Cyber Security

stock-photo-31068622-safety-concept-cyber-security-on-digital-backgroundCybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, the term security implies cybersecurity.

The New Cyber criminals have now ways to get backed up by Criminal organizations and or radical political groups.

Today’s Cyber criminal have more resources available to plan an Attack and have more technical knowledge. Most of these groups are not motivated by money alone.They are better organized and have funds available to them in many different ways.

stock-photo-3413560-teen-boy-in-the-darkThis is not just a kid in the basement breaking into big corporations for kicks and giggles.

New criminals know what to do with the stolen data they just got a hold of. The kid in the basement would not know what to do with that data.

Criminal organization knows exactly what to do or who to sell stolen intellectual property to on the gray or black market. Criminal organizations and nation-states have far greater financial resources than independent individuals.

Some of these organizations would look like a legitimate business with an office. Equipped with cubicles for computer operators( Cyber-criminals Station).  A receptionist to take calls from customer there scamming.That phone number they just called probably changes the next day.stock-photo-42016610-group-of-business-people-discussing-network-security

Not only do we face more sophisticated adversaries today, but the types of information of value to them are continually expanding as well.

These groups can do interesting things with the most seemingly innocuous bits of information.

The way attack strategies are design nowadays is not a direct attack against a high value server.

The new cyber criminal attacks a certain individual on the server there planning to break into. This is done by getting an individual to click an infested link.

stock-photo-31670732-hacker-programing-in-technology-enviroment-with-cyber-iconsResulting in the users computer getting infected by malware . At this point the malware acts as a control point so the attacker can gain root access to users  computers.

This malware most likely be running in the background. The attacker now has a control point inside the network. Allowing to further expand there attack.

“The key here is that instead of malware and network exploits being separate disciplines as they were in the past, they are now integrated into an ongoing process”.’ Key components of the advanced attack strategy include infection, persistence, communication, and command and control.”  …Resource: Cybersecurity For Dummies, Palo Alto Networks

Once the attacker has a hold of the shell access. First thing they do is exploit the target. After this, they deliver the malware in the background through the app that’s open already or connection.

stock-photo-42348230-virus-attackIn fact, based on its own research, Palo Alto Networks has found that as much as 90 percent of unknown or targeted malware capable of avoiding traditional antivirus technology is delivered from real-time web applications as opposed to corporate e-mail.

Normally attacks that are targeted will develop its own unique type of malware. Since these attacks are specifically customized for that specific target.These attacks are hard to detect. They avoid security by avoiding traditional antivirus detection.

The Primary role of malware attacks plays a central role in the attackers arsenal. An the life cycle of the attack. Cyber criminals have found waysstock-photo-62866222-malware-wordcloud-concept-illustration to deliver malware undetected. Hiding malware communications (with encryption), and avoiding traditional signature-based detection.

These attacks are sophisticated but they do have there vulnerabilities of their own. Today’s threats are networked threats that need your network to communicate. If a threat can’t communicate, the attack can be largely neutralized.

Also there is numerous opportunities exist in your network to detect. The fact that the attack has multiple steps to accomplish full attack.  If an attacker can infect targets, persist on, communicate with, and manage infected hosts, then the attacker can do almost anything.

Organizations need to focus on expanding visibility beyond the network perimeter — both inward and outward. This is best accomplished with network segmentation and a next-generation firewall to enforce central controls on internal and external (such as remote and mobile access) network traffic.

stock-photo-23331063-cyber-attack-headline The sky is NOT falling! Today’s threats are not so advanced that they are impossible to control. They are not completely new, just more common and better organized. Solutions do exist, and organizations can adopt best practices and adapt to changes in the threat landscape. Don’t fall into a trap. The attackers have evolved, but security has as well.





Feel Free to Drop a Comment

You can also find me in Wealthy Affiliates

contact me at:

Wish you all the Best




Resource: Cybersecurity For Dummies, Palo Alto

2 Replies to “Cyber Security”

  1. Interesting how they attack an individual computer first and not the main server. i did not know malware can be use in such a way. The user is not even aware his computer is being used to break into the server he is logged on. Great information here. keep it up.

    1. Yeah Cyber attacks are getting more sophisticated everyday. But the good news the Cyber Security pros
      are staying alert and ready for just about anything. Thanks for your comments.

Leave a Reply

Your email address will not be published. Required fields are marked *