Different Types of Cyber Security Threats & Attacks in computer cyber security es of Cyber Security Threats & Attacks in computer cyber security

Different Types of Cyber Security Threats & Attacks and the Preventive Measures

Different Types of Cyber Security Threats & Attacks in computer cyber security
Different Types of Cyber Security Threats & Attacks in computer cyber security 


We now move on to a more detailed look at threats, attacks andresources.First,we'll discuss the types of security threats that need to be addressed, and then provide some examples of the types of threats that apply to different categories of assets.


Based on RFC 2828, it describes four types of threat outcomes and lists the types of attacks that lead to each outcome.


Unauthorised disclosure is a threat to confidentiality. The following types of attacks can lead to this threat:


Disclosure


Disclosure: This can be done intentionally, such as when an insider intentionally discloses confidential information, such as credit card numbers, to an outsider. It can also be the result of  human, hardware, or software error leading to an entity gaining unauthorised knowledge of sensitive data. There have been numerous cases of this, such as B. Universities accidentally posting confidential student information on the Internet.


Interception


Interception: Interception is a common communication-related attack. On a shared local area network (LAN) such as B. an external broadcast Ethernet or a wireless LAN, each device connected to the LAN can receive a copy of packets destined for another device. On the Internet, a determined hacker can gain access to email traffic and other data transmissions. All of these situations create the possibility of unauthorised access to data.


Inference


Inference: An example of inference is  traffic analysis, where an attacker can obtain information by looking at the traffic pattern on a network, such as the amount of traffic between specific pairs of hosts on the network. Another example is the derivation of detailed information from a database by a user with restricted access; This is achieved through repeated queries, the combined results of which allow inferences.


Intrusion


Intrusion: An example of an intrusion is an attacker who gains unauthorised access to sensitive data by bypassing system access control protection.



Deception is a threat to  system  or data integrity. The following types of attacks can lead to this threat:


Masquerade


Masquerade: An example of masquerade is an attempt by an unauthorised user to gain access to a system by posing as an authorised user; This could happen if the unauthorised user knows another user's login ID and password. Another example is malicious logic, such as a Trojan horse, that appears to perform a useful or desirable function, but actually gains unauthorised access to system resources or tricks a user into running 

other malicious logic.


Falsification


Falsification: Refers to the alteration or replacement of valid data, or the introduction of false data into a file or database. For example, a student can change their grades in a school's database.


Repudiation


Repudiation: In this case, a user  denies sending data, or a user denies having received or possessing the data.


Disruption is a threat to the availability or integrity of the system. The following types of attacks can lead to this threat:


Incapacitation


Incapacitation : This is a system availability attack. This can be caused by physical destruction  or damage to the system hardware. Typically, malicious software such as Trojan horses, viruses, or worms could work by disabling a system or some of its services.


Corruption


Corruption: This is an attack on the integrity of the system. Malicious software in this context could act in such a way that system resources or services work in an undesired way. Or a user could gain unauthorised access to a system and change some of its functionality. An example of the latter is a user injecting backdoor logic into the system to later grant access to a system and its resources using a different mechanism than usual


Obstruction


Obstruction: One way to interfere with system operation is to disrupt communications by disabling communications links or tampering with communications control information. Another possibility is to overload the system by overloading the communication traffic or processing resources.


Usurpation is a threat to system integrity. The following types of attacks can result in this threat consequence:


Misappropriation


Misappropriation : This may include theft of services. An example is a distributed denial of service attack, where malware is installed on multiple hosts to use them as platforms to launch traffic to a target host. In this case, the malware makes unauthorised use of processor and operating system resources.



Misuse


Misuse: Misuse can occur through malicious logic or a hacker who has gained unauthorised access to a system. In either case, security features can be disabled or defeated.



ليست هناك تعليقات:

إرسال تعليق