Possible Cyber Attacks in the Enterprise

“Cyber Attack” is an attempt through which an attacker can gain access to enterprise computer or networks to implant a payload – referred to as a computer virus which performs dangerous activities such as, data destruction and sending spam mails that produce malicious outcomes. Cyber-attacks are disrupting enterprise productivity through thefts or stealing of enterprise information, creating fear to employees, financial loss, demanding money from organisations by injecting virus to their systems, damaging their reputation or to take revenge.

Types of cyber attacks  

  • Bot Net: A botnet is a huge network of compromised systems used by attacker to stop computer functioning. Bot net performs tasks such as uploading viruses, sending mails with botnet attached, and stealing data.
  • Phishing: Is a way of sending an illegitimate email falsely claiming to be from a legitimate site in order to acquire user’s account information. This can be done by providing an unwanted link to the mail and tempting users to click the link.
  • Ransomware: Is a type of malware, which restricts access to the computer system files and folders and demand payment to clear the malware. It’s usually spread through email messages or messages with attachments.
  • Web application threats: Is a further subset of SQL injection and cross-site scripting attacks. Most of these attacks are due to flawed application development and improper sanitisation of input and output of data from web application. It threatens the performance of the website and hampers web application security.
  • Internet of things (IOT) Threats: Devices connected to the internet have no security at all or have means only minimal. Due to memory, battery and storage constraints, IOT Applications do not include complex security mechanisms which invite cyber-attacks. Also, the systems are more vulnerable and make it easier for
  • Mobile threats: Users may download malware applications to their phones, which can damage applications and data and send sensitive information to the attackers. Attackers can then access sensitive data remotely using virtual environment.
  • Eavesdropping: Is a threat to enterprise or individual by secretly listening to conversation between two parties either on phone or direct.
  • Cloud computing threats: Cloud computing is an on-demand delivery of IT services and infrastructure. Enterprises can store sensitive information on the cloud. A flaw in one cloud platform will allow attackers to gain access to all the infrastructure in cloud and attack other enterprise data.

To conclude, one must understand various cyber attacks in order to take action against those attacks. Proper policies should be in place to avoid those attacks at the organisation level.  Employees must be aware of the attacks at their level and support enterprises in fighting against cyber attacks.

Reference: https://www.techopedia.com

This article is contributed by Latha Manian from the School of Technology.

MDIS

Founded in 1956, the Management Development Institute of Singapore (MDIS) is Singapore’s oldest not-for-profit professional institute for lifelong learning. MDIS has two main subsidiaries: Management Development Institute of Singapore Pte Ltd which oversees its Singapore academic operations, and MDIS International Pte Ltd which focuses on MDIS’ globalisation strategy. MDIS offers internationally-accredited courses in Business and Management, Engineering, Fashion and Jewellery Design, Health and Nursing, Information Technology, Languages and Education, Life Sciences, Media and Communications, Psychology, Tourism and Hospitality Management, and Safety and Environmental Management.

Share
Published by
MDIS

Recent Posts

Making a Fashion Statement: Felicis Lim

It’s never too late to start realising your dreams. Felicis Lim graduated from MDIS with…

1 week ago

Tips to Getting Your Master’s Degree in Education

Get your Master’s Degree in Education at MDIS, Specifically Designed for Teachers and Educators

1 month ago

Never Too Early, Never Too Late

In his book, The 7 Habits of Highly Effective People, Stephen R. Covey encourages us…

1 month ago

E-Open Day 2022 – Up To S$4K Rebates, Highlights & Giveaways

What’s next after O Levels? Explore a future of possibilities with over 10 disciplines to…

1 month ago

Five main challenges of Artificial Intelligent Technology

The ever-presence of Artificial Intelligent (AI) in many industries, ranging from consumer applications to business…

1 month ago

Introducing Actinomycetes: The Producers of Valuable Metabolites

Actinomycetes are a gram positive, unicellular bacterium that have similar traits to fungi in that…

1 month ago