A cyberattack is an attempt by hackers to
damage or destroy a computer network or
system.
Cyber attacks exploit us using a network or technical weakness to:
Obtain data stored on the network
Delete or modify
data
Make the system unusable
Social engineering
Phishing
Emails claiming or appearing to be
from a bank or building society
e-commerce site, asking for details of
passwords and credit cards.
Shoulder surfing
Finding passwords and PINs (Personal
Identification Numbers) by watching people
enter them.
Targeting the users
Social engineering involves tricking people into
divulging secret information such as passwords
and login information.
Technical weaknesses
Unpatched software
As software is used security flaws are discovered which can
be exploited by hackers. The makers release patches to fix
security issues but they have to be applied and often are
forgotten about
USB devices
Employees could attach portable devices
containing flash drives and copy sensitive
information. They could also try to install
software onto the network and introduce
malware.
Smart devices
At home, such as kettles and fridges, are usually unprotected
and can be targeted by hackers. They have been used to launch
denial of service attacks.
Eavesdropping
The interception of digital communications. This is done by:
directly listening to digital or analogue voice
communication; the interception or 'sniffing' of data relating
to any form of communication
Criminals use packet analysers or 'packet sniffers' to intercept the
transmitted data packets, which are then analysed and their data
decoded. The criminals can therefore steal sensitive data such as
logins, passwords, credit card numbers and PINs. Encrypting data on
a network is essential so that it cannot be of use if it is intercepted by
eavesdropping.