Introduction Cyber-attack is defined any type of offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system (Wikipedia,2013). In today’s world, due to unlimited data flow and numerous internet users, cyber-attacks h ave been drastically increased. According to Paolo Passeri’s statistics research , the main causes for the cyber- attack are cyber-crime, hacktivism and cyber-espionage. The recent statistics displays still 25.3% of the attack technique …show more content…
It is the most common denominator of the attacks. Its aim is to create fear among individuals, society and governments on particular subjects or terrorists. For example, Bali night club terror in 2002 which took away innocent 202 lives and injured 209 people has created fear factor for international tourists. Then, the cyber terrorists took advantage of it by utilizing fear as their weapon to penetrate into personal information and societal infrastructure by means of phishing, spams, denial of service and virus insertion. Spectacular factor. The actual damage of an attack always have a spectacular nature. It signifies that attacks are aimed to create either huge direct losses and/or resulting in a lot of negative publicity. For example, Microsoft’s web site was brought down by a powerful Denial of Service (DoS) attack on January 2015. It began in the morning and continued till afternoon where the visitor could only load 2% of the site. At that point of time, Microsoft’s website had third largest visitors but, due to the incident, it created negative …show more content…
First phase is reconnaissance of the victim. By observing the normal operations of a target, useful information can be ascertained and accumulated such as hardware and software used, and regular and periodic communications penetration, identification of internal capabilities and removal of evidence. Second phase is penetration. Until an attacker is inside a system, there is little that can be done to the target except to disrupt the availability or access to a given service provided by a target. Third phase is identifying and expanding the internal capabilities by viewing resources and increasing access rights to more restricted, higher-value areas of a given system. Fourth stage is where intruder does the damage to a system or confiscates selected data. The last phase is removal of any evidence of a penetration, theft and deleting log