Is Unit I
Is Unit I
Is Unit I
Let’s now look at how we can prevent a malware attack: Use antivirus
software, Use firewalls, avoid clicking on suspicious links and Update your
OS and browsers, regularly
2. Phishing Attack
Phishing attacks are one of the most prominent widespread
types of cyberattacks. It is a type of social engineering attack
wherein an attacker impersonates to be a trusted contact and
sends the victim fake mails.
Unaware of this, the victim opens the mail and clicks on the
malicious link or opens the mail's attachment. By doing so,
attackers gain access to confidential information and account
credentials. They can also install malware through a phishing
attack.
This results in the attacker being able to view, edit, and delete
tables in the databases. Attackers can also get administrative
rights through this.
Let's now see how we can prevent the watering hole attack:
Update your software and reduce the risk of an attacker exploiting vulnerabilities.
Make sure to check for security patches regularly.
Use your network security tools to spot watering hole attacks. Intrusion prevention
systems(IPS) work well when it comes to detecting such suspicious activities.
To prevent a watering hole attack, it is advised to conceal your online activities.
For this, use a VPN and also make use of your browser’s private browsing feature.
A VPN delivers a secure connection to another network over the Internet. It acts as
a shield for your browsing activity. NordVPN is a good example of a VPN.
Those were the top ten types of cyberattacks. Now, let us walk you through the
next section of our article on types of cyberattacks.
Approaches to Information Security Implementation
Disadvantage –
Due to the lack of cooperation between senior
managers and relevant directives, it is often not
suitable for the requirements and strategies of the
organisation.
2. Top-Down Approach: