Cybersecurity 2 cyber attacks
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Cybersecurity 2 cyber attacks

  • 486 views
Uploaded on

Describes the different types of cyber attack that can occur ...

Describes the different types of cyber attack that can occur

Accompanies YouTube video

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
486
On Slideshare
486
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
16
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Cyber attacks Cyber attacks 2013 Slide 1
  • 2. 5 types of cyber attack • Cyber fraud • Cyber spying • Cyber stalking and bullying • Cyber assault • Cyber warfare Cyber attacks 2013 Slide 2
  • 3. Cyber fraud • Cyber attacks that are generally aimed at gaining monetary or related gains for the perpetrator. Cyber attacks 2013 Slide 3
  • 4. Cyber-fraud • Phishing attacks combined with fake websites to steal users’ personal details and, with these, steal money from their accounts – Fraudsters set up a fake website that looks like a bank website – Emails are sent to large numbers of recipients with a link to this site and a message trying to lure them to log on – If the click on the link, their personal details are collected and then used by the fraudster to access their legitimate site Cyber attacks 2013 Slide 4
  • 5. Cyber attacks 2013 © McAfee 2011 Slide 5
  • 6. Cyber spying • Cyber attacks aimed at gaining information for the perpetrator. Related to cyber-fraud in that one aim of cyberspying may be to sell the information gained Cyber attacks 2013 Slide 6
  • 7. Cyber-spying © The Hacker News 2011 Cyber attacks 2013 Slide 7
  • 8. © GCN 2011 Cyber attacks 2013 Slide 8
  • 9. Cyber stalking and bullying • Cyber attacks which are designed to frighten and intimidate individuals rather than businesses or government • Often targeted at young women • Usually social media based – Facebook or Twitter Cyber attacks 2013 Slide 9
  • 10. © Irish Independent 2013 Cyber attacks 2013 Slide 10
  • 11. © Daily Mail, UK 2012 Cyber attacks 2013 Slide 11
  • 12. Twitter trolls Cyber attacks 2013 Slide 12
  • 13. Cyber assault • Cyber-attacks aimed at causing damage to information or equipment that is being attacked. • Damage may be physical damage to equipment, reputational damage or corruption or deletion of important information. • Cyber bullying is also a form of cyber assault as its aim is to cause psychological damage Cyber attacks 2013 Slide 13
  • 14. • Related to cyber fraud in that some attacks such as Distributed Denial of Service (DDOS) attacks may be precursors to attempts to extort money from those affected by the attacks. Cyber attacks 2013 Slide 14
  • 15. © threatpost.com 2012 Cyber attacks 2013 Slide 15
  • 16. Cyber warfare • An extreme form of cyber-assault where at least one of the parties involved is a nation state. Cyber attacks 2013 Slide 16
  • 17. Cyber warfare attacks • These are much harder to validate as, for obvious reasons, neither the perpetrator or the victim wish to release information • Denial of service attacks – • Government and critical infrastructure sites attacked by DoS attacks with a view to taking them offline Malware – Malware introduced to target and damage government and infrastructure facilities Cyber attacks 2013 Slide 17
  • 18. © The Guardian 2007 © BBC 2007 Cyber attacks 2013 Slide 18
  • 19. Cyber attacks 2013 © CTV News 2012 Slide 19
  • 20. Summary • Cyber fraud • Cyber spying • Cyber stalking and bullying • Cyber assault • Cyber warfare Cyber attacks 2013 Slide 20