24/7 writing help on your phone
Save to my list
Remove from my list
So naturally you will be out of pocket by criminals, if they obtained your information and impersonate you. To avoid it, you should only trust stores that, you personally use. The other method to combat this issue, is if you install an anti virus. One of the other reasons is based on revenge, or even psychological. This would also make you paranoid, anxious and even out right trolling.
Whilst information Commissioner's Office (ICO) also finned TalkTalk, a whopping £400,000 failing to protect customer data. They also lost reputation and 10% of their market share, share on the London Stock Exchange.
The Insider. Yes, you've heard it correctly, the Insider. Where the phrase or in this case type of hacker is used for conspiracy theories. I suppose to some aspect it's quite apt. Why it is apt? Well normally it is a disgruntled employee who might have been mistreated, so they go along and hack the company in revenge. That's normally the motive, or it could be someone screwing around, with the said company to bring it on its knees so then they can make some serious dosh. Minding you it doesn't always work. The only prime example as of recent history of a disgruntled employee I can think of, or person of interest is Edward Snowden. He used to work for the NSA until he got annoyed with the agency. Whilst any other insider stuff I could personally think of weren't done by hacking, but with explosives.
No, not the drug smuggling kind. The hacker kind. They're the sort of hacker who act like a tax haven, but only with ill-gotten gains such as information, money and use the mule to get away from authorities. This is so then the said hacker could still do their own thing, still hacking, still getting authorities on their radar and keep, their "goodies" held somewhere, where authorities won't suspect a thing. The most recent Mule is Kristina Svechinskaya, who is famous for funneling money from British and American banks. I would have used local news sources from Russia, but I'm not even fluent in Russian, let alone knowing very little. With my citation, it is claimed she did the deeds in the United States and not in Russia. It is easier to hack with higher internet speed, than even mine.
Ah yes, we've all heard about Russians somehow hacking the US elections, by booths, somehow hacking Brexit (you can't hack paper ballots), hacking the Tajikistan elections. Well, it's a nation who hacks elections, infrastructure, banks, telecommunications and so on. Whilst some other well-known state actors to do this are: China, Nigeria, North Korea, USA, Taiwan, Russia, Brazil ( doesn't shock me, especially when they laugh done the mic to crash video games. Look up on Hue Brazilian laugh origins.), Romania (fast internet really help), Italy (Most likely due to the mafia), India and Hungary.
The professional, are a type of hacker, who go around hacking as for example a doctor. Or anyone who works in a professional based environment. They lead a double life. Whilst on work, they would be working, off duty they could be hacking for the literal fun of it, wanting extra money or even seeking revenge.
DDOS or Denial-of-service is an attack that attacks and renders the network servers, by slowing down the network by flooding traffic. And at times causes the network to seize operations. It disables the network either temporary, or permanently to the internet. CPM (Cross Platform Malware)· Cross platform malware is a software where it can latch onto Windows, Linux and Macintosh based computers. The coding is written in C++ using Qt, a cross platform application framework, that is commonly used. This backdoor can affect major office, based files ranging from including .docx, .doc, .xlsx, and .xls files. Whilst according to Kaspersky it is meant to be a low impact software and it is a newer form of malware in general.
Phishing is where someone deploys a fake email, form said company to obtain your details and impersonate you. By clicking on the email, it diverts you to a fake address and towards the criminals account.
Spearphishing is literally the same when it comes to phishing. Where the criminal pretends to be your local bank or business that you know. They fake the email, with a fake link that makes it look genuine. What they would want is your card details, via popups, advertisements and ect. Their main motive is to extort people for their cash.
This one is an interesting type of attack. It is a type of malware where it attacks their target. The said target, could be a particular group (organization, industry, or region). Your most recent example, is when Chinese hackers known as Luckymouse or Iron Tiger, EmissaryPanda, APT 27 and Threat Group-3390. Their main target was some unnamed Central Asian nation, and used malware that mines crypto currency as in Bitcoin. There were other incidents such as banks in Poland, but they were lucky that, no one stole their money.
XSS Cross site scripting is a common attack vendor, where it exploits a vulnerable website. How this works is the prep discovers a vulnerable webpage, then infects said webpage (ones where you share files ranging from blogs to videos), afterwards an unsuspected victim goes onto the page and ends up having their cookies stolen. This particular vendor also splits into two types: The first being Stored XSS and the more higher risk to your cookies. It occurs when a malicious script is injected directly into a vulnerable web application. The second type of XSS, is called Reflected XSS involves the reflecting of a malicious script off of a web application, onto a user’s browser. The script is embedded into a link, and is only activated once that link is clicked on.
SQL Injection Attack works very similar to XSS Cross site scripting. Only that this time it could destroy your database. Not only that, they can quite easily steal your computer login details, just be typing down this: txtUserId = getRequestString("UserId");txtSQL = "SELECT * FROM Users WHERE UserId = " + txtUserId;· That is the first example. The second example, is when uName = getRequestString("username");uPass = getRequestString("userpassword"); sql = 'SELECT * FROM Users WHERE Name ="' + uName + '" AND Pass ="' + uPass + '"'. The general rule of this coding is where they use "=" or "OR" based on it's always true.
People have heard about the famous 2014 hackings at Sony, due to the film The Interview. Where some hacker group who call themselves Guardian Of Peace. Most people claim this is the Nation State Actor type of hackers, but some experts, within the cyber security sector claim it to not be the case. Even a former hacker called Hector Xavier Monsegur, also known as Sabu, who was a double agent working for the FBI and leading LulzSec, claimed it wasn't so. There again, he did hack Sony once before. Whilst a guy who is named as Stammerberg, claims it was an inside job. Maybe, it could have the insider type hacker using malware and wiping servers. The claims after 4 years, does seen to be quite mind boggling. Whilst one of the most recent developments,where it is claimed a spy called Park Jin-hyok, who works for the North Korean equivulent of the CIA. And is also apparently linked to the WannaCry ransomware attack took place mainly in the Anglosphere. There again it was easily done by obselete computers. The events ended up making the film direct to DVD or download, investing more into cyber security, caused such panics of a repeated scale of 9/11 or worse. And lastly the final point,to add to this is that, President Barrack Obama demanded the Racketeer Influenced and Corrupt Organizations Actotherwise known as the RICO ACT to be updated.
When I used the CVSS calculator, to measure the risk. My results came back as 6.4 on average. 6.4 is equated to medium risk. The lowest threat level is none, 0.0 is the number. Low risk is 0.1-3.9, medium risk is 4.0-6.9, high risk is 7.0-8.9 and critical is 9.0-10. Now where the most money is invested, when the risk increases. If it was none or low, they wouldn't normally invested.
Well on average it costs a large corporation roughly £1.5million (Actual figure in footnote) and if you look at the previous year of 2014, it will shock you. That's according to .gov.uk/news/government-urges-business. Whilst with this other report, also in the foot note below would state how much also. The other states a whopping £27 billion. Individually and as a collective of citizens, it is roughly £3.1 billion. This is what I came across in the Guardian News article called Cyber Crime 'costs UK £27bn a year'. Now just imagine what you could spend the money on, if no one ever hacked? Well, sadly tough luck as hackers and saboteurs will, destroy the public and private purse.
We know the obvious health and safety in the household, but not everyone knows the dangers to your home modens and internet access on your computer. Well first off, your computer needs a firewall. The first line of defence, then you need to have an active defender. The second line of defence is by having a defender. The third line of defence, your anti virus. Your forth and fifth lines of defences against viruses would be ad blocker on your browser and a VPN to defencd your browsing. Whilst my own laptop has a working firewall, a VPN, Ad Blocker, Windows Defender, an anti virus, but going to need a new subscription. The other best thing to do, even though it's pot calling kettle black, is to keep safe search on at least moderate to strict. Never turn it off.
What a local business would face as a threat will most likely be from DDOS as the first form of attack. As I've already covered, this particular attack, it is designed to slow or even halt traffic in general. This then would have malware attacks, where they could use ransomware, to blackmail the said local company. If they've got a lot of electronics with WIFI, then they would have Botnet Attacks. This of course, is only going to happen if they haven't upgraded, their cyber security measures. It's pretty much kaizen but for cyber security, where it is a never ending improvements.
I Can Determine The Level Of Threat To My Home Environment
I used a programme called Nmap, a piece of software, where you can check how vulnerable the network is. My two snippets in the next two slides will show me using it. The first snippet would show me that, the host IP Address is active and how many hosts there are. (Next slide) My second snippet will show the two ports that are open but vulnerable. Port 80 is internet access and port 22 is file sharing. If the ports were however open but has firewalls, it doesn't always means it's protected. You would need the ports to be filtered. (Slide after IP Address Host)
IP Address Host
Open Ports But Vulnerable
Local IP Address Ports
Local IP Address Part 2
The first screen shot in part one shows the IP Address for the machine I was using. This shows the host is active. And the second screenshot shows that the ports are open, including port 80 (Internet) but exposed to threats due to no filter.
Understanding Cyber Security And Online Threats. (2024, Feb 25). Retrieved from https://studymoose.com/understanding-cyber-security-and-online-threats-essay
👋 Hi! I’m your smart assistant Amy!
Don’t know where to start? Type your requirements and I’ll connect you to an academic expert within 3 minutes.
get help with your assignment