email that appears to be from a trusted source?
What is the purpose of a phishing email that appears to be from a trusted source?
Signup and view all the answers
What is the result of a cyber attack that involves changes to the characteristics of a computer system's hardware, firmware, or software?
What is the result of a cyber attack that involves changes to the characteristics of a computer system's hardware, firmware, or software?
Signup and view all the answers
What is the primary characteristic of grey hat hackers?
What is the primary characteristic of grey hat hackers?
Signup and view all the answers
What is the result of continuously doubling the amount of Rs. 1000 using the loophole?
What is the result of continuously doubling the amount of Rs. 1000 using the loophole?
Signup and view all the answers
How did the Stuxnet virus infect the Natanz nuclear facility?
How did the Stuxnet virus infect the Natanz nuclear facility?
Signup and view all the answers
What was the result of the fake tweet message sent via the hacked Twitter account of Associated Press?
What was the result of the fake tweet message sent via the hacked Twitter account of Associated Press?
Signup and view all the answers
What was the method used to hack the Twitter account of Associated Press?
What was the method used to hack the Twitter account of Associated Press?
Signup and view all the answers
What was the purpose of the Stuxnet virus?
What was the purpose of the Stuxnet virus?
Signup and view all the answers
What was the result of the Stuxnet virus on the nuclear facility?
What was the result of the Stuxnet virus on the nuclear facility?
Signup and view all the answers
Who claimed responsibility for the AP hack?
Who claimed responsibility for the AP hack?
Signup and view all the answers
What was installed in the computer after clicking the link in the phishing email?
What was installed in the computer after clicking the link in the phishing email?
Signup and view all the answers
What is the primary function of a keylogger-type spyware?
What is the primary function of a keylogger-type spyware?
Signup and view all the answers
What is the main difference between a virus and a worm?
What is the main difference between a virus and a worm?
Signup and view all the answers
How do Trojan horses typically spread to a host computer?
How do Trojan horses typically spread to a host computer?
Signup and view all the answers
What is the effect of a worm on a network?
What is the effect of a worm on a network?
Signup and view all the answers
What is required to activate a virus in a host computer?
What is required to activate a virus in a host computer?
Signup and view all the answers
What is the primary function of a virus?
What is the primary function of a virus?
Signup and view all the answers
How are spywares commonly downloaded into a host computer?
How are spywares commonly downloaded into a host computer?
Signup and view all the answers
What is the primary characteristic of a worm?
What is the primary characteristic of a worm?
Signup and view all the answers
What is the goal of a malicious hacker in a URL injection attack?
What is the goal of a malicious hacker in a URL injection attack?
Signup and view all the answers
What is the main reason for insider attacks in an organization?
What is the main reason for insider attacks in an organization?
Signup and view all the answers
What is cross-site scripting (XSS) used for?
What is cross-site scripting (XSS) used for?
Signup and view all the answers
What is the primary association of hacking with illegal activity?
What is the primary association of hacking with illegal activity?
Signup and view all the answers
What is the primary goal of installing an internal intrusion detection system (IDS) in an organization?
What is the primary goal of installing an internal intrusion detection system (IDS) in an organization?
Signup and view all the answers
What is the main difference between structured and unstructured attacks?
What is the main difference between structured and unstructured attacks?
Signup and view all the answers
What devices can be misused by hackers?
What devices can be misused by hackers?
Signup and view all the answers
Who is usually responsible for tracing external attacks?
Who is usually responsible for tracing external attacks?
Signup and view all the answers
What is the result of a visitor's action on a webpage infected with XSS?
What is the result of a visitor's action on a webpage infected with XSS?
Signup and view all the answers
What is the result of a successful external attack on an organization?
What is the result of a successful external attack on an organization?
Signup and view all the answers
What is the traditional view of hackers?
What is the traditional view of hackers?
Signup and view all the answers
What can be the result of a DDoS attack?
What can be the result of a DDoS attack?
Signup and view all the answers
What type of attacks are performed by amateur attackers?
What type of attacks are performed by amateur attackers?
Signup and view all the answers
What is the primary goal of hacking?
What is the primary goal of hacking?
Signup and view all the answers
What is the primary characteristic of a structured attack?
What is the primary characteristic of a structured attack?
Signup and view all the answers
What is the primary purpose of an external attacker?
What is the primary purpose of an external attacker?
Signup and view all the answers
What is the primary goal of an IP address spoofing attack in a DoS attack?
What is the primary goal of an IP address spoofing attack in a DoS attack?
Signup and view all the answers
What is the purpose of Address Resolution Protocol (ARP)?
What is the purpose of Address Resolution Protocol (ARP)?
Signup and view all the answers
What can an attacker do by spoofing a computer or device's IP address?
What can an attacker do by spoofing a computer or device's IP address?
Signup and view all the answers
What is the result of a successful ARP spoofing attack?
What is the result of a successful ARP spoofing attack?
Signup and view all the answers
What type of attack often involves caller ID spoofing?
What type of attack often involves caller ID spoofing?
Signup and view all the answers
What is the primary goal of an IP address spoofing attack?
What is the primary goal of an IP address spoofing attack?
Signup and view all the answers
What is the target of an IP address spoofing attack in a DoS attack?
What is the target of an IP address spoofing attack in a DoS attack?
Signup and view all the answers
What is the common use of IP address spoofing attacks?
What is the common use of IP address spoofing attacks?
Signup and view all the answers
What is the main difference between white hat hackers and grey hat hackers?
What is the main difference between white hat hackers and grey hat hackers?
Signup and view all the answers
What is the primary goal of grey hat hackers?
What is the primary goal of grey hat hackers?
Signup and view all the answers
What was the result of Romanion Hacker TinKode aka Razvan Cernaianu's actions on PayPal?
What was the result of Romanion Hacker TinKode aka Razvan Cernaianu's actions on PayPal?
Signup and view all the answers
What is the characteristic of a grey hat hacker?
What is the characteristic of a grey hat hacker?
Signup and view all the answers
What is the main difference between a white hat hacker and a black hat hacker?
What is the main difference between a white hat hacker and a black hat hacker?
Signup and view all the answers
What is the role of a white hat hacker in an organization?
What is the role of a white hat hacker in an organization?
Signup and view all the answers
What is the primary purpose of PayPal's encryption techniques?
What is the primary purpose of PayPal's encryption techniques?
Signup and view all the answers
What is the goal of grey hat hackers when they exploit a vulnerability?
What is the goal of grey hat hackers when they exploit a vulnerability?
Signup and view all the answers
Study Notes
Insider Attacks
- Insider attacks occur when an employee or insider uses their access to sensitive information to steal or crash the network.
- The reasons for insider attacks include when an employee is fired or assigned new roles, and their role is not reflected in the IT policies.
- Insider attacks can be prevented by planning and installing an internal intrusion detection system (IDS) in the organization.
External Attacks
- External attacks occur when an attacker is either hired by an insider or an external entity to the organization.
- The organization which is a victim of cyber attack faces financial loss and loss of reputation.
- External attacks can be traced out by analyzing firewall logs and installing Intrusion Detection Systems.
Classification of Cyber Attacks
- Cyber attacks can be classified as structured and unstructured attacks based on the level of maturity of the attacker.
- Unstructured attacks are performed by amateurs who don't have any predefined motives and try to test tools available over the internet.
- Structured attacks are performed by highly skilled and experienced people with clear motives and access to sophisticated tools.
Reasons for Cyber Attacks
- Money is a major motivator for committing cyber crime.
- Revenge, fun, recognition, and anonymity are also reasons for committing cyber crime.
- Anonymity in the cyber world makes it easier to commit crimes and get away with them.
Types of Malware
- Virus: a malicious code written to damage/harm the host computer by deleting or appending files, occupying memory space, slowing down performance, or formatting the host machine.
- Worms: a class of virus that can replicate themselves and spread over the network without human intervention.
- Trojan horse: a malicious code that is installed in the host machine by pretending to be useful software.
Spoofing Attacks
- IP address spoofing attacks: an attacker sends IP packets from a spoofed IP address to hide their true identity.
- ARP spoofing attacks: an attacker sends spoofed ARP messages to link their own MAC address with a legitimate IP address.
- URL injection: a malicious hacker injects malicious code into a trustworthy web page through weaknesses in IT infrastructure.
- Cross-site scripting (XSS) attack: a malicious hacker injects malicious code into a trustworthy web page, which springs into action when a user performs a certain action.
Hacking and Hackers
- Hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system.
- Hacking is not always malicious, but it is commonly associated with illegal activity and data theft.
- A traditional view of hackers is a lone rogue programmer, but this narrow view does not cover the true technical nature of hacking.
Malware and Cyber Attacks
- Malware can be downloaded onto a host computer while downloading freeware or free application programs from the internet
- Types of malware include:
- Virus: malicious code that can damage/harm the host computer, replicate itself, slow down computer performance, and format the host machine
- Worms: a class of virus that can replicate themselves and spread over a network without human intervention
- Trojan horse: malicious code that pretends to be useful software, damages the host computer, and creates a backdoor for remote control
- Rootkits: malware that infects a PC on a deeper level, making them undetectable, and can enslave computers into a botnet
- Ransomware: type of malware that encrypts data and demands a ransom to restore access
- Spyware: malware that steals sensitive information from the target machine
- Adware: malware used for forced advertising
- Cyber attacks include:
- Denial-of-service (DoS/DDoS) attacks: flooding a user's internet connection with useless information to disrupt their internet use
- Whaling: targeting high-value individuals, such as CEOs or politicians, with personalized phishing attacks
- Phishing attacks: tricking victims into providing personal information or performing a certain action
- Cyber espionage: government involvement in cyber trespassing for political, economic, or social motives
- Examples of malware attacks and infections include:
- Stuxnet, a virus believed to be developed by the US, which attacked Iran's nuclear facility at Natanz
- A fake tweet message that cost $136 billion in losses within seconds
- A phishing attack that led to a hack of Associated Press's Twitter account, causing a stock market crash
Cyber Attacks
- A cyber attack is an attack initiated from a computer against a website, computer system, or individual computer that compromises the confidentiality, integrity, or availability of the computer or information stored on it.
Classification of Cyber Attacks
- Cyber attacks can be classified into two categories: Insider Attack and External Attack.
- Insider Attack: An attack to the network or computer system by someone with authorized system access, often motivated by revenge or greed.
- External Attack: An attack by an external entity, often hired by an insider, that can be traced through firewall logs and prevented by Intrusion Detection Systems.
Types of Cyber Attacks
- Structured Attacks: Performed by highly skilled and experienced individuals with clear motives.
- Unstructured Attacks: Performed by amateurs who lack predefined motives and often test readily available tools on random companies.
- Cyber Espionage: Government-initiated cyber trespassing for political, economic, or social reasons.
Various Types of Cyber Attacks
- Phishing Attacks: Malicious hackers trick victims into taking a certain action, often by sending emails that appear to be from a trustworthy source.
- Grey Hat Hackers: Individuals who violate standards and principles without intending to do harm or gain financially, often to raise awareness about vulnerabilities.
Famous Cyber Attacks
- Paypal Attack: Romanion hacker TinKode exploited a loophole in the chargeback process, allowing users to double their money endlessly.
- Stuxnet Attack: A virus developed by the US (believed to be) attacked Iran's nuclear facility at Natanz, speeding up or slowing down centrifuges and sending false signals about the health and status of the nuclear plant.
- AP Twitter Hack: A fake tweet message sent via a hacked Twitter account of Associated Press, USA, caused a $136 billion loss within seconds by reporting false information about the White House and President Barack Obama.
Insider Attack
- Insider attacks occur when an employee with access to the organization's network and systems misuses their privileges to steal sensitive information or crash the network.
- The reason for insider attacks is often due to a lack of reflection of role changes in IT policies, creating a vulnerability window for the attacker.
- Insider attacks can be prevented by planning and installing an internal intrusion detection system (IDS) in the organization.
External Attack
- External attacks occur when an attacker is hired by an insider or an external entity to attack the organization.
- The attacker scans and gathers information about the organization, and the organization faces financial loss and loss of reputation as a result.
- External attacks can be traced by carefully analyzing firewall logs, and Intrusion Detection Systems can be installed to keep an eye on external attacks.
Types of Cyber Attacks
- Cyber attacks can be classified as structured and unstructured attacks based on the level of maturity of the attacker.
- Unstructured attacks are performed by amateurs who don't have any predefined motives and try to test tools available on the internet.
- Structured attacks are performed by highly skilled and experienced people with clear motives.
Malware
- Virus: a malicious code written to damage or harm the host computer, which can be spread via email attachments, pen drives, digital images, etc.
- Worms: a class of virus that can replicate themselves and spread through the network, consuming network resources.
- Trojan horse: a malicious code installed in the host machine by pretending to be useful software, which can be used to commit fraud.
Spoofing Attacks
- IP address spoofing attacks: an attacker sends IP packets from a spoofed IP address to hide their true identity, often used in DoS attacks.
- ARP spoofing attacks: an attacker sends spoofed ARP messages to link their own MAC address with a legitimate IP address, allowing them to steal or modify data.
Cross-Site Scripting (XSS) Attack
- XSS attack: a malicious hacker injects malicious code into a trustworthy web page, which springs into action when a user performs a certain action, infecting the user.
- XSS attack is often used to redirect users to different websites or to steal sensitive information.
Hacking and Hackers
- Hacking: the act of compromising digital devices and networks through unauthorized access, often associated with illegal activity and data theft.
- White hat hackers: hired by organizations to test and discover potential holes in their security defenses.
- Grey hat hackers: sit between the good and bad guys, attempting to violate standards and principles but without intending to do harm or gain financially.
Famous Cyber Attacks
- Paypal hack: a Romanian hacker exploited a loophole in the code of the chargeback process of PayPal, allowing users to double their money in every attempt.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the threats and risks of insider attacks in organizations, including reasons and consequences. It also discusses the importance of IT policies in preventing such attacks.