Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

Cybersecurity

threats
And how we can battle
them

Made with ❤ by:


Труштина Ксения
Мамренко Герман
Стрыжак Роберт
Дубровин Игорь
Top 5 threats in 2022

DDOS MALWARE PHISHING BOTNETS MitM

Fake Remote
A denial Malicious Man-in-the-m
communication controlled
of service Software iddle attack
devices
• Developed to steal data or damage or
destroy computers. In recent days
many attacks have exfiltrated data in
mass amounts

• There is a hacker attack every 39


seconds, almost all of them are
automated

• Malware attacks now sitting at 10.4


million per year

• Iran faced the highest number of


malware attacks in Q2 2022
Phishing

Fool me once, shame on you; fool me twice,


shame on me

1 Phishers frequently use emotions like fear,


curiosity, urgency, and greed to compel

2 Phishing attacks are designed to appear to


come from legitimate individuals

3 Cybercriminals are continuously innovating


and becoming more and more sophisticated
Botnets
• Account takeover

• Botnet-driven phishing

• Large-scale spam attacks

• Cryptocurrency mining and


clipping

• Brute force attacks

• DDoS machines
DDoS explained

• DDoS attack is like an unexpected traffic


jam clogging up the highway

• DDoS attacks are carried out with


networks of Internet-connected
machines (Botnets)

• Because each bot is a legitimate Internet


device, separating the attack traffic from
normal traffic can be difficult.
Man-in-the-middle attack

Hacker positions himself in a conversation


between a user and an application - either to
eavesdrop or to impersonate one of the parties.

1. IP spoofing (altering packet headers in an IP


address)
2. ARP spoofing (fake ARP messages)
3. DNS spoofing (infiltrating a DNS server)

Avoid unknown public networks!!!


Be aware of your actions

Use up-to-date
ACTIONS applications and known
programs

Try to avoid public wifi if


NETWORK you’re going to do
important things

Don’t trust anyone, your


INTERNET friend’s account may be
hacked

It’s just one layer of


ANTIVIRUS protection but still better
than nothing
Yandex

You might also like