Share On

Cyber attack Definition

Cyber attack is a deliberate exploitation of computer systems, technology dependent organizations and networks which involves various means of malicious acts usually originating from an anonymous source either to steal or alter or destroy a targeted susceptible system. It uses hostile codes to alter computer codes, program logic and data. Cyber attack may include consequences like identity theft, fraud, extortion, malware, spamming, system infiltration, Intellectual Property (IP) theft or unauthorized access.

Experts believe that terrorists could induce a coordinated cyber attack using the internet and bring down critical infrastructures. The result could be Cyber Apocalypse.

Cyber attack is the unscrupulous encroachment on the data stored in computers, and enterprises dependent on information technology resources. Also known as Computer Network Attack (CNA), this involves altering computer code, or other valuable information, which eventually results in a compromise in the quality of data or even loss of the information.

Cyber attacks are of different types, and most of them pave the way for money squandering, loss of data or even identity theft. Organizations across boundaries look out for the best practices to ward this problem off their businesses.

The most common cyber attacks that lead to massive loss of data and other fraudulent consequences include:

Malware – Malware can be described as a type of software meant to take control of your computer software, and study all your navigation and keystrokes and simultaneously sending all the confidential data to the attacker. Identifying a malware can be quite difficult; they may look harmless when downloaded as they come hidden in a .doc or a .pdf file.

Phishing – Phishing is the practice of deliberately asking the user to download a malware into their system, through emails. Users are disillusioned into thinking that the email contains some urgency and requires you to log into a website. The emails look as if they have been sent from sources you can recognize and therefore you will naturally open the email and follow the instructions, which leads to the download of the malware without your knowledge.

Denial-of-Service (DoS) – DoS attacks shut down systems, hence making it inaccessible to the user. Attackers send a huge amount of traffic or information that follows a crash.

Securities Reference Data Management: A Trend Towards Outsourcing?

White Paper By: Kurt Salmon

Securities reference data management is evolving from a necessary and often ignored cost to support operations to a central and vital role within the organization. Reference data management (RDM) is an increasingly important process in financial institutions. Securities reference data management is considered to be highly critical for the business of custodians. Read this whitepaper to...

Secure identity and data in a hyper-connected world

White Paper By: i-Sprint Innovations

In the digital era, financial institutions need to meet and exceed the expectations of a new generation tech savvy users with digital broadband access to on-demand cloud-based services via a wide range of mobile devices. In order to earn customers’ trust and confidence in their digital channels, financial institutions will have to secure identity and manage cross-channel access while...

RFID:The Solution to Automating IT & Data Center Asset Management

White Paper By: Omni-ID

How to automate IT & Data Center Asset Management? As accuracy leads to efficiency, it is a necessity for organizations to increase the accuracy of their IT inventory whether it is for compliance, security or resource optimization. Unless the IT assets can be accurately tracked, organizations place their service, security and legal obligations related to managing those assets at risk....

follow on linkedin follow on twitter follow on facebook 2018 All Rights Reserved | by: