Types of Cyberattacks

Today being a victim of a cyberattack is not uncommon. Cyberattacks can come in many forms over the internet, and every time you’re on, your chances of being attacked increases. The different kinds of cyberattacks one can be susceptible to are malware, password, denial-of-service, and many more. Malware is simply any computer code that has “malicious intent.” Malware typically consists of viruses, spyware, and worms. According to Pennsylvania State University’s blog, “Viruses replicate themselves, and they survive by attaching to other programs or files.” Since the viruses are able to replicate themselves, this can allow them to remain dormant until they actually cause harm to one’s computer software. Like viruses, spyware,  remains in hiding, but t can still cause some damage while doing so. Spyware is known for stealing people’s confidential information, and it is also smart enough as to where it “can log the various activities performed by a user” (Pennsylvania State University). Lastly, worms are like viruses because they can also replicate themselves. The worms are considered more dangerous than viruses because they “can also replicate across an entire network of computers” (Pennsylvania State University). Another type of cyberattacks are password attacks. Password attacks consist of brute-force attacks and dictionary attacks. Password attacks are typically used by hackers and focus on trying to hack into a victim’s password in order to gain access to a secured system. A brute-force attack is “executed when an attacker tries to use all possible combinations of letters, numbers, and symbols to enter a correct password” (Pennsylvania State University). The dictionary attack involves the use of a dictionary in order to hack into the victim’s password. The last attack is denial-of-service attack, which tends to focus on interrupting a network service. There are four ways a criminal can issue a denial-of-service attack. The four ways are teardrop, buffer overflow, smurf, and physical. There are many incidents of denial-in-service attacks, some of the victims have been MasterCard, Twitter, and Estonia. Typically bigger companies are victims of cyberattacks, but the average person can be a victim as well. An article on InfoWorld mentioned the five cyberattacks that a person will encounter. The five cyberattacks are 1. Socially engineered Trojans, 2. Unpatched software, 3. Phishing attacks, 4. Networks-traveling worms, and 5. Advanced persistent threats. It is important for people to be aware of what they receive in their inbox, because it is estimated that about 70 percent of email is spam (Grimes, R.A., 2012). These are just a few of the cyberattacks that can occur to one’s computer, and if they are not recognized and fixed, these cyberattacks can cause harm to the victim’s computer. Since cyberattacks are becoming more popular, it is important for people to gain more information about these attacks and better prepare themselves from becoming a victim of a cyberattack.

References

Types of attacks. Pennsylvania State University. Retrieved from http://www.personal.psu.edu/users/j/m/jms6423/Engproj/Types%20of%20Attacks.xhtml

Grimes, R.A. (2012, December 04). The five cyber attacks you are most likely to face. InfoWorld. Retrieved from http://www.infoworld.com/article/2616316/security/the-5-cyber-attacks-the-most-liekly-to-face.html

Advertisements

One comment

  1. Robocop · September 22, 2015

    Your blog post was very informative. I think the type of attack that worries me the most is the password attack. Almost everything we do online requires us to have a password, and some of those sites that we go to have confidential information. Our bank accounts, credit card information, emails, etc. can be stolen and that is just crazy to think about. Everyone should be fully aware of the dangers of hackers.

    Like

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s