20
Cyber attacks 2013 Slide 1 Cyber attacks

Cybersecurity 2 cyber attacks

  • View
    418

  • Download
    3

Embed Size (px)

DESCRIPTION

Describes the different types of cyber attack that can occur Accompanies YouTube video

Citation preview

Page 1: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 1

Cyber attacks

Page 2: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 2

5 types of cyber attack

• Cyber fraud

• Cyber spying

• Cyber stalking and bullying

• Cyber assault

• Cyber warfare

Page 3: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 3

Cyber fraud

• Cyber attacks that are generally aimed at gaining monetary or related gains for the perpetrator. 

Page 4: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 4

Cyber-fraud• Phishing attacks combined with fake websites

to steal users’ personal details and, with these, steal money from their accounts

– Fraudsters set up a fake website that looks like a bank website

– Emails are sent to large numbers of recipients with a link to this site and a message trying to lure them to log on

– If the click on the link, their personal details are collected and then used by the fraudster to access their legitimate site

Page 5: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 5© McAfee 2011

Page 6: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 6

Cyber spying

• Cyber attacks aimed at gaining information for the perpetrator. Related to cyber-fraud in that one aim of cyber-spying may be to sell the information gained

Page 7: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 7

Cyber-spying

© The Hacker News 2011

Page 8: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 8© GCN 2011

Page 9: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 9

Cyber stalking and bullying

• Cyber attacks which are designed to frighten and intimidate individuals rather than businesses or government

• Often targeted at young women

• Usually social media based – Facebook or Twitter

Page 10: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 10

© Irish Independent 2013

Page 11: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 11

© Daily Mail, UK 2012

Page 12: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 12

Twitter trolls

Page 13: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 13

Cyber assault• Cyber-attacks aimed at causing damage

to information or equipment that is being attacked.

• Damage may be physical damage to equipment, reputational damage or corruption or deletion of important information.

• Cyber bullying is also a form of cyber assault as its aim is to cause psychological damage

Page 14: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 14

• Related to cyber fraud in that some attacks such as Distributed Denial of Service (DDOS) attacks may be precursors to attempts to extort money from those affected by the attacks.

Page 15: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 15

© threatpost.com 2012

Page 16: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 16

Cyber warfare

• An extreme form of cyber-assault where at least one of the parties involved is a nation state.

Page 17: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 17

Cyber warfare attacks• These are much harder to validate as, for

obvious reasons, neither the perpetrator or the victim wish to release information

• Denial of service attacks– Government and critical infrastructure sites attacked

by DoS attacks with a view to taking them offline

• Malware– Malware introduced to target and damage

government and infrastructure facilities

Page 18: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 18

© The Guardian 2007

© BBC 2007

Page 19: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 19© CTV News 2012

Page 20: Cybersecurity 2 cyber attacks

Cyber attacks 2013 Slide 20

Summary

• Cyber fraud

• Cyber spying

• Cyber stalking and bullying

• Cyber assault

• Cyber warfare