Cybersecurity 2 cyber attacks

770 views

Published on

Describes the different types of cyber attack that can occur

Accompanies YouTube video

Published in: News & Politics, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
770
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
55
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Cybersecurity 2 cyber attacks

  1. 1. Cyber attacks Cyber attacks 2013 Slide 1
  2. 2. 5 types of cyber attack • Cyber fraud • Cyber spying • Cyber stalking and bullying • Cyber assault • Cyber warfare Cyber attacks 2013 Slide 2
  3. 3. Cyber fraud • Cyber attacks that are generally aimed at gaining monetary or related gains for the perpetrator. Cyber attacks 2013 Slide 3
  4. 4. Cyber-fraud • Phishing attacks combined with fake websites to steal users’ personal details and, with these, steal money from their accounts – Fraudsters set up a fake website that looks like a bank website – Emails are sent to large numbers of recipients with a link to this site and a message trying to lure them to log on – If the click on the link, their personal details are collected and then used by the fraudster to access their legitimate site Cyber attacks 2013 Slide 4
  5. 5. Cyber attacks 2013 © McAfee 2011 Slide 5
  6. 6. Cyber spying • Cyber attacks aimed at gaining information for the perpetrator. Related to cyber-fraud in that one aim of cyberspying may be to sell the information gained Cyber attacks 2013 Slide 6
  7. 7. Cyber-spying © The Hacker News 2011 Cyber attacks 2013 Slide 7
  8. 8. © GCN 2011 Cyber attacks 2013 Slide 8
  9. 9. Cyber stalking and bullying • Cyber attacks which are designed to frighten and intimidate individuals rather than businesses or government • Often targeted at young women • Usually social media based – Facebook or Twitter Cyber attacks 2013 Slide 9
  10. 10. © Irish Independent 2013 Cyber attacks 2013 Slide 10
  11. 11. © Daily Mail, UK 2012 Cyber attacks 2013 Slide 11
  12. 12. Twitter trolls Cyber attacks 2013 Slide 12
  13. 13. Cyber assault • Cyber-attacks aimed at causing damage to information or equipment that is being attacked. • Damage may be physical damage to equipment, reputational damage or corruption or deletion of important information. • Cyber bullying is also a form of cyber assault as its aim is to cause psychological damage Cyber attacks 2013 Slide 13
  14. 14. • Related to cyber fraud in that some attacks such as Distributed Denial of Service (DDOS) attacks may be precursors to attempts to extort money from those affected by the attacks. Cyber attacks 2013 Slide 14
  15. 15. © threatpost.com 2012 Cyber attacks 2013 Slide 15
  16. 16. Cyber warfare • An extreme form of cyber-assault where at least one of the parties involved is a nation state. Cyber attacks 2013 Slide 16
  17. 17. Cyber warfare attacks • These are much harder to validate as, for obvious reasons, neither the perpetrator or the victim wish to release information • Denial of service attacks – • Government and critical infrastructure sites attacked by DoS attacks with a view to taking them offline Malware – Malware introduced to target and damage government and infrastructure facilities Cyber attacks 2013 Slide 17
  18. 18. © The Guardian 2007 © BBC 2007 Cyber attacks 2013 Slide 18
  19. 19. Cyber attacks 2013 © CTV News 2012 Slide 19
  20. 20. Summary • Cyber fraud • Cyber spying • Cyber stalking and bullying • Cyber assault • Cyber warfare Cyber attacks 2013 Slide 20

×