Cyber Awareness Nov

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

Internet

Cyber Awareness :
Cyber Crime Trends & and Emerging Threats
(November 2022)
Classes XI,XII
✓ To prevent data breach and
phishing attacks

✓ To build a culture of security

✓ To make technological
defenses against cyber threats
more robust

✓ To be socially responsible
PHYSICAL CYBER ATTACKS Why should you care?

❑ Easy to overlook
❑ Difficult to Identify and
detect
❑ Extremely difficult to
remove
❑ Can do anything from
installing ransomware, to
sending copies of or
modifying information
systems, to dismantling
networks
1. Ransomware Attacks

The threat of ransomware becomes even more real as they mature with the
evolution of technology.
What is worse is that the new generation of ransomware would be more
aggressive and sophisticated as they come equipped with the latest technologies,
like AI. Such powerful ransomware can seamlessly bypass some of the best
malware detection software applications and deny you access to your critical data.
Even a single point of entry could result in widespread network infection and data
corruption. One of the best approaches for mitigating the effects of a serious
ransomware attack would be to create multiple copies and backup your data to
prevent cybercriminals from holding it hostage.
2. DDoS Attacks

A Distributed Denial of Service or DDoS attack involves overloading the server with
high volumes of traffic to bring down a business website. Such attacks have become
fairly common of late.
Fortunately, most businesses are already aware of the threat posed by DDoS attacks
and can safeguard themselves by:
•Monitoring website traffic.
•Analyzing DDoS risks and developing mitigation strategies.
•Practicing cyber hygiene.
•Implementing a Zero Trust security framework.
3. Fileless Attacks

Fileless attacks are a stealthy way for cybercriminals to execute data breaches. These
cyber-threats are precisely what their name indicates – they do not rely on file-based
payloads, nor do they create new files. In fact, these attacks make use of existing
features present in the victim’s environment.
Typically, a fileless attack starts with a click on a link that redirects to a malicious
website. The social engineering trap set up on the website launches the system tools
(such as Windows PowerShell) to retrieve and execute malicious payloads directly in
the system memory. Resultantly, these attacks generally go undetected.
Some common strategies to prevent fileless attacks include:
•Avoid clicking on suspicious links.
•Keep your system up to date.
•Monitor network traffic.
•Disable non-essential system tools.
4. Remote and Cloud Attacks

The new wave of digitization in 2020 unlocked remote working and work-from-home
opportunities. Companies scrambled to implement cloud technologies or set up
collaborative spaces. However, some digital transformations were such knee-jerk
reactions that the security aspect was not given enough consideration. Plus, home
networks are not as secure as corporate setups, which complicates the matter even
further.
As a result, cybercriminals can easily find the weakest point of the network by attacking
any employee’s home network. From this point, they can directly attack the cloud
infrastructure and cause a data breach.
Fortunately, you can secure your data centers by:
•Seeking third-party solutions.
•Having a rigid access control system.
•Implementing an enterprise-grade or virtual firewall at every node.
•Introducing biometrics or multi-factor authentication.
5. Zero-Day Exploits

While zero-day exploits first made news in 2014, it has come quite a distance since.
The zero-day exploit involves identifying security loopholes or vulnerabilities in
software programs and using them to infect the product. Naturally, such an action
needs to take place before the developers locate and patch the flaw – hence the
name “zero-day.”
While the development flaw is unintended, it is also avoidable to some extent. Let’s
look at a few ways to protect yourself and your business from zero-day exploits:
•Install all security patches and update the software or operating system regularly.
•Ensure that your device settings are in tune with the software settings.
•Scan for vulnerabilities through testing and simulation.
•Have a reactive plan ready.
6. 5G-Enabled Swarm Attacks

The introduction of 5G technology will usher in a new era for both cybersecurity and
cybercrime. High-speed network connections will escalate the threat of advanced and
high sophisticated swarm-based attacks. Studies indicate that swarm cyberattacks have
increased by a whopping 82% already and continue growing steadily.
In such attacks, several devices will get infected at the same time. These devices will
then get divided into subgroups, each of which will possess a specialized skill or
function. The swarm bot will then attack other networks or devices while sharing
information with each other in real-time.
The data exchange and AI capabilities allow the swarm-bots to correlate, discover, and
share vulnerabilities and change the attack strategies accordingly.
7. Social Media Spoofing

Apart from the traditional cybersecurity threats, misinformation and spoofing are
another major cause of concern. Instances of fake social media accounts facilitating
targeted phishing are not unheard of. Now, such miscreants are taking it one step
further by perpetuating false information and sharing conspiracy theories. The
problem becomes graver with technologies like deepfake (deep learning + fake) taking
over.
One can avoid falling victim to such threats by cross-referencing any information from
reliable sources and blocking and reporting suspicious accounts.
• https://www.slideshare.net/MO
E515253/cyber-crime-
ppt?from_action=save

• https://www.slideshare.net/tk1
945533/cyber-crime-amp-
security-final-tapan

• https://www.crayondata.com/7
-emerging-cybersecurity-
threats-2021/
“The good we secure for ourselves is precarious and uncertain until it is secured for all of us
and incorporated into our common life.”

THANK YOU Presented By:


Namita Ranjan
PGT Comp. Sc.
KV AFS Bareilly

You might also like