Your SlideShare is downloading. ×
Cybersecurity 2 cyber attacks
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Cybersecurity 2 cyber attacks

1,087

Published on

Explains 5 different types of cyberattack that may occur

Explains 5 different types of cyberattack that may occur

Published in: Technology, News & Politics
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,087
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
66
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Cyber attacks 2013 Slide 1 Cyber attacks
  • 2. Cyber attacks 2013 Slide 2 5 types of cyber attack • Cyber fraud • Cyber spying • Cyber stalking and bullying • Cyber assault • Cyber warfare
  • 3. Cyber attacks 2013 Slide 3 Cyber fraud • Cyber attacks that are generally aimed at gaining monetary or related gains for the perpetrator.
  • 4. Cyber attacks 2013 Slide 4 Cyber-fraud • Phishing attacks combined with fake websites to steal users’ personal details and, with these, steal money from their accounts – Fraudsters set up a fake website that looks like a bank website – Emails are sent to large numbers of recipients with a link to this site and a message trying to lure them to log on – If the click on the link, their personal details are collected and then used by the fraudster to access their legitimate site
  • 5. Cyber attacks 2013 Slide 5 © McAfee 2011
  • 6. Cyber attacks 2013 Slide 6 Cyber spying • Cyber attacks aimed at gaining information for the perpetrator. Related to cyber-fraud in that one aim of cyber- spying may be to sell the information gained
  • 7. Cyber attacks 2013 Slide 7 Cyber-spying © The Hacker News 2011
  • 8. Cyber attacks 2013 Slide 8 © GCN 2011
  • 9. Cyber attacks 2013 Slide 9 Cyber stalking and bullying • Cyber attacks which are designed to frighten and intimidate individuals rather than businesses or government • Often targeted at young women • Usually social media based – Facebook or Twitter
  • 10. Cyber attacks 2013 Slide 10 © Irish Independent 2013
  • 11. Cyber attacks 2013 Slide 11 © Daily Mail, UK 2012
  • 12. Cyber attacks 2013 Slide 12 Twitter trolls
  • 13. Cyber attacks 2013 Slide 13 Cyber assault • Cyber-attacks aimed at causing damage to information or equipment that is being attacked. • Damage may be physical damage to equipment, reputational damage or corruption or deletion of important information. • Cyber bullying is also a form of cyber assault as its aim is to cause psychological damage
  • 14. Cyber attacks 2013 Slide 14 • Related to cyber fraud in that some attacks such as Distributed Denial of Service (DDOS) attacks may be precursors to attempts to extort money from those affected by the attacks.
  • 15. Cyber attacks 2013 Slide 15 © threatpost.com 2012
  • 16. Cyber attacks 2013 Slide 16 Cyber warfare • An extreme form of cyber-assault where at least one of the parties involved is a nation state.
  • 17. Cyber attacks 2013 Slide 17 Cyber warfare attacks • These are much harder to validate as, for obvious reasons, neither the perpetrator or the victim wish to release information • Denial of service attacks – Government and critical infrastructure sites attacked by DoS attacks with a view to taking them offline • Malware – Malware introduced to target and damage government and infrastructure facilities
  • 18. Cyber attacks 2013 Slide 18 © The Guardian 2007 © BBC 2007
  • 19. Cyber attacks 2013 Slide 19© CTV News 2012
  • 20. Cyber attacks 2013 Slide 20 Summary • Cyber fraud • Cyber spying • Cyber stalking and bullying • Cyber assault • Cyber warfare

×