Monday, September 9, 2019

Cyber Security Top 5 Priority and Cyber Attacks In History

Cyber Security Awareness Top 5 Priority and Cyber Attacks In History 

Experts perspective on cyber security has top 5 Priority's in which everyone should aware.
  • External threats--organized threats. 
  • Change in way of business conducted through cloud and big data.
  • Rapid technology change like Internet of things(IOT) 
  • Regulatory compliance i.e data loss, privacy etc.
  • Changing market and client requirements for intelligence and sharing. 
Organised cyber attacks in history:
  • Saudi aramco an American oil company was affected by cyber attack on 16 Aug 2012 , malware attacked  the user workstation and company stopped entire communication towards outside organisation. This malware was infected user workstation this don't affect the working of production plc connected via electronic network devices. So Saudi aramco isolated the entire organisation and separated its connectivity in order to stop spreading of malware. This takes long time to fix. But they didn't traced the attack vector. They prioritise to fix the issue. 
  • On 2007 same type of malware known as stuxnet worm which was targeted to affect Iranian Nuclear Development program. Malware target to affect the PLC (Programmable Logic controller) which used to control the flow in plant. Malware was transmitted in infrastructure through flash.net 
  • European telecommunications operator/African and kaspersky was affected by a sophisticated malware known as DUQU 2.0 which is used as cyber espionage tool, which will spy on the affected user and gather the information and send to the attacker. It will hide inside the internal RAM. It was specifically attacked on zero day based on the Vulnerabilities on patch attack has been introduced. This may be introduced in to the network by spear phishing attack. 
  • In Russia hackers targeted energetic bear power plant control systems and dragon fly is a supplying organisation attacked by  phishing and trojan attack. 

Hacking for profit:
  • Morpho or wild neutron are extremely dangerous group which target all sector. They are from above 49 organisation in 20 different countries. Mostly this organisation are interested in developing a spyware and most of the bit coin related companies. 
  • Edward Snowden well known person in cyber world who hacked more than 1 million government docx and who cause a threat to US government. Edward also a formed Federal Agent. 
Just remember one thing nothing is free on Internet, everything gets an profit other means using any free application be careful...

Hill Station view:

No comments:

Explore Me

Networking- Cisco IOS XR

Cisco IOS XR found in service providers routers like 12000 series cisco IOS XR. Cisco IOS XR originally designed for 64 bit operations....