7 Incredible Cyber Security Examples

Nilesh Parashar
4 min readSep 23, 2021

--

Today, the importance of internet security is well accepted. We all use the internet to access websites, apps, and platforms, which makes us vulnerable to cyber-attacks. In this article, we’ll look at 7 ways that a cyber attack can affect us.

1. Malware

As shown earlier, new malware is created all the time. However, while the statistics for 360,000 new malware files per day sound daunting, it is important to know one thing: Many of these four “new” malware files rewind old malware programs that have been modified enough to make them invisible to antivirus programs.

Over the years, however, many types of malwares have been developed, each affecting the target systems differently:

· Ransoms: This malicious software is designed to encrypt the victim’s drive data, making it inaccessible to the owner. After that the ultimatum is sent, demanding payment by returning the encryption key. If the penalty requirement is not met, the key will be deleted and the data will be permanently lost with it.

· Trojans: This refers to the type of computer delivery that is not suitable for the computer. A trojan is any part of a malware program that creates a legitimate system to trick victims into installing it. Trojans can do a lot of damage because they slide behind your external network security by exposing themselves as harmless while carrying a major threat inside — as did a famous horse in the city of Troy in Homer’s “Iliad”.

· Worms: Worms are programs that can replicate and spread in various ways, such as emails. Once in the program, the worm will search for a specific type of contact information or file-sharing program and send it as an attachment. If it is in an email form, the attachment is part of the email that looks like it came from someone whose computer is corrupted.

2. Risk of Unpublished Security

While countless new threats are being made every day, many of them rely on old work ethic to work. As many malwares seeks to exploit the same risks over and over again, one of the biggest risks a business can take is to fail to cover those risks once they have been identified.

It is very common for businesses — or even some users in the network — to throw away “renewable” reminders found in certain programs because they do not want to lose 5–10 minutes of active production time the renewal can take.

3. Hidden External Systems

This is an example of deliberately compromised computer security. When a developer of computer hardware, software, or complete computers incorporates a program or small code designed to allow the computer to be accessed remotely (usually for diagnostic, configuration, or technical support), that access program is called a backdoor.

When a backdoor is installed on computers without the user’s knowledge, it can be called a hidden background program. Hidden doors are a major software threat because they make it much easier for someone with backdoor access to illegally accessing the affected computer system and any network to which it is connected.

4. Superuser or Control Account Rights

One of the basic principles of managing software vulnerabilities is limiting the access rights of software users. The less information/resources the user can access, the less damage the user account can do if it is postponed.

5. Automatic Document Performance Without Malware / Virus Checks

A common network security risk that some attackers have learned to use with certain web browsers (such as Safari) is the tendency to automatically use “trustworthy” or “secure” scripts. By imitating a trusted piece of code and cheating the browser, cybercriminal makers can get the browser software to run malware without the knowledge or input of the user — who is often unaware of disabling this “feature”.

6. Unknown Disruptions in Software or Editing Parts

Computer software is incredibly complex. When two or more programs are made to work together, the difficulty only increases. The problem with this is that within one piece of software, there may be problems with programs that may pose a security risk. When two programs are shut down, the risk of conflict causing software vulnerability increases.

7. Attack of Identity Theft (Public Engineering)

In an attack on identity theft, the attacker tries to trick the victim’s employee into providing sensitive information and account credentials — or downloading malware. The most common form of this attack comes as an email mimicking the identity of one of your company’s vendors or the person with the highest authority in the company.

Conclusion

With the increasing use of technology and advances in the field of devices and networks, security will inevitably become a major threat. But shouldn’t we use it then? Not! There are always security tools that will prevent and eliminate these security threats. There are professional cyber security experts who can help you with dealing with cyber threats and phishing. For people interested in learning about cyber security and pursuing a career in cyber security, NIIT offers an online cyber security course which helps you in building core competencies for roles such as security analyst, incident responder, incident analyst etc.

--

--

Nilesh Parashar

I am a marketing and advertising student at Hinduja College, Mumbai University, Mumbai, and I have been studying advertising since 4 years.