Malware
Malware has been around
for a long time, and continues to plague computers to this day. Malware is
catch-all word for any software designed to damage a computer or computer
system. The first widely spread malware, known as the Melissa Virus, was
unleased in 1999. Eighteen years later, malware remains a dangerous weapon,
used by cyber criminals to harvest information, commit fraud, or just cause
mayhem.
Cyber security strategies for malware
For both homes and
businesses, a good anti-malware software is essential. Anti-malware programs
can both find and remove malware that has been installed on a computer, and
prevent malware from installing itself in the first place. Also essential is
instructing users to practice common sense when using the internet: never open
unexpected email or chat attachments, and be careful when clicking links on the
internet if you can't be certain where they'll lead.
DoS (Denial of Service) attacks
One of the simplest forms
of cyber attack, DoS attacks shut down a target's servers, making it impossible
to access their websites or use their online services. This is most commonly
done by flooding a target's servers with traffic until they overload and crash.
One of the most common forms DoS attack involves getting large numbers of attackers
to flood their target's servers at once, making it almost impossible to block
the incoming traffic.
Strategies for DoS attacks
The simplest method for
thwarting DoS attacks is having extra bandwidth. If you fear your business
might be targeted for DoS attacks, simply having enough server space to handle
the increased traffic can render the attacks moot. There are also third-party
services who can help your company stay online during a DoS attack
Phishing
In a phishing attack, a
cyber criminal attempts to extract personal information out of you by tricking
you into giving it to them. Bolder scam artists might attempt to acquire a
victim's social security number or bank account information. However, many
phishing scams involve tricking a victim into giving away their password for a
single website or app. A recent phishing scam used Google Docs to trick users
into entering their Google login information.
Strategies for Phishing attacks
Phishing attacks are
particularly worrisome because they involve tricking users through the
appearance of legitimacy; the Google Docs scam spread by tricking users into
opening a shared document sent to them by someone they knew and submitting
their login info. Their attackers could then steal that information and send the
document to everyone on the victim's contact list, causing the scam to spread
rapidly.
Resources:
1-https://one.comodo.com/blog/cyber-security/what-is-cyber-security.php
2-https://us.norton.com/internetsecurity-malware-what-is-cybersecurity-what-you-need-to-know.html
3-
No comments:
Post a Comment