Cyber threats, impacts and attack types

Submitted by shevorne.desil… on Thu, 12/28/2023 - 15:48
Sub Topics

Cybersecurity threats encompass various attack types that pose unique challenges. The analysis and interpretation of this data require adopting a proactive approach with continuous monitoring and threat intelligence integration so that organisations can stay ahead of evolving threats.

In this topic, you will learn about:

  • cybersecurity threats
  • cyber threat impacts
  • types of cyber attacks.

Let us begin.

The emergence of cyber threats

The emergence of cyber threats is a complex and ongoing process driven by various factors, including technological advancements, evolving attacker tactics, and changes in the digital landscape.

The following video discusses the emergence of cyber threats and explains why cyber-attacks are growing rapidly.

The importance of identifying cyber security threats

Identifying and understanding cybersecurity threats is integral to the overall health and sustainability of a business. It empowers organisations to protect their assets, reputation, and financial stability while fostering a culture of security and resilience. Businesses can effectively manage risk and adapt to an ever-changing threat landscape by investing in threat intelligence and cybersecurity measures.

Diverse Group of Professionals Meeting in Modern Office

Cyber threats to general business

Cyber threats pose significant risks to businesses, encompassing data breaches, ransomware attacks, and phishing schemes. These malicious activities target sensitive information, disrupt operations, and compromise customer trust. Financial losses, reputational damage, and legal consequences are common outcomes. Evolving tactics, such as social engineering and advanced persistent threats, challenge cybersecurity measures. Constant vigilance and robust defenses, including regular updates, employee training, and effective incident response plans, are imperative to mitigate these threats and safeguard business continuity in today's interconnected digital landscape.

The following video outlines cyber threats to general business.

Threat impact on business functions

The impacts of cyber threats are multifaceted, ranging from financial losses and reputational damage to operational disruptions. Threat actors employ various attack types to exploit vulnerabilities, such as malware, phishing, ransomware, and distributed denial-of-service (DDoS) attacks. Malicious activities often evolve in sophistication, requiring continuous monitoring and adaptation of defense strategies.

The following video discusses why businesses should care about cybersecurity.

Types of Cyber Attack

Denial-of-service attack (DDOS)

A Denial of Service (DoS) attack floods a system or network with excessive traffic, overwhelming its resources and rendering it inaccessible to legitimate users. This malicious disruption disrupts services, causing downtime and financial losses. DoS attacks can be mitigated through robust security measures and traffic filtering solutions.

The following video discusses various denial-of-service attack methods and outlines relevant mitigation techniques.

SQL injection (SQLi)

SQL Injection (SQLi) is a cyber attack where malicious code is inserted into input fields, exploiting vulnerabilities in a database-driven website. This allows unauthorised access, manipulation, or retrieval of sensitive data. By injecting SQL commands, attackers can bypass security measures and compromise the integrity of the database.

The following video discusses SQL injection attack type and various techniques that can be used to prevent these attacks.

Cross-site scripting (XSS) attacks

Cross-Site Scripting (XSS) is a cyber-attack where malicious scripts are injected into web pages viewed by other users. Exploiting vulnerabilities, these scripts execute in users' browsers, enabling attackers to steal information, manipulate content, or initiate further attacks. Mitigation involves input validation and secure coding practices.

Scripted attacks

Scripted attacks involve automated, pre-programmed malicious scripts targeting vulnerabilities in software, websites, or networks. These scripts execute predefined actions, such as injecting code or exploiting weaknesses, allowing attackers to compromise systems. Mitigation includes regular security updates, code reviews, and implementing strong access controls to thwart such automated threats.

The following video demonstrates what is involved in a code injection attack.

Hardware attacks

Hardware attacks target physical components of a system, exploiting vulnerabilities for malicious purposes. Techniques include physically tampering with devices, inserting rogue hardware, or exploiting weaknesses in the design. These attacks can compromise security, steal data, or disrupt operations. Safeguards involve secure hardware design, regular inspections, and tamper-evident technologies.

The following video outlines various types of hardware and firmware attacks and how they can be mitigated.

Attacks against Wi-Fi

Wi-Fi attacks involve unauthorised access or manipulation of wireless networks. Techniques include password cracking, man-in-the-middle attacks, and exploiting weak encryption. Attackers may intercept or alter data, compromise user privacy, or gain control of the network. Countermeasures include strong encryption, regular password updates, and network monitoring for unusual activities.

The following video explains how Wi-Fi vulnerabilities and attack types can be identified.

Back view of man freelancer in white headphones is working at home office

How did you go?

Congratulations on completing the topic Cyber threats, impacts and attacks types .

In this topic, you learnt about:

  • cyber security threats
  • impacts of cyber threats
  • types of cyber attacks.

Knowledge check

Complete the following activity to check your ability to understand the key concepts discussed in this topic. You may repeat this activity as often as you like. Use the arrows to move between the different activities.

Assessments

Now that you have learnt the basic knowledge and theory concepts for this module, you are ready to complete the following assessment event.

Assessment 2 (Short Answer Questions)

Module Linking
Main Topic Image
Smart Young Students Studying in University with Diverse Multiethnic Classmates
Is Study Guide?
Off
Is Assessment Consultation?
Off