Priyanjana Ghosh_18700121027_Cyber
Priyanjana Ghosh_18700121027_Cyber
Priyanjana Ghosh_18700121027_Cyber
Cybersecurity
Priyanjana Ghosh Author
* Department of Computer Science and Engineering, Techno
International Newtown, Roll number: 18700121027, Subject: Cyber
Security, Subject Code: PEC-CS702E.
Abstract
As cybersecurity threats continue to evolve, organizations are increasingly vul-
nerable to sophisticated attacks targeting critical systems and sensitive data.
This report explores the various threats and attack vectors that malicious actors
use to compromise security, including malware, phishing, Denial of Service
(DoS) attacks, and social engineering. By understanding these attack methods,
organizations can develop comprehensive defense mechanisms. Case studies of
high-profile incidents illustrate the real-world impact of these threats, while coun-
termeasures such as multi-factor authentication, endpoint protection, and user
training are discussed as vital elements in mitigating risk. The report emphasizes
the importance of a layered security approach to combat these diverse threats
effectively.
1 Introduction
In today’s digitally driven world, organizations and individuals face a rising number
of cyber threats that can compromise the integrity, confidentiality, and availability
of sensitive data. The landscape of cybersecurity threats has expanded significantly
with advancements in technology. Attack vectors, or methods used by cybercriminals
to exploit system vulnerabilities, are growing in both sophistication and frequency.
1
Understanding these threats and how they are delivered is crucial for implementing
effective defense mechanisms.
This report provides a technical overview of common threats and attack vectors in
cybersecurity. We will explore malware, phishing, Denial of Service (DoS), and social
engineering attacks, among others. The report also discusses countermeasures and
methodologies used to mitigate these threats, with diagrams illustrating key concepts.
2.2 Phishing
Phishing attacks use social engineering to trick individuals into divulging confidential
information, such as usernames, passwords, and financial data. Attackers impersonate
legitimate entities through emails or websites, directing users to malicious websites.
Attack Vector:.
• Emails disguised as legitimate communication.
• Fake websites mimicking trusted brands.
Example Case Study:
In 2020, a large-scale phishing campaign targeted Microsoft Office 365 users, result-
ing in numerous compromised accounts due to users falling for fake password-reset
emails.
2
Example Case Study:
In 2016, the Mirai botnet conducted a massive DDoS attack on DNS provider Dyn,
disrupting major websites like Twitter, Reddit, and Netflix.
3 Methodology
To effectively protect against these threats, organizations adopt a multi-layered
approach to cybersecurity that includes:
• Endpoint Protection: Antivirus and anti-malware software prevent malware from
infecting devices.
• Email Security: Filters and advanced algorithms detect and block phishing
attempts.
• Network Security: Firewalls, Intrusion Detection Systems (IDS), and Intrusion
Prevention Systems (IPS) monitor and mitigate network threats.
• Authentication Mechanisms: Multi-factor authentication (MFA) adds an extra
layer of security to sensitive systems.
• User Education and Awareness: Training employees to recognize phishing
emails and social engineering tactics is crucial for reducing successful attacks.
Fig. 1 The diagram above illustrates the most common entry points for cyber attackers, highlighting
the importance of securing every layer of a system’s architecture.
3
4 Conclusion
The complexity of cyber threats continues to evolve with advancements in technol-
ogy. Attack vectors such as malware, phishing, DoS attacks, and social engineering
are just a few examples of the tactics employed by malicious actors. Organizations
must remain vigilant, utilizing both technological solutions and employee training to
mitigate risks effectively. A comprehensive, layered security approach that integrates
network defenses, endpoint protection, and user awareness is essential to safeguard
systems and data against these growing threats.
5 References
Symantec, “2019 Internet Security Threat Report,” Symantec Corporation, 2019.
Verizon, “2020 Data Breach Investigations Report,” Verizon Enterprise, 2020.
Microsoft, “Phishing Attacks and How to Combat Them,” Microsoft Corporation,
2020.
F-Secure, “Mirai Botnet: The 2016 DDoS Threat,” F-Secure Labs, 2017.
Kaspersky, “Social Engineering: The Human Factor in Cyber Attacks,” Kaspersky
Lab, 2021.