Guarding Against a Spectrum of Cyber Threats: The Diverse Landscape of Cybersecurity Defenses

Guarding Against a Spectrum of Cyber Threats: The Diverse Landscape of Cybersecurity Defenses

In this post we will look at the different types of threats that cybersecurity professionals work to keep the company they work for safe from.

Malware

Malware is the name for malicious software that can end up installed on ones server or workstation.

This is a range of software which allows 3rd parties unauthorized access to sensitive information.

As well with this they could also disrupt the normal day to day operations of critical infrastructure.

Some malware examples include:

  • Trojans
  • Spyware
  • Viruses

Ransomware

Ransomware is a business model that comprises a vast range of associated technology that malicious threat actors take advantage of to try to extort money from their victims.

Man In The Middle Attack

This type of attack would involve an outside 3rd party trying to gain unauthorized access over a network as data is being exchanged.

These type of attacks increase a companies security risks especially when it comes to sensitive information.

Phishing

Using social engineering tactics, phishing tries to trick user into giving out personally identifiable information (PII).

Such an attack would be to send specially crafted emails posing as a legitimate business, such as DHL, and in reality this would be a fake website where they would put in sensitive information such as their credit card details, or a username and password.

Phishing attack can also involve downloading of malicious attachments would install malware on the device.

DDoS

Distributed denial of service attacks (DDoS) are a coordinated type of attack designed to overwhelm server infrastructure designed to send large volumes of fake requests.

As a result of this, it prevents users from being able to connect or access the server that is being hit by the attack.

Insider Threat

These are security risks that are brought about by employees with ill intentions from within the business.

Such people would have high level access to certain infrastructure that could destabilize a companies infrastructure from the inside.

Leave a Reply

Your email address will not be published. Required fields are marked *