Saturday, April 25, 2015

Types of cyber attacks

Types of Cyber Attacks
There are many methods of Cyber Attacks from malware injection to phishing to social engineering to internal stealing of data. Other advanced but common forms are DDoS Attacks, Brute Force attacks, hacking, holding a computer system (or a website) for ransom using direct hack or ransom ware.

Some of them have been listed below:

·        Gaining, or attempting to gain, unauthorized access to a computer system or its data.
·        Disruption or denial of service attacks (DDoS)
·        Hacking a website or mal-facing the site
·        Virus or malware installation
·        Unauthorized use of a computer for processing of data

·        The inappropriate use of computers or applications by employees of a company, the way it is use my cause severe harms to the company.

Cyber Attacks Response

Cyber Attacks Response
Cyber attacks can be essential information for users, businesses and other institutions that has an attack. The same applied to any field of IT, when it comes to protection against cyber attacks. Furthermore, assuming that your computer or website were attacked, after taking all the precautions they are some response you can take as follows:

• Did the attack really happen or is someone calling in to play a prank.
• If you still have access to your data, back it up.
• If you cannot access your data, and the hacker is demanding ransom, you may want to consider approaching the legal authorities.
• Negotiate with the hacker and regain the data.
• In case of social engineering and employees misusing their privileges, checks should be conducted to determine if the employee was innocent or acted deliberately.
• In the case of DDOS attacks, the load should be mitigated to other servers, so that the website comes back online as soon as possible. You may rent out servers for a while so that costs are minimal.
http://www.thewindowsclub.com/cyber-attacks-definition-types-prevention



Saturday, April 18, 2015

Careers in Cyber Security


  • Candidates who are willing and have an interest in cyber security should have the knowledge and required skills to respond quickly to threats as soon as they are detected.
  • They should be able to poses a set of technical abilities to perform a lot of activities and remain extremely collaborative.

Here are a few jobs that is available with the Cyber Security field:

  • Computer Crime Investigator: is a professional that investigates a number of crimes and recovering file systems on computers that has been hacked or damaged.
  • Security Analyst: is a finance professional who is responsible for maintaining the security and         integrity of data. 
  • Security Consultant: is a professional or adviser to give advice in any number of security                   specialization.
  • Security Architect: is a professional who is responsible for maintaining the security of a company's computer system.
  • Network Security Engineer: is a professional who implement, maintain and integrate the WAN (Wide Area Network), LAN( Local Area Network) and server architecture. 

Cyber Security, Advantages and Disadvantages

Cyber security refers to a range of concepts including the practice protecting an organization's information, networks, computer, and resources against attacks from security and computer attacks.

Advantages of Cyber Security:

  • Improved security of cyberspace.
  • Increase in cyber defense.
  • Increase in cyber speed.
  • Protecting company data and information.
  • Protects systems and computers against virus, worms, Malware and Spyware etc.
  • Protects individual private information.
  • Protects networks and resources.
  • Fight against computer hackers and identity theft.
Disadvantages of Cyber Security:

  • It will be costly for average users.
  • Firewalls can be difficult to configure correctly
  • Need to keep updating the new software in order to keep security up to date.
  • Make system slower than before.

Saturday, April 11, 2015

Computer Based Training to Reinforce Security Protocols in the Workplace

According to http://www.knowledgeanywhere.com/blog/news-and-events/post/use-computer-based-training-to-reinforce-security-protocols-in-the-workplace, these are some outline on basic computer based training security protocols in the workplace;

Attracting viruses and other nasty malicious bugs is a real concern for every business. Therefore, cyber security is an important part of workplace practices. All employees need to learn and actively practice cyber security measures. Computer based training is a good way for companies to help employees learn safe practices.

Workplace Policy for Acceptable Computer Usage

All workplaces need to have a clear and precise protocol that outlines what is acceptable use of computers. Each company will have different expectations, as will different divisions within companies. These need to be constantly reviewed as workplace roles, conditions and expectations change to suit the needs of business.
Security protocols must be written in a way that is easy to understand. The document must also clearly show how to report incidents of abuse, how an employee can seek help with areas of concern, and clearly outline the consequences of abuse. If the protocol is new to the workplace, all staff members need to know the terms.

Educating Employees

New employee orientation programs must discuss the workplace's policy for safe computer use. It is not something to shove in a package and send home with people to read at their own leisure. Existing employees need initial training, plus ongoing training to ensure the information remains fresh in their minds.

Whole Staff Training

If cyber safety issues have not been addressed thoroughly, compulsory sessions for staff members are in order. Research has shown that the most successful outcomes result from small sessions. Ideally, computer based training, presented in a small virtual classroom, delivers initial training.
These sessions should address cyber security in employee's own homes first. This creates relevancy for the importance of cyber security in a way that addressing workplace security simply can't do. Then transition the skills to the workplace using eCourses or additional virtual training sessions. By highlighting the risks and costs to the company, employees find the information more relevant.

Computer Based Training and Cyber Security

Once employees are aware of better cyber security practices, using a learning management system to deliver quizzes to staff members is a good way to check employee knowledge of the issue. For example, having employees answer a Tip of the Day, or a Daily Quiz on computer security makes people more mindful of how they use the computer.
Keeping track of the responses is valuable for the IT security department too. They can be used to follow up with employees needing additional training and when used as part of performance reviews, they can reinforce accountability among employees.

Cyber Threat Source Descriptions

According to https://ics-cert.us-cert.gov/content/cyber-threat-source-descriptions, here are a few cyber threat source descriptions:

  • Bot-network operators: Bot-network operators are hackers; however, instead of breaking into systems for the challenge or bragging rights, they take over multiple systems in order to coordinate attacks and to distribute phishing schemes, spam, and malware attacks. The services of these networks are sometimes made available in underground markets (e.g., purchasing a denial-of-service attack, servers to relay spam, or phishing attacks, etc.).

  • Criminal groups: Criminal groups seek to attack systems for monetary gain. Specifically, organized crime groups are using spam, phishing, and spyware/malware to commit identity theft and online fraud. International corporate spies and organized crime organizations also pose a threat to the United States through their ability to conduct industrial espionage and large-scale monetary theft and to hire or develop hacker talent.

  • Foreign intelligence services: Foreign intelligence services use cyber tools as part of their information-gathering and espionage activities. In addition, several nations are aggressively working to develop information warfare doctrine, programs, and capabilities. Such capabilities enable a single entity to have a significant and serious impact by disrupting the supply, communications, and economic infrastructures that support military power - impacts that could affect the daily lives of U.S. citizens across the country.

  • Hackers: Hackers break into networks for the thrill of the challenge or for bragging rights in the hacker community. While remote cracking once required a fair amount of skill or computer knowledge, hackers can now download attack scripts and protocols from the Internet and launch them against victim sites. Thus while attack tools have become more sophisticated, they have also become easier to use. According to the Central Intelligence Agency, the large majority of hackers do not have the requisite expertise to threaten difficult targets such as critical U.S. networks. Nevertheless, the worldwide population of hackers poses a relatively high threat of an isolated or brief disruption causing serious damage.

  • Insiders: The disgruntled organization insider is a principal source of computer crime. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a target system often allows them to gain unrestricted access to cause damage to the system or to steal system data. The insider threat also includes outsourcing vendors as well as employees who accidentally introduce malware into systems.

  • Phishers: Individuals, or small groups, who execute phishing schemes in an attempt to steal identities or information for monetary gain. Phishers may also use spam and spyware/malware to accomplish their objectives.


  •  Spammers: Individuals or organizations, who distribute unsolicited e-mail with hidden or false information in order to sell products, conduct phishing schemes, distribute spyware/malware, or attack organizations (i.e., denial of service).

Saturday, April 4, 2015

The Anatomy of Cyber Atttacks

Cyber criminals are stepping up and becoming professionals in their field. As the use of technology increases everyday, then hackers keep improving by the minute. Cyber criminals learning how to break through every code and devices as the development of technology come on stream. Therefore, hackers and virus are far more persistent and advanced which can lead to serious damages and destroy an entire firm. Furthermore, it has been a challenge for businesses to develop cyber security in order for these criminals to determine.

In order for users to know how to stop cyber attack, then users need to know how really work.

According to https://www.fireeye.com/current-threats/anatomy-of-a-cyber-attack.html here are six steps describing the anatomy of a cyber attack:

  • The cyber criminal, or threat actor, gains entry through an email, network, file, or application vulnerability and inserts malware into an organizations network. The target is now compromised.
  •   The advanced malware probes for additional network access, vulnerabilities, or communicates with command and control (CnC) websites to receive additional instructions and/or malicious code.
  •   The malware typically establishes additional breach points to ensure that the cyber attack can continue if one point is closed.
  •   Once a threat actor has established network access he/she begins to gather data, such as account names and passwords. Once the attacker cracks the passwords, he/she can now can identify and access data.
  •  Data is collected on a staging server, then the data is exfiltrated. A data breach is now occurring.
  •   Evidence of the cyber attack is removed, but the organization is still compromised and the cyber criminal can return at any time to continue the data breach.