What is a cyber attack ?

A cyber-attack is an unwelcome attempt to steal, expose, alter, disable or destroy information through unauthorized access to computer systems.  It has been a common word on different media lately. As any other actions, cyber-attacks have actors, reasons, targets, and impacts.

Who is behind cyber-attacks?

Cyber attackers broadly fall under two categories:

  Insider threats  

      These are individuals working within the organization and have legitimate access. 

  Outside threat    

     pose threats to organizations from outside.

    it includes:

  • Organized criminals or criminal groups
  • Professional hackers, like state-sponsored actors
  • Amateur hackers, like hacktivists

what are the reasons behind cyber-attacks?

The motive depends on the actor behind the attack. the most common reasons behind cyber-attacks are   

  • To make a political or social point
  • Business competition
  • Cyberwarfare
  • For intellectual challenge

 

what are the targets of cyber-attacks?

The target area of cyber-attacks ranges from Sensitive personal data to government agencies and many more like;

  • Healthcare system 
  • Business financial data
  • Clients lists
  • Customer financial data
  • Public administration
  • Email addresses and login credentials
  • Intellectual property, like trade secrets or product designs
  • IT infrastructure access

what are the impacts of cyber-attacks?

The impact of a cyberattack is typically shaped by what companies are required to report publicly—primarily theft of personally identifiable information (PII), payment data, and personal health information (PHI). The wide range of direct and/or intangible costs contribute to the overall impact of a major cyber incident. Many damages lie beneath the surface and are difficult to see and quantify.

 


Its impacts go beyond the digital world and affect every aspect of society. The risk of cyber-attack is constantly increasing so it needs a collaborated effort from an individual level to the big organizations to prevent it.

 

 

 

https://www.ibm.com/topics/cyber-attack

https://www2.deloitte.com/us/en/pages/risk/articles/hidden-business-impact-of-cyberattack.html

https://bigdata-madesimple.com/cybersecurity-the-motivation-behind-cyber-hacks-infographic/

 

Comments

Popular posts from this blog

Qlocker

SunCrypt

Blockchain Security Issues