An Article by our department Staff
SYSTEM
HI-JACK
What is Cyber Attack?
A Cyber Attack is an attack initiated from a
computer against another computer or a website, with a view to compromising the
integrity, confidentiality or availability of target and the information stored
in it. An attack to commit a Cyber
Crime can be called as a Cyber Attack!
Types of Cyber Attacks
· Gaining, or attempting to gain, unauthorized access to a computer system or its data.
· Gaining, or attempting to gain, unauthorized access to a computer system or its data.
·
Disruption or denial of service attacks (DDoS)
·
Hacking a website or mal-facing the site
·
Virus or malware installation
·
Unauthorized use of a computer for processing of data
·
Inappropriate use of computers or applications by employees of a
company, in a way that it harms the company.
Commonly used Hacking Techniques
1. Keylogger -
Keylogger is a
simple software that records the key sequence and strokes of your keyboard into
a log file on your machine.
2. Denial of
Service (DoS\DDoS)
A Denial of
Service attack is a hacking technique to take down a site or server by flooding
that site or server with a lot of traffic that the server is unable to process
all the requests in the real time and finally crashes down.
3. Waterhole
attacks
If you are a big
fan of Discovery or National Geographic channels, you could relate easily with
the waterhole attacks.
4.
Fake WAP
Even just for
fun, a hacker can use software to fake a wireless access point. This WAP
connects to the official public place WAP. Once you get connected the fake WAP,
a hacker can access your data, just like in the above case.
5.
Eavesdropping (Passive Attacks)
Unlike other
attacks which are active in nature, using a passive attack, a hacker just
monitors the computer systems and networks to gain some unwanted information.
6. Phishing
Phishing is a
hacking technique using which a hacker replicates the most-accessed sites and
traps the victim by sending that spoofed link.
7. Virus,
Trojan etc.
Virus or trojans
are malicious software programs which get installed into the victim’s
system and keeps sending the victims data to the hacker.
8.
ClickJacking Attacks
ClickJacking is
also known by a different name, UI Redress. In this attack, the hacker hides
the actual UI where the victim is supposed to click.
9. Cookie
theft
The cookies of a
browser keep our personal data such as browsing history, username, and
passwords for different sites that we access. Once the hacker gets the access
to your cookie, he can even authenticate himself as you on a browser.
10. Bait and
switch
Using bait and
switch hacking technique, the hacker runs a malicious program which the
user believes to be authentic. This way, after installing the malicious program
on your computer, the hacker gets unprivileged access to your computer.
How do I know if my
computer has been hacked?
1. New
programs installed
2.
Computer
passwords have changed
·
Online passwords
·
Local computer password
·
Lost or forgotten Windows password.
3.
E-mail
spam being sent
4.
Increased
network activity
5.
Unknown
programs requesting access
6.
Security
programs uninstalled
7.
Computer
is doing things by itself
8.
Internet
browser homepage changed or new toolbar
If u have been hacked
what to do?
- · Disconnect from the internet immediately
- · Start up the computer in safe mode
- · Check if there aren't any "new programs" (eg. Anti-virus, Anti-spyware, etc.)
- · Do a sweep of your computer with an anti-virus/spyware scanner you trust
·
Contact your bank and any store accounts you have to alert them to a
possible problem. Ask them for
advice about what to do next to protect your funds.