Zusammenfassung der Ressource
Cyberattacks
Anlagen:
- A cyberattack is an attempt by hackers to
damage or destroy a computer network or
system.
- Cyber attacks exploit us using a network or technical weakness to:
- Obtain data stored on the network
- Delete or modify
data
- Make the system unusable
- Social engineering
- Phishing
- Emails claiming or appearing to be
from a bank or building society
e-commerce site, asking for details of
passwords and credit cards.
- Shoulder surfing
- Finding passwords and PINs (Personal
Identification Numbers) by watching people
enter them.
- Targeting the users
- Social engineering involves tricking people into
divulging secret information such as passwords
and login information.
- Technical weaknesses
- Unpatched software
- As software is used security flaws are discovered which can
be exploited by hackers. The makers release patches to fix
security issues but they have to be applied and often are
forgotten about
- USB devices
- Employees could attach portable devices
containing flash drives and copy sensitive
information. They could also try to install
software onto the network and introduce
malware.
- Smart devices
- At home, such as kettles and fridges, are usually unprotected
and can be targeted by hackers. They have been used to launch
denial of service attacks.
- Eavesdropping
- The interception of digital communications. This is done by:
directly listening to digital or analogue voice
communication; the interception or 'sniffing' of data relating
to any form of communication
- Criminals use packet analysers or 'packet sniffers' to intercept the
transmitted data packets, which are then analysed and their data
decoded. The criminals can therefore steal sensitive data such as
logins, passwords, credit card numbers and PINs. Encrypting data on
a network is essential so that it cannot be of use if it is intercepted by
eavesdropping.