Surya
Surya
Surya
DDoS attacks are used to make an online service unavailable and take the
network down by overwhelming the site with traffic from a variety of sources.
Large networks of infected devices known as Botnets are created by depositing
malware on users’ computers. The hacker then hacks into the system once the
network is down.
Botnets
Cyberstalking
PUPs
Phishing
This cybercrime involves criminals sharing and distributing inappropriate content that can be
considered highly distressing and offensive. Offensive content can include, but is not limited to,
sexual activity between adults, videos with intense violent and videos of criminal activity. Illegal
content includes materials advocating terrorism-related acts and child exploitation material. This
type of content exists both on the everyday internet and on the dark web, an anonymous
network.
Online Scams
These are usually in the form of ads or spam emails that include promises of rewards or offers of
unrealistic amounts of money. Online scams include enticing offers that are “too good to be true”
and when clicked on can cause malware to interfere and compromise information.
Exploit Kits
Exploit kits need a vulnerability (bug in the code of a software) in order to gain control of a user’s
computer. They are readymade tools criminals can buy online and use against anyone with a
computer. The exploit kits are upgraded regularly similar to normal software and are available on
dark web hacking forums.
For example, a hacker might use a phishing email to trick an employee at a company into clicking on a link
that installs malware on their computer. Once the malware is installed, the hacker can use it to gain access
to the company's network and steal sensitive data. In another scenario, a criminal might use stolen
personal information to open a credit card account in someone else's name, racking up charges and
damaging the victim's credit score.
The Cyber Attack
Process
The cyber attack process involves several
steps, each of which is designed to gain access
to sensitive information or systems. The first
step is reconnaissance, where the attacker
gathers information about the target through
various means such as scanning for
vulnerabilities and identifying potential
weaknesses. Once the attacker has identified a
vulnerability, they move on to the exploitation
phase, where they attempt to gain access to
the system or network. This can be done
through various methods such as phishing
attacks, malware installation, or social
engineering tactics. Finally, the attacker moves
on to the exfiltration phase, where they steal or
extract the desired information from the
compromised system.Additionally,
attackers may use multiple techniques during
each phase to increase their chances of
success. As such, it's crucial to have strong
security measures in place to prevent and d
etect cyber attacks.
Preventing Cyber
Crime
To safeguard both yourself and your
organization against cyberattacks,
ensuring strong passwords is key. This
entails utilizing a mix of letters,
numbers, and symbols, while steering
clear of easily guessed words or
phrases.