Untitled document.edited (48).docx - Cyber Attacks...

This preview shows page 1 - 4 out of 8 pages.

Cyber AttacksStudent's nameStudent's institution
Cyber AttacksType of AttackDescriptionExampleMotivationWormsSelf-replicating malware that tries to spread throughout a network Conficker worm that affected Windows systems when the autoplay feature for CDs and DVDs was executed. This could have been spread through a hoax email. It slows down network traffic.Slow down the competitor's network. Allows attacker access to machine for future use, Could be used in conjunction with ransomware, which usually has a monetary motive.TrojansThe software which malicious but looks legitimate and performs a malicious function (Dobran, 2019). Storm Worm used by hackers in 2007 to click an email link to an article titled "230 dead as stormhits Europe." The attack affected 1.5 million gadgets and led to a loss of $10 billion. Trick the user to create a gateway into the network. Downloading or installing trojans allows a hacker to install malware designed to perform a particular activity. The motive is to damage the system of gain control.VirusesMalicious program or code that affects computer operations and spreads from one device to another (Dobran, 2019).
Stuxnet used to attack Iran's uranium enrichment plant. The virus disabled the facility by destroying the nuclear arsenal in the company. Embeds itself on a legitimate file to access files in a computer. Viruses allow the perpetrator to perform the intended activity. The motive is to corrupt files of access files in a computer.Evil TwinCan be referred to fake access point used by a hacker to eavesdrop. The purpose is to access sensitive information, such as log-in credentials (Dobran, 2019).Attack conducted by the Russian military agency (GRU) to access sensitive data by broadcastingaccess points (APS) with a similar SSID to that used by users of a particular network.Fake access point disguises as a legitimate one. Allows hacker to eavesdrop without notice. The motivation is to access sensitive information for beneficial purposes such as a financial gain.Man in the middleThey are intercepting communication between two or more systems (Dobran, 2019).

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture