Page 18 - CyberSecurityEssentialsEnglish
P. 18

Cyberattacks
       Cyberattacks refer to stealing information belonging to individuals, companies, and governments, obtaining
       unauthorized access to computer networks, with the aim of disrupting services provided by organizations
       and businesses, and provoking public turmoil. However, hackers use various methods and techniques to
       perform such attacks; like:

       In phishing attacks,

       large amounts of fraudulent emails are sent to unsuspicious victims, masked as coming from a reliable source.
       Such emails so often appear legitimate. Figure 5 explains a simplified phishing attack:

       The attacker links the recipient to a malicious link or file designed to access your device to control, gather
       information, install malicious files/scripts, or extract data (financial info, proprietary information, etc.).

       The victim clicks on the sent link.

       The victim is redirected to a phishing website asking him about his username and password.

       The attacker uses this information to get into the victim's account.























                                                   Figure 5 Phishing attacks

       In Denial-of-Service (DOS) attacks, this attack overwhelms systems, servers, and/or networks with traffic to
       overload bandwidth and resources, rendering the system incapable of fulfilling and processing legitimate
       requests as shown in figure 6.























                                             Figure 6 Denial-of-Service (DOS) attacks

          16
   13   14   15   16   17   18   19   20   21   22   23