What Is a Cyber-Attack

Cyber-attack is an attempt to gain control to the computer and track the movements of an individual or a group without their permission. These attacks have now become new weapons for any country because these attacks can even damage national banks or can misuse anyone’s personal information. This is also known as Cyber Warfare (or Cyber terrorism). At least twenty countries are believed to be developing offensive and defensive cyber warfare capabilities.

There are a number of ways by which these attacks are performed. These ways are :-

Through Computer virus: These are software program that attaches to other programs or data files. Can be highly destructive. Spreading Worms: Independent program that copies itself over network. Viruses and worms spread via: Downloaded software files, E-mail attachments, infected e-mail messages or instant messages, infected disks or machines. Trojan horse: Software program that appears to be benign but then does something other than expected. Does not replicate but often is way for viruses or malicious code to enter computer system. Spyware: Small programs installed surreptitiously on computers to monitor user Web surfing activity and serve advertising. Key loggers: Record and transmit every keystroke on computer. Steal serial numbers, passwords. Hacker: Individual who intends to gain unauthorized access to computer system Spoofing: Misrepresentation, e.g. by using fake e-mail addresses or redirecting to fake Web site. Sniffer: Eavesdropping program that monitors information traveling over network. Denial-of-service (DOS) attack: Flooding network or Web server with thousands of false requests so as to crash or slow network. Distributed denial-of-service (DDOS) attack: Uses hundreds or thousands of computers to overwhelm network from many launch points. Identity theft: Using key pieces of personal information (social security numbers, driver’s license numbers, or credit card numbers) to impersonate someone else. Phishing: Setting up fake Web sites or sending e-mail messages that look like genuine and ask users for confidential personal data. Evil twins: Bogus wireless networks used to offer Internet connections, then to capture passwords or credit card numbers. Pharming: Redirecting users to bogus Web page, even when individual types correct address into browser. Click fraud: Fraudulently clicking on online ad without intention of learning more about advertiser or making purchase. Cyber vandalism: Intentional disruption, defacement, or destruction of Web site or corporate information system.

A number of Cyber Laws are there to fight out these types of attacks.