Cyberattacks

Types of Cyberattacks

  • Denial of Service (DoS) attacks are intended to disrupt services of a network or a website by overwhelming it with excessive traffic, thereby denying genuine users access to the services.
  • Distributed Denial of Service (DDoS) attacks are similar to DoS attacks but traffic is sourced from multiple different computers to make stopping the attack more difficult.
  • Malware attacks involve the use of malicious software — such as viruses, worms, trojans, ransomware, and spyware — to damage or disrupt a computer system.
  • Phishing attacks try to trick users into revealing sensitive information, like usernames, passwords, or credit card numbers by pretending to be a legitimate entity in an email or other communication.
  • In a man-in-the-middle attack, the attacker intercepts a communication between two users without their knowledge in order to eavesdrop or manipulate the conversation for malicious purposes.

Impacts of Cyberattacks

  • Cyberattacks can lead to data breaches, whereby confidential information is accessed and potentially stolen, leading to a loss of privacy for individuals or businesses.
  • These attacks can lead to financial loss, especially in the case of hacking bank accounts or online payment methods, or where ransomware demands a financial sum to unlock files.
  • They can cause operation disruptions, shutting down systems or blocking access to services — a major problem particularly for businesses or services.
  • They cause time-consuming and expensive recovery processes – restoration of systems and security often need significant IT expertise and investment.
  • Confidence and trust in a company or service can be significantly eroded following a cyberattack, as customers may fear for their data security.

Mitigation Techniques against Cyberattacks

  • Regular updating of software and hardware can curb cyberattacks; these updates often include patches for newly discovered security vulnerabilities.
  • Use of antivirus software helps detect and prevent malware attacks by scanning for and removing malicious programs.
  • Firewalls act as the first line of defence in network security, blocking unauthorised access while permitting outward communication.
  • Encouraging safe online behaviour like evaluating email sources before clicking on embedded links can reduce the risk of phishing. This is often referred to as maintaining cyber hygiene.
  • Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocol usage, which are cryptographic protocols designed to provide secure communication over a network.
  • Regular backup of data aids recovery in the event of a ransomware attack or data loss as a result of a cyberattack.