SlideShare a Scribd company logo
1.3.2 Attacks evolution
As we discussed in the video the cyber threat landscape continues to
evolve, as shown in the timeline below. Many organisations still consider
virus protection as the key method in managing the cyber risk. Yet as we
have evolved from viruses towards an every more connected world so the
threat has mutated. The risks from 5th, and even 6th, generation attacks
on organisations and their supply chains is real. Whilst the Internet of
Things and smart devices create opportunities for organisations to change
their business models, the inherent vulnerabilities create additional
opportunities for the threat actors. As finance professionals we need to
understand how the transformation of the business model and our
increasing use of data for analytics and predictions has risks attached to
it. These are risks that we need to play a full role in managing.
The first generation of cyberattacks in the late 1980s consisted of viruses
carried on floppy discs that would need to be inserted into computers. The
response to this was the invention of signature-based anti-virus solutions -
with first being probably from Norton.
The second generation, which came about in the early 90s, attacks were
launched over the internet instead of through floppy disks as networks and
connectivity developed. Organisations invested in firewalls to secure the
perimeters of IT infrastructure.
In the third generation, which took place in the early 2000s, cyber-attackers
evolved again to exploit vulnerabilities in software applications that relied
on internet access. Botnets were being used to send out spam paving way
for companies to introduce Intrusion Prevention Systems (IPS).
In roughly 2010, cyber-attackers continued this evolution by developing 4th
generation polymorphic malware that could take a different form in different
attacks. This led to the introduction of Behavioural Analysis solutions
which focuses on detecting suspicious network or user behaviour.
A 5th generation cyberattack, is a large scale, multi-vector attack vector that
is designed to infect multiple components of an information technology
infrastructure, including networks, virtual machines, cloud instances and
endpoint devices. 5th generation attacks can be extremely dangerous
because they can spread quickly and outmanoeuvre conventional
detection-based defences such as firewalls. 5th generation attacks are a
part of the natural evolution of threats as changing defences force attackers
to hone their craft. NotPetya and WannaCry are two early examples of 5th
generation attacks.
These attacks are typically characterised by their ability to cause very large
data breaches and destruction of service (DeOS). Because 5th generation
cyber-attacks can happen faster than conventional security systems can
deal with, the focus for dealing with this type of cybersecurity problem
should be on preventing attacks by correlating, storing and analysing data
across all network devices in real time.
6th generation cyber attacks are now starting to emerge. These attacks
happen to be most destructive as hackers are devised with tools to attack
everything and anything digital. After the introduction of the 5G network,
attacks on IoT might increase at an alarming rate which will pave way for
complex security requirements.
Attact evolution

More Related Content

What's hot

PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
Phdtopiccom
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
brittneytaylor
 
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
ijp2p
 
Case study 11
Case study 11Case study 11
Case study 11
khaled alsaeh
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
Marshall Frett Jr.
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threats
rashidalkamdah
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
Government
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In Breadth
Courtland Smith
 
Securing Mobile Devices
Securing Mobile DevicesSecuring Mobile Devices
Securing Mobile Devices
Kamaljeet Singh Matharu (Kam)
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
EASTWEST Public Relations
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
mj tanasas
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
Pankaj Jha
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
Computing Cage
 
Case study 13
Case study 13Case study 13
Case study 13
khaled alsaeh
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
kent neri
 
Network security
Network securityNetwork security
Network security
nageshkanna13
 
Network security
Network securityNetwork security
Network security
Nikhil Vyas
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
aletarw
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
AfreenYousaf
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
S.E. CTS CERT-GOV-MD
 

What's hot (20)

PhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-SecurityPhD-Guidance-in-Cyber-Security
PhD-Guidance-in-Cyber-Security
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
CALL FOR PAPERS - 7th International Conference on Software Security (ICSS 2021)
 
Case study 11
Case study 11Case study 11
Case study 11
 
Cyber Security Briefing
Cyber Security BriefingCyber Security Briefing
Cyber Security Briefing
 
Rashed al kamdah network security threats
Rashed al kamdah network security threatsRashed al kamdah network security threats
Rashed al kamdah network security threats
 
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_CybersecurtyA_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
A_novel_concept_for_Cybersecurity_ Institutional_Cybersecurty
 
White Paper: Defense In Breadth
White Paper: Defense In BreadthWhite Paper: Defense In Breadth
White Paper: Defense In Breadth
 
Securing Mobile Devices
Securing Mobile DevicesSecuring Mobile Devices
Securing Mobile Devices
 
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
Irdeto Spokesman Yuan Xiang Gu Speaks At ISI SSP Beijing 2011
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
Network Security Research Paper
Network Security Research PaperNetwork Security Research Paper
Network Security Research Paper
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Case study 13
Case study 13Case study 13
Case study 13
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Network Security Issues
Network Security IssuesNetwork Security Issues
Network Security Issues
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 

Similar to Attact evolution

How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
online Marketing
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
healdkathaleen
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
IAEME Publication
 
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
CompanySeceon
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
Kashif Ali
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
BryCunal
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docx
NigussMehari4
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
karenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
croysierkathey
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
C018131821
C018131821C018131821
C018131821
IOSR Journals
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
Cisco Security
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
Andreas Hiller
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
ssuser719d6b
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
jeffreye3
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
Heidi Maestas
 
Information security
Information securityInformation security
Information security
Appin Faridabad
 

Similar to Attact evolution (20)

How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONSCYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
CYBER SECURITY: A SURVEY ON ISSUES AND SOLUTIONS
 
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrateOverseeCyberSecurityAsHackersSeekToInfiltrate
OverseeCyberSecurityAsHackersSeekToInfiltrate
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docx
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
C018131821
C018131821C018131821
C018131821
 
Cisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack ContinuumCisco Addresses the Full Attack Continuum
Cisco Addresses the Full Attack Continuum
 
Honey Pot Intrusion Detection System
Honey Pot Intrusion Detection SystemHoney Pot Intrusion Detection System
Honey Pot Intrusion Detection System
 
Sophos security-threat-report-2014-na
Sophos security-threat-report-2014-naSophos security-threat-report-2014-na
Sophos security-threat-report-2014-na
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docxSecurity Issues Concerning CryptosystemsStudents NameInstitu.docx
Security Issues Concerning CryptosystemsStudents NameInstitu.docx
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Information security
Information securityInformation security
Information security
 

Recently uploaded

World earth day powe point presentation 2024
World earth day powe point presentation 2024World earth day powe point presentation 2024
World earth day powe point presentation 2024
MayankShekharSrivast
 
快速办理(Calabria毕业证书)卡拉布里亚大学毕业证在读证明一模一样
快速办理(Calabria毕业证书)卡拉布里亚大学毕业证在读证明一模一样快速办理(Calabria毕业证书)卡拉布里亚大学毕业证在读证明一模一样
快速办理(Calabria毕业证书)卡拉布里亚大学毕业证在读证明一模一样
astuz
 
world-environment-day-2024-240601103559-14f4c0b4.pptx
world-environment-day-2024-240601103559-14f4c0b4.pptxworld-environment-day-2024-240601103559-14f4c0b4.pptx
world-environment-day-2024-240601103559-14f4c0b4.pptx
mfasna35
 
PACKAGING OF FROZEN FOODS ( food technology)
PACKAGING OF FROZEN FOODS  ( food technology)PACKAGING OF FROZEN FOODS  ( food technology)
PACKAGING OF FROZEN FOODS ( food technology)
Addu25809
 
在线办理(lboro毕业证书)拉夫堡大学毕业证学历证书一模一样
在线办理(lboro毕业证书)拉夫堡大学毕业证学历证书一模一样在线办理(lboro毕业证书)拉夫堡大学毕业证学历证书一模一样
在线办理(lboro毕业证书)拉夫堡大学毕业证学历证书一模一样
pjq9n1lk
 
Optimizing Post Remediation Groundwater Performance with Enhanced Microbiolog...
Optimizing Post Remediation Groundwater Performance with Enhanced Microbiolog...Optimizing Post Remediation Groundwater Performance with Enhanced Microbiolog...
Optimizing Post Remediation Groundwater Performance with Enhanced Microbiolog...
Joshua Orris
 
学校原版(unuk学位证书)英国牛津布鲁克斯大学毕业证硕士文凭原版一模一样
学校原版(unuk学位证书)英国牛津布鲁克斯大学毕业证硕士文凭原版一模一样学校原版(unuk学位证书)英国牛津布鲁克斯大学毕业证硕士文凭原版一模一样
学校原版(unuk学位证书)英国牛津布鲁克斯大学毕业证硕士文凭原版一模一样
ehfyqtu
 
一比一原版西澳大学毕业证学历证书如何办理
一比一原版西澳大学毕业证学历证书如何办理一比一原版西澳大学毕业证学历证书如何办理
一比一原版西澳大学毕业证学历证书如何办理
yxfus
 
原版制作(Newcastle毕业证书)纽卡斯尔大学毕业证在读证明一模一样
原版制作(Newcastle毕业证书)纽卡斯尔大学毕业证在读证明一模一样原版制作(Newcastle毕业证书)纽卡斯尔大学毕业证在读证明一模一样
原版制作(Newcastle毕业证书)纽卡斯尔大学毕业证在读证明一模一样
p2npnqp
 
Download the Latest OSHA 10 Answers PDF : oyetrade.com
Download the Latest OSHA 10 Answers PDF : oyetrade.comDownload the Latest OSHA 10 Answers PDF : oyetrade.com
Download the Latest OSHA 10 Answers PDF : oyetrade.com
Narendra Jayas
 
SOIL AND ITS FORMATION bjbhjbhvhvhjvhj .pptx
SOIL AND ITS FORMATION bjbhjbhvhvhjvhj .pptxSOIL AND ITS FORMATION bjbhjbhvhvhjvhj .pptx
SOIL AND ITS FORMATION bjbhjbhvhvhjvhj .pptx
anmolbansal1969
 
Formulation of aramang baked products enriched with malunggay
Formulation of aramang baked products enriched with malunggayFormulation of aramang baked products enriched with malunggay
Formulation of aramang baked products enriched with malunggay
Open Access Research Paper
 
Kinetic studies on malachite green dye adsorption from aqueous solutions by A...
Kinetic studies on malachite green dye adsorption from aqueous solutions by A...Kinetic studies on malachite green dye adsorption from aqueous solutions by A...
Kinetic studies on malachite green dye adsorption from aqueous solutions by A...
Open Access Research Paper
 
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
xeexm
 
Monitor indicators of genetic diversity from space using Earth Observation data
Monitor indicators of genetic diversity from space using Earth Observation dataMonitor indicators of genetic diversity from space using Earth Observation data
Monitor indicators of genetic diversity from space using Earth Observation data
Spatial Genetics
 
快速办理(Manchester毕业证书)曼彻斯特大学毕业证录取通知书一模一样
快速办理(Manchester毕业证书)曼彻斯特大学毕业证录取通知书一模一样快速办理(Manchester毕业证书)曼彻斯特大学毕业证录取通知书一模一样
快速办理(Manchester毕业证书)曼彻斯特大学毕业证录取通知书一模一样
p2npnqp
 
一比一原版(Glasgow毕业证)英国格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证)英国格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证)英国格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证)英国格拉斯哥大学毕业证如何办理
aonx8o5f
 
BASIC CONCEPT OF ENVIRONMENT AND DIFFERENT CONSTITUTENET OF ENVIRONMENT
BASIC CONCEPT OF ENVIRONMENT AND DIFFERENT CONSTITUTENET OF ENVIRONMENTBASIC CONCEPT OF ENVIRONMENT AND DIFFERENT CONSTITUTENET OF ENVIRONMENT
BASIC CONCEPT OF ENVIRONMENT AND DIFFERENT CONSTITUTENET OF ENVIRONMENT
AmitKumar619042
 
Lessons from operationalizing integrated landscape approaches
Lessons from operationalizing integrated landscape approachesLessons from operationalizing integrated landscape approaches
Lessons from operationalizing integrated landscape approaches
CIFOR-ICRAF
 
Biomimicry in agriculture: Nature-Inspired Solutions for a Greener Future
Biomimicry in agriculture: Nature-Inspired Solutions for a Greener FutureBiomimicry in agriculture: Nature-Inspired Solutions for a Greener Future
Biomimicry in agriculture: Nature-Inspired Solutions for a Greener Future
Dr. P.B.Dharmasena
 

Recently uploaded (20)

World earth day powe point presentation 2024
World earth day powe point presentation 2024World earth day powe point presentation 2024
World earth day powe point presentation 2024
 
快速办理(Calabria毕业证书)卡拉布里亚大学毕业证在读证明一模一样
快速办理(Calabria毕业证书)卡拉布里亚大学毕业证在读证明一模一样快速办理(Calabria毕业证书)卡拉布里亚大学毕业证在读证明一模一样
快速办理(Calabria毕业证书)卡拉布里亚大学毕业证在读证明一模一样
 
world-environment-day-2024-240601103559-14f4c0b4.pptx
world-environment-day-2024-240601103559-14f4c0b4.pptxworld-environment-day-2024-240601103559-14f4c0b4.pptx
world-environment-day-2024-240601103559-14f4c0b4.pptx
 
PACKAGING OF FROZEN FOODS ( food technology)
PACKAGING OF FROZEN FOODS  ( food technology)PACKAGING OF FROZEN FOODS  ( food technology)
PACKAGING OF FROZEN FOODS ( food technology)
 
在线办理(lboro毕业证书)拉夫堡大学毕业证学历证书一模一样
在线办理(lboro毕业证书)拉夫堡大学毕业证学历证书一模一样在线办理(lboro毕业证书)拉夫堡大学毕业证学历证书一模一样
在线办理(lboro毕业证书)拉夫堡大学毕业证学历证书一模一样
 
Optimizing Post Remediation Groundwater Performance with Enhanced Microbiolog...
Optimizing Post Remediation Groundwater Performance with Enhanced Microbiolog...Optimizing Post Remediation Groundwater Performance with Enhanced Microbiolog...
Optimizing Post Remediation Groundwater Performance with Enhanced Microbiolog...
 
学校原版(unuk学位证书)英国牛津布鲁克斯大学毕业证硕士文凭原版一模一样
学校原版(unuk学位证书)英国牛津布鲁克斯大学毕业证硕士文凭原版一模一样学校原版(unuk学位证书)英国牛津布鲁克斯大学毕业证硕士文凭原版一模一样
学校原版(unuk学位证书)英国牛津布鲁克斯大学毕业证硕士文凭原版一模一样
 
一比一原版西澳大学毕业证学历证书如何办理
一比一原版西澳大学毕业证学历证书如何办理一比一原版西澳大学毕业证学历证书如何办理
一比一原版西澳大学毕业证学历证书如何办理
 
原版制作(Newcastle毕业证书)纽卡斯尔大学毕业证在读证明一模一样
原版制作(Newcastle毕业证书)纽卡斯尔大学毕业证在读证明一模一样原版制作(Newcastle毕业证书)纽卡斯尔大学毕业证在读证明一模一样
原版制作(Newcastle毕业证书)纽卡斯尔大学毕业证在读证明一模一样
 
Download the Latest OSHA 10 Answers PDF : oyetrade.com
Download the Latest OSHA 10 Answers PDF : oyetrade.comDownload the Latest OSHA 10 Answers PDF : oyetrade.com
Download the Latest OSHA 10 Answers PDF : oyetrade.com
 
SOIL AND ITS FORMATION bjbhjbhvhvhjvhj .pptx
SOIL AND ITS FORMATION bjbhjbhvhvhjvhj .pptxSOIL AND ITS FORMATION bjbhjbhvhvhjvhj .pptx
SOIL AND ITS FORMATION bjbhjbhvhvhjvhj .pptx
 
Formulation of aramang baked products enriched with malunggay
Formulation of aramang baked products enriched with malunggayFormulation of aramang baked products enriched with malunggay
Formulation of aramang baked products enriched with malunggay
 
Kinetic studies on malachite green dye adsorption from aqueous solutions by A...
Kinetic studies on malachite green dye adsorption from aqueous solutions by A...Kinetic studies on malachite green dye adsorption from aqueous solutions by A...
Kinetic studies on malachite green dye adsorption from aqueous solutions by A...
 
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
按照学校原版(UAL文凭证书)伦敦艺术大学毕业证快速办理
 
Monitor indicators of genetic diversity from space using Earth Observation data
Monitor indicators of genetic diversity from space using Earth Observation dataMonitor indicators of genetic diversity from space using Earth Observation data
Monitor indicators of genetic diversity from space using Earth Observation data
 
快速办理(Manchester毕业证书)曼彻斯特大学毕业证录取通知书一模一样
快速办理(Manchester毕业证书)曼彻斯特大学毕业证录取通知书一模一样快速办理(Manchester毕业证书)曼彻斯特大学毕业证录取通知书一模一样
快速办理(Manchester毕业证书)曼彻斯特大学毕业证录取通知书一模一样
 
一比一原版(Glasgow毕业证)英国格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证)英国格拉斯哥大学毕业证如何办理一比一原版(Glasgow毕业证)英国格拉斯哥大学毕业证如何办理
一比一原版(Glasgow毕业证)英国格拉斯哥大学毕业证如何办理
 
BASIC CONCEPT OF ENVIRONMENT AND DIFFERENT CONSTITUTENET OF ENVIRONMENT
BASIC CONCEPT OF ENVIRONMENT AND DIFFERENT CONSTITUTENET OF ENVIRONMENTBASIC CONCEPT OF ENVIRONMENT AND DIFFERENT CONSTITUTENET OF ENVIRONMENT
BASIC CONCEPT OF ENVIRONMENT AND DIFFERENT CONSTITUTENET OF ENVIRONMENT
 
Lessons from operationalizing integrated landscape approaches
Lessons from operationalizing integrated landscape approachesLessons from operationalizing integrated landscape approaches
Lessons from operationalizing integrated landscape approaches
 
Biomimicry in agriculture: Nature-Inspired Solutions for a Greener Future
Biomimicry in agriculture: Nature-Inspired Solutions for a Greener FutureBiomimicry in agriculture: Nature-Inspired Solutions for a Greener Future
Biomimicry in agriculture: Nature-Inspired Solutions for a Greener Future
 

Attact evolution

  • 1. 1.3.2 Attacks evolution As we discussed in the video the cyber threat landscape continues to evolve, as shown in the timeline below. Many organisations still consider virus protection as the key method in managing the cyber risk. Yet as we have evolved from viruses towards an every more connected world so the threat has mutated. The risks from 5th, and even 6th, generation attacks on organisations and their supply chains is real. Whilst the Internet of Things and smart devices create opportunities for organisations to change their business models, the inherent vulnerabilities create additional opportunities for the threat actors. As finance professionals we need to understand how the transformation of the business model and our increasing use of data for analytics and predictions has risks attached to it. These are risks that we need to play a full role in managing.
  • 2.
  • 3. The first generation of cyberattacks in the late 1980s consisted of viruses carried on floppy discs that would need to be inserted into computers. The response to this was the invention of signature-based anti-virus solutions - with first being probably from Norton. The second generation, which came about in the early 90s, attacks were launched over the internet instead of through floppy disks as networks and connectivity developed. Organisations invested in firewalls to secure the perimeters of IT infrastructure. In the third generation, which took place in the early 2000s, cyber-attackers evolved again to exploit vulnerabilities in software applications that relied on internet access. Botnets were being used to send out spam paving way for companies to introduce Intrusion Prevention Systems (IPS). In roughly 2010, cyber-attackers continued this evolution by developing 4th generation polymorphic malware that could take a different form in different attacks. This led to the introduction of Behavioural Analysis solutions which focuses on detecting suspicious network or user behaviour. A 5th generation cyberattack, is a large scale, multi-vector attack vector that is designed to infect multiple components of an information technology infrastructure, including networks, virtual machines, cloud instances and endpoint devices. 5th generation attacks can be extremely dangerous because they can spread quickly and outmanoeuvre conventional detection-based defences such as firewalls. 5th generation attacks are a part of the natural evolution of threats as changing defences force attackers to hone their craft. NotPetya and WannaCry are two early examples of 5th generation attacks. These attacks are typically characterised by their ability to cause very large data breaches and destruction of service (DeOS). Because 5th generation cyber-attacks can happen faster than conventional security systems can deal with, the focus for dealing with this type of cybersecurity problem should be on preventing attacks by correlating, storing and analysing data across all network devices in real time. 6th generation cyber attacks are now starting to emerge. These attacks happen to be most destructive as hackers are devised with tools to attack everything and anything digital. After the introduction of the 5G network, attacks on IoT might increase at an alarming rate which will pave way for complex security requirements.