Today being a victim of a cyberattack is not uncommon. Cyberattacks can come in many forms over the internet, and every time you’re on, your chances of being attacked increases. The different kinds of cyberattacks one can be susceptible to are malware, password, denial-of-service, and many more. Malware is simply any computer code that has “malicious intent.” Malware typically consists of viruses, spyware, and worms. According to Pennsylvania State University’s blog, “Viruses replicate themselves, and they survive by attaching to other programs or files.” Since the viruses are able to replicate themselves, this can allow them to remain dormant until they actually cause harm to one’s computer software. Like viruses, spyware, remains in hiding, but t can still cause some damage while doing so. Spyware is known for stealing people’s confidential information, and it is also smart enough as to where it “can log the various activities performed by a user” (Pennsylvania State University). Lastly, worms are like viruses because they can also replicate themselves. The worms are considered more dangerous than viruses because they “can also replicate across an entire network of computers” (Pennsylvania State University). Another type of cyberattacks are password attacks. Password attacks consist of brute-force attacks and dictionary attacks. Password attacks are typically used by hackers and focus on trying to hack into a victim’s password in order to gain access to a secured system. A brute-force attack is “executed when an attacker tries to use all possible combinations of letters, numbers, and symbols to enter a correct password” (Pennsylvania State University). The dictionary attack involves the use of a dictionary in order to hack into the victim’s password. The last attack is denial-of-service attack, which tends to focus on interrupting a network service. There are four ways a criminal can issue a denial-of-service attack. The four ways are teardrop, buffer overflow, smurf, and physical. There are many incidents of denial-in-service attacks, some of the victims have been MasterCard, Twitter, and Estonia. Typically bigger companies are victims of cyberattacks, but the average person can be a victim as well. An article on InfoWorld mentioned the five cyberattacks that a person will encounter. The five cyberattacks are 1. Socially engineered Trojans, 2. Unpatched software, 3. Phishing attacks, 4. Networks-traveling worms, and 5. Advanced persistent threats. It is important for people to be aware of what they receive in their inbox, because it is estimated that about 70 percent of email is spam (Grimes, R.A., 2012). These are just a few of the cyberattacks that can occur to one’s computer, and if they are not recognized and fixed, these cyberattacks can cause harm to the victim’s computer. Since cyberattacks are becoming more popular, it is important for people to gain more information about these attacks and better prepare themselves from becoming a victim of a cyberattack.
Types of attacks. Pennsylvania State University. Retrieved from http://www.personal.psu.edu/users/j/m/jms6423/Engproj/Types%20of%20Attacks.xhtml
Grimes, R.A. (2012, December 04). The five cyber attacks you are most likely to face. InfoWorld. Retrieved from http://www.infoworld.com/article/2616316/security/the-5-cyber-attacks-the-most-liekly-to-face.html