01.05.2018 Views

The-Accountant-Jan-Feb-2018

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

INFORMATION TECHNOLOGY<br />

Types of Cyber Attacks<br />

Cyber-attacks can be categorized into<br />

two distinct categories depending on the<br />

approach employed by the perpetrator;<br />

non-technical attacks and technical<br />

attacks.<br />

Non-technical attack – <strong>The</strong> person<br />

with the malicious intent of committing<br />

cybercrime uses some type of ruse to reel<br />

in the victim who is oblivious (Turban,<br />

2008). Through persuasion and nasty<br />

tricks they cause a person to divulge<br />

information that compromises their<br />

online security; they use the acquired<br />

data against the person.<br />

Technical Attack – When it comes<br />

to the technical approach of cybercrime,<br />

the offenders use software and highly<br />

skilled expertise to perform the offense.<br />

Technical attack has many sub-categories,<br />

some are listed below;<br />

1. Denial of Service (DOS) attack<br />

A person under such an attack may<br />

be unable to access admittance to use<br />

a resource like a webpage because of<br />

overloading. An attacker uses software<br />

that generates numerous data packets<br />

that are used on a targeted computer<br />

network hindering the access.<br />

2. Server/Webpage Hacking<br />

Hackers gain access to a server and then<br />

once infiltration is complete, they’ll<br />

configure the technology to redirect<br />

unsuspecting people to scamming sites<br />

(Turban, 2008). <strong>The</strong> illegal access may<br />

also be for harvesting of data to use later<br />

when they can monetize this information.<br />

3. Malicious Code<br />

This constitutes viruses, worms, and<br />

Trojan horses. Malicious code is<br />

commonly referred to as malware and<br />

may be classified according to how it<br />

spreads. Any form of malicious code<br />

threatens PC performance and can<br />

spread to other devices connected to<br />

the infected computer. This form of<br />

attack is usually meant to destabilize or<br />

completely incapacitate the target.<br />

4. Phishing<br />

A phishing attempt usually involves<br />

tricking on-line users into providing<br />

private information such as credit card<br />

numbers. This could be through sending<br />

spam email that alerts the target to a<br />

problem that requires information to<br />

fix. Phishing has developed into other<br />

sub-groups; spear phishing, vishing<br />

and smishing - that is the use of sms to<br />

infiltrate the system.<br />

Phishing is among the types of<br />

attacks that boast of an upward positive<br />

graph over the years (Zappa, 2014). It<br />

is a key contributor to the demerits of<br />

cybercrime.<br />

Cybercrime has become a subject of<br />

immense interest worldwide since almost<br />

every facet of life is digitalized (Zappa,<br />

2014). Social media and world spread of<br />

information has helped the crime advance.<br />

Institutions and governments alike have to<br />

work at combating the act so as to avoid<br />

further losses that are predicted to rise even<br />

higher in coming years. It is paramount to<br />

keep ahead of the criminals and ensure<br />

internet security is upheld. An aggressive<br />

approach should be sponsored to develop<br />

a strategy that will combat cyber-crime<br />

and reduce the effects it imposes on the<br />

country and the world as a whole.<br />

JANUARY - FEBRUARY <strong>2018</strong> 47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!