MDIS Blog

Main Menu

MENUMENU
  • Home
  • Topics
        • Business & Management
        • Career Management
        • College
        • Engineering
        • Event
        • Fashion & Design
        • Health & Nursing
        • Information Technology
        • Languages
        • Life Sciences
        • Lifestyle
        • MDC
        • Media & Communications
        • Psychology
        • Safety Management
        • Tourism & Hospitality
        • Uncategorized
  • Campus
  • Student Life
  • Preview Sessions
  • + Become A Contributor

logo

Header Banner

MDIS Blog

MENUMENU
  • Home
  • Topics
        • Business & Management
        • Career Management
        • College
        • Engineering
        • Event
        • Fashion & Design
        • Health & Nursing
        • Information Technology
        • Languages
        • Life Sciences
        • Lifestyle
        • MDC
        • Media & Communications
        • Psychology
        • Safety Management
        • Tourism & Hospitality
        • Uncategorized
  • Campus
  • Student Life
  • Preview Sessions
Information Technology
Home›Information Technology›Possible Cyber Attacks in the Enterprise

Possible Cyber Attacks in the Enterprise

By MDIS
9th March 2020
1249
1
Share:

“Cyber Attack” is an attempt through which an attacker can gain access to enterprise computer or networks to implant a payload – referred to as a computer virus which performs dangerous activities such as, data destruction and sending spam mails that produce malicious outcomes. Cyber-attacks are disrupting enterprise productivity through thefts or stealing of enterprise information, creating fear to employees, financial loss, demanding money from organisations by injecting virus to their systems, damaging their reputation or to take revenge.

Types of cyber attacks  

  • Bot Net: A botnet is a huge network of compromised systems used by attacker to stop computer functioning. Bot net performs tasks such as uploading viruses, sending mails with botnet attached, and stealing data.
  • Phishing: Is a way of sending an illegitimate email falsely claiming to be from a legitimate site in order to acquire user’s account information. This can be done by providing an unwanted link to the mail and tempting users to click the link.
  • Ransomware: Is a type of malware, which restricts access to the computer system files and folders and demand payment to clear the malware. It’s usually spread through email messages or messages with attachments.
  • Web application threats: Is a further subset of SQL injection and cross-site scripting attacks. Most of these attacks are due to flawed application development and improper sanitisation of input and output of data from web application. It threatens the performance of the website and hampers web application security.
  • Internet of things (IOT) Threats: Devices connected to the internet have no security at all or have means only minimal. Due to memory, battery and storage constraints, IOT Applications do not include complex security mechanisms which invite cyber-attacks. Also, the systems are more vulnerable and make it easier for
  • Mobile threats: Users may download malware applications to their phones, which can damage applications and data and send sensitive information to the attackers. Attackers can then access sensitive data remotely using virtual environment.
  • Eavesdropping: Is a threat to enterprise or individual by secretly listening to conversation between two parties either on phone or direct.
  • Cloud computing threats: Cloud computing is an on-demand delivery of IT services and infrastructure. Enterprises can store sensitive information on the cloud. A flaw in one cloud platform will allow attackers to gain access to all the infrastructure in cloud and attack other enterprise data.

To conclude, one must understand various cyber attacks in order to take action against those attacks. Proper policies should be in place to avoid those attacks at the organisation level.  Employees must be aware of the attacks at their level and support enterprises in fighting against cyber attacks.

Reference: https://www.techopedia.com

This article is contributed by Latha Manian from the School of Technology.

Tagscyber securityphishingtechnology
Previous Article

Behavioural Safety at Work

Next Article

Pigs as Models in Understanding Cardiovascular Diseases

0
Shares
  • 0
  • +
  • 0
  • 0
  • 0
  • 0
MDIS

MDIS

Founded in 1956, the Management Development Institute of Singapore (MDIS) is Singapore’s oldest not-for-profit professional institute for lifelong learning. MDIS has two main subsidiaries: Management Development Institute of Singapore Pte Ltd which oversees its Singapore academic operations, and MDIS International Pte Ltd which focuses on MDIS’ globalisation strategy. MDIS offers internationally-accredited courses in Business and Management, Engineering, Fashion and Design, Health and Nursing, Information Technology, Languages and Education, Life Sciences, Media and Communications, Psychology, Tourism and Hospitality Management, and Safety and Environmental Management.

Related articles More from author

  • man machine
    EngineeringFeatured Post

    Man and Machine: Can they co-exist?

    21st March 2018
    By MDIS
  • A Peek Into Dr Tham’s Life
    Student Life

    A Peek Into Dr Tham’s Life

    9th September 2021
    By MDIS
  • Top 10 Highest Paying Jobs
    Career ManagementFeatured PostUncategorized

    Top 10 Highest Paying Jobs in Singapore for 2022

    4th October 2021
    By MDIS
  • Service Oriented Architecture
    Featured BK RowInformation Technology

    Service Oriented Architecture

    9th December 2017
    By MDIS
  • Featured PostStudent Life

    A Peek Into Dr Rama’s Life

    14th October 2021
    By MDIS
  • cloud computing
    Featured Full Width SliderInformation Technology

    Facts about Cloud Computing

    30th September 2017
    By MDIS

1 comment

  1. Avatar
    Ronald Soh 16 July, 2021 at 23:00

    Hackers used scripts to automate their scanning their potential victims. For SME, we should minimize by shutting unused services and update the platform updates regularly. If they do not have any competencies, then they should approach IT Security company for assistance.

Leave a reply Cancel reply

You may also like

  • Media & Communications

    The Horrors of Climate Change

  • Valentine Makeup
    Featured PostMedia & Communications

    Get The Look – Velvet Valentine’s Makeup

  • MBC Election
    Business & Management

    MDIS Business Club Election 2018 (Round 1)

Categories

  • Business & Management (32)
  • Campus (9)
  • Career Management (38)
  • College (17)
  • Engineering (11)
  • Event (34)
  • Fashion & Design (37)
  • Featured BK Row (64)
  • Featured BK Video (10)
  • Featured Full Width Slider (57)
  • Featured Post (83)
  • Health & Nursing (7)
  • Information Technology (32)
  • Languages (17)
  • Life Sciences (25)
  • Lifestyle (11)
  • MDC (14)
  • Media & Communications (29)
  • Psychology (9)
  • Safety Management (8)
  • Student Life (22)
  • Tourism & Hospitality (29)
  • Uncategorized (11)

Follow us on Instagram

This error message is only visible to WordPress admins

Error: No connected account.

Please go to the Instagram Feed settings page to connect an account.

TAGS

  • psychology
  • Online MBA
  • mba vs mpm
  • cybersecurity
  • life sciences
  • mdis psychology diploma
  • research and development
  • Draping Workshop
  • mental health
  • What is an MBA
  • psychology degree
  • degree in singapore
  • degree
  • biomedical sciences
  • online MBA in USA for international students
  • mba vs masters in project management
  • what's next after o levels
  • career opportunities after cybersecurity degree
  • MBA
  • Cybersecurity degree course
  • Artificial intelligence
  • School of Fashion and Design
  • mba vs project management
  • Student Internship Programme
  • what is a cybersecurity degree
  • MDIS Events
  • Business Administration
  • MDIS School of Tourism and Hospitality
  • Online MBA USA
  • MDIS Graduation Ceremony
THINK SUCCESS. THINK MDIS.
Copyright© 2022. MDIS Blog. All Rights Reserved.
     
Where lifelong learning begins