top of page

CYBER SECURITY


With advancements in technology, cyber security is a major concern for many individuals and organizations and is something to worry about.

You may ask yourself why you would would be a target to cyber attacks. reasons may vary depending on the attack you may encounter. It could be because of your job, your organization or something you posses. The consequences of cyber attacks may include but not limited to compromised credentials/accounts, loss of sensitive data including personal/financial details, alteration of data or failure of entire system.

How do these cyber attacks occur?

It is very difficult to classify the types of cyber attacks and how they occur. This article will mention a few examples.

1. Phishing and spear phishing

Phishing is a form of attack that involves a hacker sending malicious messages to recipients either through e-mails,text messages or on any social media platform.

Spear phishing is a form of phishing but it is more personalized. Messages are sent to individuals by sources that appear trustworthy. They include:

Bait-It involves sending personalized messages to targets.

Hook- It involves sending messages that request urgent action

Meal-It steals identity and enables a hacker to your information continuously.

2. Malware

Includes:

Viruses- Small codes embedded to other programs and are usually attached to programs. It causes the system to malfunction.

Worms- Chokes down the system performance by utilizing system resources at extreme level. They then generate themselves into multiple copies.

Trojans-Disrupt organizational activities and usually operate by capturing all keyboard inputs from a given computer.

Spy ware- Accumulates information from your computer and sends them to a central site. It is responsible for sending spam messages.

Scare ware- It tricks victims into purchasing or downloading useless or potentially harmful software. It generates pop-ups and purports to be Anti Virus or firewall. It usually scares you into downloading the software e.g your computer is at risk,please download Anti Virus.

Ransom ware-It prevents you from using your computer or files and holds your information for ransom. It can prevent you from accessing your files or encrypts them until you pay a ransom in order for it to be restored. Even if you pay, it does not guarantee access to the files. It is usually downloaded if you visit a malicious website.

Root kits-Applications that hide presence of other applications. It is usually hard to detect since they hide by disguising themselves as necessary files that Anti Virus will overlook. They are used by attackers with other types of malware.

Crime ware- Designed by attackers to conduct malicious and illegal activities on-line.It automates theft of information allowing the thief to access a person's financial accounts on-line. It can redirect users to counterfeit websites and remotely access applications or steal passwords.

It is important for every individual to know the potential cyber attacks and possible ways to prevent them. Watch out for the next article which will talk on preventive measures of cyber attacks.

Feel free to comment, add or make corrections and also ask questions. Thanks for your support.


Single post: Blog_Single_Post_Widget
bottom of page