As the number of mobile users increase, so do the opportunities for exploitation. In fact, hundreds to thousands of network outages, computer viruses, data compromised by hackers, and other incidents are affecting our lives. Cyber security is an attempt to protect your data, programs, computers, and networks from such exploitation. And, this has even become a critical issue in the society considering that the growing volume and sophistication of cyber attacks have been at a point where national security is threatened.
Cyber security is everyone’s responsibility, especially those directly affected such as governments, military, financial institutions, corporations, hospitals, and other businesses. To have strong cyber security, you must know cyber security definition, the importance of it and understand how cyber attacks work and affect your data, programs, computers, and networks. So, the article will introduce you to some forms of cyber attacks including cyber crime, cyber terror, and cyber war.
Cyber attacks can be dropped down into three: cyber crime, cyber terror, and cyber war.
- Cyber crime
The attack includes the acquisition of debit/credit card data and intellectual property, and impairment of the operations of a web or service. All forms of cyber crime focus on stealing data or money and causing disruption.
- Cyber terror
The attack includes terrorist activities on the cyberspace.
- Cyber war
The attack includes espionage and sabotage against another nation in order to extract data or cause disruption.
Cyber attacks are done at a distance using numerous means of attack in malware (malicious software) domain.
There are many types of malware with each having its specific goal and technique.
Viruses are aimed to steal, modify, or corrupt data from targeted computers. A virus can replicate and spread itself from one computer to another by attaching itself to another file.
Worms are aimed to seek out and exploit weaknesses in operating systems to allow remote control of the infected computers. A worm can replicate and spread itself from one computer to another without the need of attaching itself to another file.
Spyware, or also known as adware, is aimed to steal data through remote control of the infected computers. Spyware infects computers through attachments, links, or downloadable software.
Trojan is aimed to steal or damage data through the creation of another door on the infected computers.
Besides the above attacks, there are also some attack vectors that allow cyber criminals to infect computers to harvest stolen data.
Aimed to collect users’ data by masquerading as a legitimate entity.
Aimed to redirect a web’s traffic to a fake web where users’ data are compromised.
Aimed to attack against specific weakness in a system.
- MITM (Man in the Middle) Attack
Aimed to manipulate impersonate each endpoint and manipulate them.