MDIS Blog

Main Menu

MENUMENU
  • Home
  • Topics
        • Business & Management
        • Career Management
        • College
        • Engineering
        • Event
        • Fashion & Design
        • Health & Nursing
        • Information Technology
        • Languages
        • Life Sciences
        • Lifestyle
        • MDC
        • Media & Communications
        • Psychology
        • Safety Management
        • Tourism & Hospitality
        • Uncategorized
  • Campus
  • Student Life
  • Preview Sessions
  • + Become A Contributor

logo

Header Banner

MDIS Blog

MENUMENU
  • Home
  • Topics
        • Business & Management
        • Career Management
        • College
        • Engineering
        • Event
        • Fashion & Design
        • Health & Nursing
        • Information Technology
        • Languages
        • Life Sciences
        • Lifestyle
        • MDC
        • Media & Communications
        • Psychology
        • Safety Management
        • Tourism & Hospitality
        • Uncategorized
  • Campus
  • Student Life
  • Preview Sessions
Information Technology
Home›Information Technology›Possible Cyber Attacks in the Enterprise

Possible Cyber Attacks in the Enterprise

By MDIS
9th March 2020
1162
1
Share:

“Cyber Attack” is an attempt through which an attacker can gain access to enterprise computer or networks to implant a payload – referred to as a computer virus which performs dangerous activities such as, data destruction and sending spam mails that produce malicious outcomes. Cyber-attacks are disrupting enterprise productivity through thefts or stealing of enterprise information, creating fear to employees, financial loss, demanding money from organisations by injecting virus to their systems, damaging their reputation or to take revenge.

Types of cyber attacks  

  • Bot Net: A botnet is a huge network of compromised systems used by attacker to stop computer functioning. Bot net performs tasks such as uploading viruses, sending mails with botnet attached, and stealing data.
  • Phishing: Is a way of sending an illegitimate email falsely claiming to be from a legitimate site in order to acquire user’s account information. This can be done by providing an unwanted link to the mail and tempting users to click the link.
  • Ransomware: Is a type of malware, which restricts access to the computer system files and folders and demand payment to clear the malware. It’s usually spread through email messages or messages with attachments.
  • Web application threats: Is a further subset of SQL injection and cross-site scripting attacks. Most of these attacks are due to flawed application development and improper sanitisation of input and output of data from web application. It threatens the performance of the website and hampers web application security.
  • Internet of things (IOT) Threats: Devices connected to the internet have no security at all or have means only minimal. Due to memory, battery and storage constraints, IOT Applications do not include complex security mechanisms which invite cyber-attacks. Also, the systems are more vulnerable and make it easier for
  • Mobile threats: Users may download malware applications to their phones, which can damage applications and data and send sensitive information to the attackers. Attackers can then access sensitive data remotely using virtual environment.
  • Eavesdropping: Is a threat to enterprise or individual by secretly listening to conversation between two parties either on phone or direct.
  • Cloud computing threats: Cloud computing is an on-demand delivery of IT services and infrastructure. Enterprises can store sensitive information on the cloud. A flaw in one cloud platform will allow attackers to gain access to all the infrastructure in cloud and attack other enterprise data.

To conclude, one must understand various cyber attacks in order to take action against those attacks. Proper policies should be in place to avoid those attacks at the organisation level.  Employees must be aware of the attacks at their level and support enterprises in fighting against cyber attacks.

Reference: https://www.techopedia.com

This article is contributed by Latha Manian from the School of Technology.

Tagscyber securityphishingtechnology
0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0
MDIS

MDIS

Founded in 1956, the Management Development Institute of Singapore (MDIS) is Singapore’s oldest not-for-profit professional institute for lifelong learning. MDIS has two main subsidiaries: Management Development Institute of Singapore Pte Ltd which oversees its Singapore academic operations, and MDIS International Pte Ltd which focuses on MDIS’ globalisation strategy. MDIS offers internationally-accredited courses in Business and Management, Engineering, Fashion and Design, Health and Nursing, Information Technology, Languages and Education, Life Sciences, Media and Communications, Psychology, Tourism and Hospitality Management, and Safety and Environmental Management.

Related articles More from author

  • Top 10 Highest Paying Jobs
    Career ManagementFeatured PostUncategorized

    Top 10 Highest Paying Jobs in Singapore for 2022

    4th October 2021
    By MDIS
  • Featured Full Width SliderFeatured PostInformation Technology

    Cloud Enabled Content Management for Digital Signage

    17th August 2018
    By MDIS
  • Featured PostStudent Life

    A Peek Into Dr Rama’s Life

    14th October 2021
    By MDIS
  • A Peek Into Dr Tham’s Life
    Student Life

    A Peek Into Dr Tham’s Life

    9th September 2021
    By MDIS
  • man machine
    EngineeringFeatured Post

    Man and Machine: Can they co-exist?

    21st March 2018
    By MDIS
  • Information Technology

    Leveraging on technology, people and processes

    5th August 2019
    By MDIS

1 comment

  1. Avatar
    Ronald Soh 16 July, 2021 at 23:00 Reply

    Hackers used scripts to automate their scanning their potential victims. For SME, we should minimize by shutting unused services and update the platform updates regularly. If they do not have any competencies, then they should approach IT Security company for assistance.

Leave a reply Cancel reply

You may also like

  • Korean food mdis
    Featured PostTourism & Hospitality

    Must Try Foods When You Visit South Korea

  • Dream Job
    Career ManagementFeatured Full Width SliderFeatured Post

    Top 3 Crucial Things to Note Before Applying For Your Dream Job

  • Teamwork
    Business & ManagementFeatured BK Row

    Teamwork fosters great synergy

Categories

  • Business & Management (26)
  • Campus (5)
  • Career Management (22)
  • College (17)
  • Engineering (11)
  • Event (32)
  • Fashion & Design (34)
  • Featured BK Row (64)
  • Featured BK Video (10)
  • Featured Full Width Slider (57)
  • Featured Post (83)
  • Health & Nursing (5)
  • Information Technology (29)
  • Languages (17)
  • Life Sciences (24)
  • Lifestyle (8)
  • MDC (14)
  • Media & Communications (29)
  • Psychology (8)
  • Safety Management (8)
  • Student Life (15)
  • Tourism & Hospitality (26)
  • Uncategorized (11)

Follow us on Instagram

This error message is only visible to WordPress admins

Error: No connected account.

Please go to the Instagram Feed settings page to connect an account.

TAGS

  • stephen r covey
  • studying tips
  • safety environment
  • nursing degree in Singapore
  • begin with the end in mind
  • life sciences
  • Tourism and Hospitality
  • AI algorithm
  • 7 habits of highly effective people
  • Health & Nursing
  • Fashion Design
  • MDIS School of Fashion and Design
  • Study environment
  • MDIS Alumni
  • digital communication
  • marketing
  • social media
  • fashion trend
  • covid-19 jobs
  • innovation
  • productivity
  • Immersion programmes
  • Artificial intelligence
  • artifical intelligent technology
  • nursing course
  • fashion designers
  • Digitalisation
  • climate change
  • biomedical sciences
  • MDIS Events
THINK SUCCESS. THINK MDIS.
Copyright© 2022. MDIS Blog. All Rights Reserved.
     
Where lifelong learning begins