A(n) ____ attack is when a system is compromised and used to attack other systems.

A cyber attack is an attempt to disable computers, steal data, or use a breached computer system to launch additional attacks. Cybercriminals use different methods to launch a cyber attack that includes malware, phishing, ransomware, man-in-the-middle attack, or other methods.

Types of Cyber Attacks

Malware

Malware is a term that describes malicious software, including spyware, ransomware, viruses, and worms. Malware breaches a network through a vulnerability, typically when a user clicks a dangerous link or email attachment that then installs risky software.

Phishing

Phishing is the method of sending fraudulent communications that seems to come from a reputable source, usually through email. The goal is to steal or get sensitive data like credit card and login information or to install malware on the victim’s machine. Phishing is an increasingly common cyberthreat.

Man-in-the-middle attack

Man-in-the-middle (MitM) attacks, also called eavesdropping attacks, occur when attackers insert themselves into a two-party transaction. Once the attackers interrupt the traffic, they can filter and steal data.

Two common points of entry for MitM attacks:

  • On unsecure public Wi-Fi, attackers can insert themselves between a visitor’s device and the network. Without knowing, the visitor passes all information through the attacker.
  • Once malware has breached a device; an attacker can install software to process all of the victim’s information. 

Denial-of-service attack

A denial-of-service attack fills systems, servers, or networks with traffic that exhaust resources and bandwidth. That makes the system incapable to fulfill legitimate requests. Attackers also use multiple compromised devices to launch this attack. This is known as a distributed-denial-of-service (DDoS) attack.

SQL injection

A Structured Query Language (SQL) injection happens when an attacker inserts malicious code into a server that uses SQL and forces the server to reveal information it normally would not. An attacker could carry out a SQL injection simply by submitting malicious code into a vulnerable website search box.

Zero-day exploit

A zero-day exploit hits after a network vulnerability is announced but before a patch or solution is implemented. Attackers target the disclosed vulnerability during this window of time. Zero-day vulnerability threat detection requires constant awareness.

DNS Tunneling

DNS tunneling utilizes the DNS protocol to communicate non-DNS traffic over port 53. It sends HTTP and other protocol traffic over DNS. There are various, legitimate reasons to utilize DNS tunneling. However, there are also malicious reasons to use DNS Tunneling VPN services. They can be used to disguise outbound traffic as DNS, concealing data that is typically shared through an internet connection. For malicious use, DNS requests are manipulated to exfiltrate data from a compromised system to the attacker’s infrastructure. It can also be used for command and control callbacks from the attacker’s infrastructure to a compromised system.

What are examples of a Cyber Attack?

Here are some examples of common cyber attacks and types of data breaches:

  • Identity theft, fraud, extortion
  • Malware, phishing, spamming, spoofing, spyware, trojans and viruses
  • Stolen hardware, such as laptops or mobile devices
  • Denial-of-service and distributed denial-of-service attacks
  • Breach of access
  • Password sniffing
  • System infiltration
  • Website defacement
  • Private and public Web browser exploitsv
  • Instant messaging abuse
  • Intellectual property (IP) theft or unauthorized access

What happens during a Cyber Attack?

A cyber attack happens when cybercriminals try to gain illegal access to electronic data stored on a computer or a network. The intent might be to inflict reputational damage or harm to a business or person, or theft of valuable data. Cyber attacks can target individuals, groups, organizations, or governments.

Ways to prevent Cyber Attacks

There are 7 key strategies we recommend to use to protect a Small and Medium Business or organization from cyber attacks.

USE Multi-Factor Authentication

One of the most effective ways to prevent cyber attacks is to ensure that multi-factor authentication has been enabled for all applications that access the internet in an organization.

Having only a password login for employees is not enough. If employee passwords are compromised through a hack or through a phishing scam, cybercriminals may be able to easily access to the systems.

Enabling a multi-factor authentication process for logins instead will require employees to provide several pieces of information instead of just one. As a result, security will be heightened. It will be much more difficult for any unauthorized person to access the systems.

CREATE Robust Internal Controls

To prevent cyber attacks in an organization it’s also crucial that there are robust internal controls in place. Access controls will help ensure that system access is updated immediately once employees, contractors, and vendors leave the organization.

Controlling access for the system is essential for cyber attack prevention. When someone leaves the organization, then access must be revoked due to security reasons. If the access is not revoked for the former employees, contractors, and other relevant parties, they may be able to access the organizational system later on.

By monitoring who has access to the organizational systems, one can ensure greater security and can prevent security threats and potential problems in the future.

MANAGE Third-Party Security

In order to prevent cyber attacks and security threats, it’s also critical that one takes measures to manage third-party cyber risk.

It’s important to understand the responsibilities when it comes to third-party security. If there are any vendors or third parties who need to access organizational system, it’s crucial to be aware of the risks and to ensure heightened security.

Creating tight security controls, identifying potential cyber threats, and monitoring the network are all crucial to ensure that the system is secure.

EDUCATE Organizational Employees

Employee education is also one of the biggest keys to improving business security.

Organization should conduct cyber security awareness training when onboarding new employees. Employees should be provided with extra training at regular intervals. Holding annual training sessions can help ensure that the entire staff is aware of how to guard against security threats.

It’s also important to educate all the employees in the organization about phishing. Employees should be aware of as to what are and what aren’t considered normal requests via email and other correspondence methods.

This will create a business mode that is much more secure overall.

CREATE Data Backups

Organization should make regular backups of important business data. Backing up the data is an essential way to keep the business going strong. It’s an important measure to avoid a worst-case scenario whereby any crucial business data is lost.

Ensuring regular data backups makes sure that whatever happens the business won’t be at a total loss.

KEEP Entire Systems Updated

Keeping the systems and business software up to date is also a critical part of protecting any business. Running the latest software makes the data more secure and also makes business remain strong against all odds in the long run.

While some business owners find it frustrating for any need for constant updates, they’re necessary. New problems and vulnerabilities will come up in business software from time to time. Updates exist to patch software vulnerabilities and to guard against potential security threats.

There are sometimes significant expenses associated with updates to software and hardware. Yet, the result is usually well worth it.

INSTALL Antivirus Software and a Firewall

Finally, one must prevent security breaches and cyber attacks by installing antivirus software. Every computer in the organization should have an antivirus installed and then it must be updated regularly. One should ensure that a firewall is always in place.

How can Unisys help protect against Cyber Attacks?

Unisys is a trusted partner for managing your global security risks leveraging our experienced strategic security consultants to align your business and technology to processes, tools and techniques to your organization’s tolerance for risk, while systemically moving to a more efficient security program.

As part of our Security Consulting Services, we work with you to architect a security program that enables your organization to reduce the attack surface to the accepted risk level, maintain efficiencies, meet regulatory mandates and manage security over your global supply chain.

What makes a DDoS attack different from a DoS attack?

An additional type of DoS attack is the Distributed Denial of Service (DDoS) attack. A DDoS attack occurs when multiple systems orchestrate a synchronized DoS attack to a single target. The essential difference is that instead of being attacked from one location, the target is attacked from many locations at once.

Which of the following is an attack vector used by threat actors to penetrate a system?

Key takeaways. Hackers steal information, data, and money from people and organizations by investigating known attack vectors and attempting to exploit vulnerabilities. The three most common attack vectors used by hackers are phishing emails, malware, and unpatched vulnerabilities.

Which path or tool is used by attackers?

An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome. Attack vectors enable hackers to exploit system vulnerabilities, including the human element.

Which attack is being used when threat actors initiate a simultaneous coordinated attack from multiple source machines?

DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited machines can include computers and other networked resources such as IoT devices.