Cyber Attacks and Its Prevention
Cyber Attacks and Its Prevention
• PHISHING
The term ‘Phishing’ came into existence through the same process we humans carry out the process of ‘fishing’. While fishing, we look for fish
by hanging some fish food at the end of the fishing rod, the same way people who carry out phishing look for people like us. In phishing, they
try sending out emails, texts, and even making calls and might ask you to access a malicious link that at times provides them remote access to
your device, network, and server or might even compromise personal or confidential information. Spoofing is also a kind of phishing.
• CROSS-SITE SCRIPTING
Cross-site scripting is identical to phishing the major difference between the two is that in cross-site scripting the attackers use a medium of
legitimate websites or applications to run their malicious scripting which gets to the user in form of code of the website or the application
and prompts them.
(i) Stored persistent cross-site scripting
(ii) Reflected cross-site scripting
(iii) Self cross-site scripting
(iv) Blind cross-site scripting
• SQL INJECTION
SQL() Injection is another type of cyber attack in which self-created SQL (Structured query language )
scripts are been used for the manipulation of databases to get access to information that was not meant to
be distributed to an unauthorized person, such as data on medical history and research, Scientific data, and
government confidential information. This might even be the core reason for cyber-terrorism and
ransomware.
• ZERO-DAY EXPLOIT
Zero Day Exploit attacks occur due to vulnerabilities in the software or the application. The attackers target
the loopholes they find in the software and the attacks occur so quickly that there is barely a reaction time
for the cyber-security analyst to fix the security glitches, and bugs and create a suitable firewall or make
changes to it.
HOW TO PREVENT CYBER-ATTACKS
WAYS TO AVOID CYBER ATTACKS IN WAYS TO PREVENT CYBER ATTACKS IN
PERSONAL LIVES INDUSTRIES
• Use of multi-factor authentication. • Creating a suitable firewall that prevents and
filters unwanted data from getting onto your
• Keeping your OS system, software, and installed
networks.
applications up-to-date.
• Using software such as “Crowd Strike” allows
• Avoid accessing sketchy links, websites, and
you to create a suitable firewall and keeps your
portals. network and VMs safe.
• Use an antivirus total protection for all • Providing contracts to Cybersecurity firms such
electronic devices. as Act Zero, Cisco, IBM, etc.
• Using a safe browser such as ‘Microsoft Edge’ to • Instead of saving the user and firm data
browse. physically save it on the cloud such as google
• Create a password with a combination of Upper cloud, azure cloud (Microsoft ), or Amazon Drive.
case and lower case letters, using signs such as Which keeps the user and firm data safe and
‘@’, ‘#’, and ‘$’ and using numbers. also provides a regular backup.
ARE YOU AWARE OF ANY RECENT CYBER-ATTACK?
ANY QUESTIONS?
THANK YOU