Cyber Security Part 2: Forms of Attack

Now that you’ve had a chance to familiarize yourself with essential terms and definitions in Part 1, we’re going to jump right into the most common forms of attack that you need to be aware of.

Distributed Denial-of-Service (DDoS) Attack:

A DDoS attack is when a cyber criminal uses a network of zombie computers to sabotage a specific website or server. The user instructs the zombie computers to contact a specific website or server over and over again, increasing the traffic to the server or website, overloading it causing it to slow down or shut down completely. Your computer could be used in one of these attacks. If an attacker finds security vulnerabilities on your system, they could take control of it and force it to send large amounts of data to a website or spam emails.

Botnets:

Botnets are a large number of software robots (bots) that constitute a group of infected computers (zombie computers) that are remotely controlled by a malicious user to spread malware, send spam emails containing viruses or DDoS attacks.

Hacking: 

A hacking occurs when a malicious user gains unauthorized access to a computer by finding weaknesses in your security and exploiting them to access your information.

Malware: 

Malware is one of the most common tools for hackers to use to infiltrate or damage your system. It is malicious software such as computer viruses, worms, Trojan horses, spyware and adware. Malicious users use it to take control of your computer and all the software you’re running on it, send spam emails from your computer, steal sensitive information, access your files, reformat the hard drive of your computer causing you to lose all your information or scare you with pop-up messages telling you that your computer has a security problem while directing you to contact them for help further exposing your system to threat.

Pharming: 

Pharming is a very common type of online fraud which points you to a malicious and illegitimate website by redirecting the legitimate URL, even if it’s entered correctly. You are convinced that the site is real because it looks almost identical to the legitimate website and if you enter your information, you may unknowingly give it to the malicious user.

Phishing: 

Phishing, also known as spoofing, is often used by malicious users because of its ease of execution and result production with minimum effort. They send you emails, text messages and websites that appear to be from authentic companies in an attempt to steal your personal and/or financial information. When you are asked to validate, update or confirm your account, they are tricking you into giving them your information such as your username and passwords giving them access to your accounts (online bank account, credit card numbers, etc.).

Ransomware:

Ransomware is a type of malware that essentially holds your system hostage. You are denied access to your computer and/or files through either lockscreen ransomware which only shows a picture denying you access or encryption ransomware which encrypts your files also denying you access. Meanwhile, a message is displayed demanding payment in order to grant you access again. It is transferred through phishing emails with malicious attachments or website pop-up advertisements.

Spam: 

Spam entails a mass distribution of unsolicited emails that contain the threats of malware or fraud by including links to websites, special offers or promotions. By clicking on those links, you grant the malicious user access to your computer and files.

Spyware: 

Spyware is installed automatically on your computer when you click on a free download that is not authentic. It will steal your personal and computer information and send it to third parties, attack your computer with viruses or alter the way your computer operates.

Trojan Horses: 

Trojan horses are a malicious software that has the ability to log your keystrokes (online banking sign in, for example), steal your username and passwords, access your computer’s camera, hack into other computers through yours and delete your files. It is a file that is hidden within actual legitimate software and installs itself and runs once downloaded.

Viruses: 

A virus is a malicious program sent via email or download with the purpose of infecting your computer and those of all of your contacts. A virus can take over your web browser, turn off your security settings, show unsolicited ads, send spam emails to your contacts and provide hackers with your personal information and your contacts list information. Once your computer is infected anything you connect to it (i.e. USB drive) or send out has the potential of spreading the virus.

Worms: 

Worms do not only threaten computers, but the internet as well. They exist in the memory of your computer, silently, without causing damage to your computer while sending itself to the computers in your shared network. They then spread to those in your contact list and have the capability of shutting down parts of the internet as well as your internal network.

Wi-Fi:

We’ve all been told about the importance of having a strong Wi-Fi password. Here’s why. If a hacker manages to infiltrate your Wi-Fi, they are able to access all of the information you send that isn’t encrypted, they can access your computer and your personal information.

Our next blog will offer information and tips to help you avoid becoming a victim to any of these attacks. In the meantime, here’s a short video on how you can begin to protect yourself today.

Cyber Security Part 1: Terms & Definitions

Many of us are familiar with common cyber security terms such as “hacking” or “malware” but there is so much more out there that we don’t know. In the first of our 3-part cyber security series, we’ll take you through some common cyber security terms and their definitions to help build the foundation for the next part of our series.

Access Control:

Controlling who has access to a computer or online service and the information it stores.

Asset:

Something of value to a person, business or organization.

Authentication:

The process to verify that someone is who they claim to be when they try to access a computer or online service.

Backing up:

To make a copy of data stored on a computer or server to lessen the potential impact of failure or loss.

Broadband:

High-speed data transmission system where the communications circuit is shared between multiple users.

Business Continuity Management:

Preparing for and maintaining continued business operations following disruption or crisis.

Certification:

Declaration that specified requirements have been met.

Cloud computing:

Delivery of storage or computing services from remote servers online (via the internet).

Common Test:

A structure and series of requirements defined by the International Organization for Standardization, that are being incorporated in all management system International Standards as they are revised.

Data Server:

A computer or program that provides other computers with access to shared files over a network.

DMZ:

Segment of a network where servers accessed by less trusted users are isolated. The name is derived from the term “demilitarized zone.”

Encryption:

The transformation of data to hide its information content.

Ethernet:

Communications architecture for wired local area networks based upon IEEE 802.3 standards.

Firewall:

Hardware or software designed to prevent unauthorized access to a computer or network from another computer or network.

Gap Analysis:

The comparison of actual performance against expected or required performance.

Hacker:

Someone who violates computer security for malicious reasons, kudos or personal gain.

Hard Disk:

The permanent storage medium within a computer used to store programs and data.

Identification:

The process of recognizing a particular user of a computer or online service.

Infrastructure-As-A-Service (IAAS):

Provision of computing infrastructure (such as server or storage capacity) as a remotely provided service accessed online (via the internet).

Inspection Certificate:

A declaration issued by an interested party that specified requirements have been met.

Internet Service Provider (ISP):

Company that provides access to the internet and related services.

Intrusion Detection System (IDS): 

Program or device used to detect that an attacker is or has attempted unauthorized access to computer resources.

Intrusion Prevention System (IPS):

Intrusion detection system that also blocks unauthorized access when detected.

Keyboard Logger: 

A virus or physical device that logs keystrokes to secretly capture private information such as passwords or credit card details.

Local Area Network (LAN):

Communications network linking multiple computers within a defined location such as an office building.

Macro Virus: 

Malware (malicious software) that uses the macro capabilities of common applications such as spreadsheets and word processors to infect data.

Malware:

Software intended to infiltrate and damage or disable computers. Shortened form of malicious software.

Network Firewall:

Device that controls traffic to and from a network.

Password: 

A secret series of characters used to authenticate a person’s identity.

Personal Firewall:

Software running on a PC that controls network traffic to and from that computer.

Phishing:

Method used by criminals to try to obtain financial or other confidential information (including user names and passwords) from internet users, usually by sending an email that looks as though it has been sent by a legitimate organization (often a bank)> The email usually contains a link to a fake website that looks authentic.

Proxy Server: 

Server that acts as an intermediary between users and other servers, validating user requests.

Restore:

The recovery of data following computer failure or loss.

Risk Assessment: 

The process of identifying, analyzing and evaluating risk.

Screen Scraper:

A virus or physical device that logs information sent to a visual display to capture private or personal information.

Security Perimeter:

A well-defined boundary within which security controls are enforced.

Spyware:

Malware that passes information about a computer user’s activities to an external party.

Threat:

Something that could cause harm to a system or organization.

Two-Factor Authentication: 

Obtaining evidence of identity by two independent means, such as knowing a password and successfully completing a smartcard transaction.

Virtual Private Network (VPN):

Link(s) between computers or local area networks across different locations using a wide area network that cannot access or be accessed by other users of the wide area network.

Virus: 

Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effects.

Vulnerability:

A flaw or weakness that can be used to attack a system or organization.

Wide Area Network (WAN):

Communications network linking computers or local area networks across different locations.

Wi-Fi:

Wireless local area network based upon IEEE 802.11 standards.

Worm:

Malware that replicates itself so it can spread to infiltrate other computers.

 

Join us next week for Part 2 of our series where we delve into the popular and vicious forms of attack used by hackers today.

Check out our short video below and learn about the Cino Cyber Safeguard Advantage and how you can protect yourself today!