We all know that there are people over the Internet whose main intention is only to find vulnerabilities in someone's system and then make an attack to it. This kind of people have a wicked sense of mind and only believes in exploiting the security loopholes of people systems.
In this article of mine, I am going to talk about the various kinds of Cyber attacks that an attacker can perform to steal your data by breaching the online security.No matter how secure your online accounts are, the security can be breached as it is only secure for a particular amount of time period.
Now it depends on the skills of the person who is trying to get into your system or trying to hack into one of your online accounts.
Various Types Of Attacks:
- Password Guessing Attack, As its name suggests this attack is basically been performed in order to guess someone's password, unauthorized users repeatedly tries to log onto someone's system by using different sets of username and passwords randomly. Now Password Guessing Attack can again be classified into two types, Brute Force Attack and Dictionary Attack.
- In Brute Force Attack, the attacker systematically tries every combination of password until and unless the correct password is found.There are many online tools out there on the web that are used to perform Brute Force Attack.
- In Dictionary Attack, the attacker uses a dictionary of common words that can be used by people while creating their passwords, they use these words one by one and hope that one might become right by chance. As most of the people use their own name as a password or their pets name or even the word "Password" itself as password, so in Dictionary attack all common words are tried out.There are many automated systems out there on the Internet to execute Dictionary attacks.
- Man In the Middle Attack, Whenever we try to send some information from our system to some website or even when we try to login into our accounts online, we tend to provide passwords that first gets send to the website's server and after processing if our given credentials are correct, our account page gets opened. Now Imagine during the processing of request from our system to the server, if someones comes in the middle and steal our information that can be our password, or if we are making some online transaction, so just reads the amount and modify it, This kind of attacks are known as Man In the Middle Attack.The Attackers tries to steal the information from the HTTP Headers by capturing its session and cookie information.
- Man In the Browser Attack, If some malware got installed into your system's browser, then the browser itself will start capturing your passwords very easily, this attack is known as Man In the Browser Attack.
- Phishing, Creating a replica of your favorite site and then send the link to it via fraudulent email messages that look genuine cause these messages appear like coming from websites that you trust, after clicking the link the information that you provides tends to get stolen by the attackers.Phishing emails often try to create a panic among the users so that they visit the link in anxiety and provide the information without checking the URL they are visiting. Phishing emails often are like please respond as early as possible otherwise, your account will be suspended, and there might also be emails like that your account has been a victim of Phishing activity and in order to recover we need your password.
- DoS Attack, Attackers tend to send a large number of request to the server of the website to make it crash and then start denying the services, this is called Denial Of Service Attack. As the attacker is sending the request continuously there will come a time that server won't be able to accept any more request and gets crashed down. Distributed Dos attacks are also there where from distributed location request gets send rather than from one location only.
- Spoofing, A Spoofing attack is a technique that makes a transmission appears comes from a trustworthy source by forging the IP address.In IP Spoofing, a hacker modifies packet headers by using someone else's IP address.
Prevention against these kinds of Attacks:
- Whenever you visit a particular site try to check the URL of the website first and make sure to provide your bank account related information to HTTPS based site only.
- Always try to use a strong password, rather than just using your name or date of birth try to use a password that consists numbers, symbols, and alphabets.
- Never store your username and password in the browser.
- Never replies to emails that ask you to provide you your password or bank related information.
- Use the two-factor authentication process, where you must need to enter your password and then needs to enter an OTP sent from the website itself. PayPal, Amazon, and Google are already using this two-factor authentication process.
- Avoid clicking on the unwanted popups or ads that appear in a website cause you never know they might install some malware in your Browser.
- Install the Paid version of Antivirus in your system.
Just be smart and active while surfing the Internet and providing your Credentials, Cause you are the only one who can maintain the security of your computer systems and your online accounts. If you are aware of the sites that you are visiting and aware of the information you are sharing online then you can find yourself safe.
No comments:
Post a Comment
Thanks for Your Time!