Cyber Security_欧阳葛瑞

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Know days, Human beings lives in a world full of internet and on-line services. We purchase through Taobao and JD, we store our pictures, videos, documentations and other personal data at google Drive and Onedrive. These advanced technologies and services made our daily work and life more convenient. But meanwhile, it also brings information security issues.

Cyber-attacks are an evolving danger to organizations, employees, and consumers. They may be designed to access or destroy sensitive data or extort money. They can, in effect, destroy businesses and damage people’s financial and personal lives.

Types of Cyber Threats

There are many types of cyberthreats that can attack your devices and networks, but they generally fall into three categories. The categories are attacks on confidentiality, integrity, and availability.

Attacks on confidentiality. These include stealing your personal identifying information and your bank account or credit card information. Many attackers will take your information and sell it on the dark web for others to purchase and use.

Attacks on integrity. These attacks consist of personal or enterprise sabotage, and are often called leaks. A cybercriminal will access and release sensitive information for the purpose of exposing the data and influencing the public to lose trust in that organization.

Attacks on availability. The aim of this type of cyberattack is to block users from accessing their own data until they pay a fee or ransom. Typically, a cybercriminal will infiltrate your network and block you from accessing important data, demanding that you pay a ransom. Companies sometimes pay the ransom and fix the cyber vulnerability afterward so that they can avoid halting business activities.

Here are a few types of cyber threats that fall into the three categories listed above:

Social engineering, a type of attack on confidentiality, is the process of psychologically manipulating people into performing actions or giving away information. Phishing attacks are the most common form of social engineering. Phishing attacks usually come in the form of a deceptive email that tricks the user into giving away personal information.

APTs (Advanced Persistent Threats), a type of attack on integrity, are attacks where an unauthorized user infiltrates a network undetected and stays in the network for a long time. The intent of an APT is to steal data and not harm the network. APTs happen most often in sectors with high-value information, such as national defense, manufacturing, and the finance industry.

相关文档
最新文档