Computer Science, asked by anjalidas3211, 3 months ago

Essay - Cyber attacks and it's prevention.

Answers

Answered by MITAN19
2

Answer+Explanation:

As technology progress and capabilities of information warfare have developed significantly in recent years, the probability of cyber attacks have increased as well. Computer-network attacks mainly known as cyber attacks can destroy adversary data, computer systems, and networks, and can have a major effect on an adversary’s ability to wage war

In the cyber arena, the situation is, in some ways, worse than simply paying too little heed to a potential new threat until it manifests itself. Threats in the cyber arena have manifested themselves. We are reminded constantly of our vulnerabilities to the threat, yet we still are not doing enough. Every hour of every day, some individual or group is writing or disseminating a new disruptive virus or worm or is breaking into a computer network or to harm a network by some other means . It is usually said that it is very productive and simple to bring computer in our systems and to increase its usage but at the same time it is significantly difficult and far more expensive to develop technologies to make it secure mainly because of the internet, a network which is used to share information rather than hiding it. Most cyber attackers are attracted to high value targets such as networks, servers, or routers, whose disruption could yield financial

Types of cyber Attacks:

According to Main objective of the cyber attacker is to steal, destroy, remove or change information or to block the functionality of the system which they want to target. We can divide these attacks typically into three main categories,

Unauthorized Intrusion or Hacking

Destructive Viruses or Worms  

Denial of Service attacks (DoS)

Establish threat intelligence gathering

Capability

Threat monitoring

Risk analysis

Security strategy validation

Minimize delivery of malware

Security awareness enhancements  

Continuous controls update

Website protection

Threat monitoring

Application security testing

Prevent execution of malware

Application whitelisting

Least access privileges

Network restrictions/segmenting

Identity and access management

Protect the data

Protect the data/data loss prevention

Detect and respond

Host and network anomaly detection

Incident response program

Forensics

Minimize delivery of malware:

By strictly implementing the traditional security measures in the organization the threat of malware can be greatly reduced below mentioned are the ways how we can reduce the threat level.

Social engineering:

It is one of the most common methods of reducing the threat or malware environment. There are number of ways by which this threat can be introduce like phishing or dropping USB in organization premises and hoping some one will use this USB in company computer, resulting employees unintentionally perform a harmful action.

Security awareness:

Mean to educate the employee about the common threats which are used by the cyber attackers. This awareness can be increase by including security awareness programs in the companies overall defense in depth strategy. These programs should include education about new threats different examples how employees contribute to the success of the attack and lesson learned what means are used by cyber attacker using social media etc. to target organizational networks and than take the feedback from the employees .

Malicious software:

Another way which can reduce the threat of cyber attack is a use of registered software’s on all user computers. Corrupted or pirated software’s are also the main source of introducing malware in the network.

Phishing and DNS redirection:

Threat can be introduced in the company network by redirecting the DNS to a malware site while preventing the user from visiting the hack or fraudent site to begin with would be preferred but it would not happen most of the time. So it is preferred to block the sites but it is infective to block the sites on domain name bases because they can easily be change.

Protect the data:

Data is the most important aspect in information system because at the end it all about the data. By implementing the Data Loss Prevention DLP solution can help stop malware collecting the sensitive data and from sanding data back to attacker home network.

Conclusion:

As cyber crime become a global issue so globally Governments are putting all their resources against these crimes by imposing legislation against these activities and most of the country have consensus to help each other against cyber attacks. Software companies are developing most sensitive tools and controls in order to protect organizational or government assets from these threats. The most important thing is to implement all those advance controls along with conventional security measures to safe guard all sort of assets from cyber attack.

Similar questions