Your Guide to IT Security

Spread the love

This video starts with a male narrator explaining how ”Anne” fell victim to a cyber attack when using an online shopping site. Anne may have been exposed to various cyberattacks. The narrator says a malware attack, like trojan, adware, or spyware, is one of the most common. It typically happens when one downloads suspicious attachments online, which corrupts the system with malicious viruses.

Next is a phishing attack, which is also the one Anne fell victim to. Here, a hacker sends fraudulent emails to their target, ensuring they look like they’re from a legitimate source.


Video Source

They aim to install malware or steal sensitive data such as login credentials and credit card information. The man-in-the-middle attack is another common type of attack where a hacker intercepts the information path between the target’s device, such as Anne’s, and the website’s server. A password attack is also common and is one of the easiest to execute.

Anne adopted some cyber security practices to prevent future attacks. First, she installed a firewall to filter incoming and outgoing traffic from her device. To reinforce it, Anne added honeypots, dummy computer systems used to lure attackers away from the real system. Besides these, she started using stronger passwords and antivirus software and ignored emails from unknown senders.

The narrator then says cyberattacks target not only individuals. The increase in cyberattacks has increased the demand for It security and cybersecurity professionals. Public and private organizations are also at risk. In this case, cyberattacks may include an Advanced Persistent Threat (APT), Denial of Service or Distributed Denial of Service attack, or SQL injection attack.

.


Spread the love
Scroll to Top