Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

CYBER ATTACK

PREVENTION
CAMPAIGN
Cyber Attack
● An attempt by hackers to damage or
destroy a computer network system.
● An exploitation of computer systems
and networks.
● It uses malicious code to alter
computer code, logic or data and lead
to cybercrimes such as information
and identity theft.
Types of Cybercrimes
● Email and internet fraud
● Identity Fraud
● Theft of Financial or Card Payment
Data
● Theft and Sale of Corporation Data
● Cyberespionage
● Cryptojacking
Common Types of Cyber Attacks

Malware
● Any program or code that is created with the intent to do harm to
a computer, network or server.
Denial of Service (DoS)
● A type of cyber attack in which a malicious actor aims to render
a computer or other device unavailable to its intended users by
interrupting the device's normal functioning.
Common Types of Cyber Attacks

Phishing
● A type of cyberattack that uses email, SMS, phone, social media,
and social engineering techniques to entice a victim to share
sensitive information.
Social Engineering Attack
● A technique where attackers use psychological tactics to
manipulate people into taking a desired action.
Common Types of Cyber Attacks

Password Attacks
● Password attacks can be as simple as someone correctly
guessing your password or other methods such as keylogging,
where attackers can monitor the information you type and then
identify passwords.
Man In The Middle Attack
● In a Man-in-the-Middle attack, the cybercriminal intercepts
communication between two parties.
How Does Cyber Attacks Works?

● Many cyber attacks are opportunistic, with hackers spotting


vulnerabilities in a computer system's defenses and exploiting
them.
● This may involve finding flaws in the code of a website, that
allows them to insert their own code and then bypass security or
authentication processes.
Stages of Cyber Attack
Impact of Cyber Attack

• For businesses, an attack can lead to financial losses,


intellectual property theft, operational disruptions, and damage
to the company's reputation.
• In some cases, the cost of a cyberattack can be so severe that it
leads to business closure.
Impact of Cyber Attack

• For individuals, cyberattacks can result in identity theft, loss of


sensitive personal data, and financial harm.
• The psychological impact of being a victim of a cyberattack
can also lead to a sense of vulnerability and mistrust in digital
interactions.
Ways to Prevent Cyber Attacks

● Update your software and operating systems to ensure that you


have the strongest and most current protection.
● Use anti-virus software. This software will detect, and remove,
threats in real-time.
● Use strong, unique passwords across all your online accounts.
Vary your use of capitalization, symbols, letters, and numbers.
Ways to Prevent Cyber Attacks

● Never open email attachments from unknown senders. These


can download/install malware onto your device.
● Never click on links from unknown senders.
● Avoid using unsecured public Wi-Fi. These networks leave you
vulnerable to attacks.
Conclusion

● We are living in a digital era and digital technology has


transformed our lives promoting the need for Cyber Security.
● Cyber Attacks have started affecting most of the systems today
because of the dependency on technology.
● It is very important to know what are Cyber Attacks and how
the Cyber Attacks affect the system.
Thank You!!!

You might also like