Training

Characteristics of cyber attacks

by Mark Rowe

In case studies, the information security consultancy, MWR InfoSecurity, has gone through the characteristics of ten cyber-attacks. Each paper, produced with the support of the UK official Centre for the Protection of National Infrastructure (CPNI), aims to help organisations understand how these attacks are conducted. Describing real-world events, they also help show the potential impact of attacks and the failures that lead to compromise. The papers include:

Application Layer Attack;
Brute Force Attack;
DDoS Attack;
Network Protocol Attack;
Known Vulnerability Exploitation;
Zero Day Exploitation;
Phishing for Credentials;
Phishing with Malware;
Rogue Update Attack; and
Watering Hole Attack.

Dr David Chismon, Senior Security Researcher at MWR InfoSecurity said, ““While all attacks will be tailored to the organisation being targeted, there will be similarities in how they’re orchestrated. Understanding common attack methodologies is key to better protecting the network. I hope users will find these case studies insightful, and will use the contents to help illustrate the reality of the threat and the need for investment in security measures perhaps even including them in training materials.”

To read the full case studies, visit http://www.cpni.gov.uk/advice/cyber/Cyber-Attack-Types/

For more about MWR InfoSecurity, visit www.MWRInfoSecurity.com.

Related News

  • Training

    Swiss cyber academy

    by Mark Rowe

    The audit firm KPMG Switzerland, with its UK-based partner Immersive Labs, is opening a cyber academy in Switzerland. The two launched the…

  • Training

    Event safety call

    by Mark Rowe

    The events industry ought to place greater focus on reporting minor incidents to avoid major disasters, says Emma Parkinson, Course Leader for…

  • Training

    London breakfast briefings

    by Mark Rowe

    The business group London First runs invitation-only monthly breakfast briefings on security and resilience in the capital. The next dates and topics…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing