Different Types of Cyber Security Threats & Attacks and the Preventive Measures
![]() |
Different Types of Cyber Security Threats & Attacks in computer cyber security |
We now move on to a more detailed look at threats, attacks andresources.First,we'll discuss the types of security threats that need to be addressed, and then provide some examples of the types of threats that apply to different categories of assets.
Based on RFC 2828, it describes four types of threat outcomes and lists the types of attacks that lead to each outcome.
Unauthorised disclosure is a threat to confidentiality. The following types of attacks can lead to this threat:
Disclosure
Disclosure: This can be done intentionally, such as when an insider intentionally discloses confidential information, such as credit card numbers, to an outsider. It can also be the result of human, hardware, or software error leading to an entity gaining unauthorised knowledge of sensitive data. There have been numerous cases of this, such as B. Universities accidentally posting confidential student information on the Internet.
Interception
Interception: Interception is a common communication-related attack. On a shared local area network (LAN) such as B. an external broadcast Ethernet or a wireless LAN, each device connected to the LAN can receive a copy of packets destined for another device. On the Internet, a determined hacker can gain access to email traffic and other data transmissions. All of these situations create the possibility of unauthorised access to data.
Inference
Inference: An example of inference is traffic analysis, where an attacker can obtain information by looking at the traffic pattern on a network, such as the amount of traffic between specific pairs of hosts on the network. Another example is the derivation of detailed information from a database by a user with restricted access; This is achieved through repeated queries, the combined results of which allow inferences.
Intrusion
Intrusion: An example of an intrusion is an attacker who gains unauthorised access to sensitive data by bypassing system access control protection.
Deception is a threat to system or data integrity. The following types of attacks can lead to this threat:
Masquerade
Masquerade: An example of masquerade is an attempt by an unauthorised user to gain access to a system by posing as an authorised user; This could happen if the unauthorised user knows another user's login ID and password. Another example is malicious logic, such as a Trojan horse, that appears to perform a useful or desirable function, but actually gains unauthorised access to system resources or tricks a user into running
other malicious logic.
Falsification
Falsification: Refers to the alteration or replacement of valid data, or the introduction of false data into a file or database. For example, a student can change their grades in a school's database.
Repudiation
Repudiation: In this case, a user denies sending data, or a user denies having received or possessing the data.
Disruption is a threat to the availability or integrity of the system. The following types of attacks can lead to this threat:
Incapacitation
Incapacitation : This is a system availability attack. This can be caused by physical destruction or damage to the system hardware. Typically, malicious software such as Trojan horses, viruses, or worms could work by disabling a system or some of its services.
Corruption
Corruption: This is an attack on the integrity of the system. Malicious software in this context could act in such a way that system resources or services work in an undesired way. Or a user could gain unauthorised access to a system and change some of its functionality. An example of the latter is a user injecting backdoor logic into the system to later grant access to a system and its resources using a different mechanism than usual
Obstruction
Obstruction: One way to interfere with system operation is to disrupt communications by disabling communications links or tampering with communications control information. Another possibility is to overload the system by overloading the communication traffic or processing resources.
Usurpation is a threat to system integrity. The following types of attacks can result in this threat consequence:
Misappropriation
Misappropriation : This may include theft of services. An example is a distributed denial of service attack, where malware is installed on multiple hosts to use them as platforms to launch traffic to a target host. In this case, the malware makes unauthorised use of processor and operating system resources.
Misuse
Misuse: Misuse can occur through malicious logic or a hacker who has gained unauthorised access to a system. In either case, security features can be disabled or defeated.
ليست هناك تعليقات:
إرسال تعليق