Cyber Attack

A cyber attack is the unauthorized access of private or confidential information contained on a computer system or network. It targets computer information systems, infrastructures, or other personal devices and can be used to serve as a launch point for other attacks. A cybercriminal can launch a cyber attack to steal, alter, or destroy a specific target by hacking into a susceptible system.

Cyber attacks can be active or passive. An active attack is a blatant attack that a victim is immediately aware of. It is highly malicious and can include locking out users, destroying files, or aggressively gaining access to a network. Examples of an active cyber attack are viruses, worms, and malware. A passive attack uses covert methods so that the victim does not know the attack is happening the goal being to remain undetected. Examples of a passive attack include data scraping, network surveillance, and keylogging. On corporate networks, and advanced persistent threat is a particularly dangerous attack because of the opportunity to steal sensitive data.

Cyber attack types

Cybercriminals use a number of technical methods to gain access to or disable operations. While new methods are always emerging, there are methods that are common in the cyber world. Types of attacks include:

  • Malware: Any type of malicious software.
  • Phishing: A technique used to fool an email recipient into taking a harmful action, such as downloading malware that is disguised as an important document. Social engineering is another term for fooling users into giving away sensitive information.
  • Ransomware: A form of malware that encrypts a victim’s files. The attacker then demands a ransom from the victim to restore access to the data upon payment.
  • Man in the middle: An attack where a hacker attempts to intercept, read, or alter information between a user and a web service.
  • Denial of service: An attack designed to stop an online service from working properly by flooding it with useless traffic.
  • Evil twin attack: Pretends to be a legitimate network to intercept traffic from users.

How to prevent a cyber attack

With sensitive data increasingly being stored online, the need for cybersecurity is critical. Reduce the risk of a cyber attack by training employees in cyber security principles, installing and regularly updating antivirus and antispyware software, and using a firewall for the Internet connection. In addition, make backup copies of important business data, make sure WiFi access is secure, and regularly change passwords.

 



 

 

Abby Braden
Abby Braden
Abby Braden is an award-winning writer and editor for websites such as TechnologyAdvice.com, Webopedia.com, and Project-Management.com, where she covers technology trends and enterprise and SMB project management platforms. When she’s not writing about technology, she enjoys giving too many treats to her dog and coaching part-time at her local gym.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Complete List of Cybersecurity Acronyms

Cybersecurity news and best practices are full of acronyms and abbreviations. Without understanding what each one means, it's difficult to comprehend the significance of...

Human Resources Management System

A Human Resources Management System (HRMS) is a software application that supports many functions of a company's Human Resources department, including benefits administration, payroll,...

How To Defend Yourself Against Identity Theft

Almost every worldwide government agency responsible for identity theft issues will tell you the same thing: The first step to fighting identity theft is...

Infographic

An infographic is a visual representation of information or data. It combines the words information and graphic and includes a collection of imagery, charts,...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...