Training

Characteristics of cyber attacks

by Mark Rowe

In case studies, the information security consultancy, MWR InfoSecurity, has gone through the characteristics of ten cyber-attacks. Each paper, produced with the support of the UK official Centre for the Protection of National Infrastructure (CPNI), aims to help organisations understand how these attacks are conducted. Describing real-world events, they also help show the potential impact of attacks and the failures that lead to compromise. The papers include:

Application Layer Attack;
Brute Force Attack;
DDoS Attack;
Network Protocol Attack;
Known Vulnerability Exploitation;
Zero Day Exploitation;
Phishing for Credentials;
Phishing with Malware;
Rogue Update Attack; and
Watering Hole Attack.

Dr David Chismon, Senior Security Researcher at MWR InfoSecurity said, ““While all attacks will be tailored to the organisation being targeted, there will be similarities in how they’re orchestrated. Understanding common attack methodologies is key to better protecting the network. I hope users will find these case studies insightful, and will use the contents to help illustrate the reality of the threat and the need for investment in security measures perhaps even including them in training materials.”

To read the full case studies, visit http://www.cpni.gov.uk/advice/cyber/Cyber-Attack-Types/

For more about MWR InfoSecurity, visit www.MWRInfoSecurity.com.

Related News

  • Training

    Ciaran Barry CSyP

    by Mark Rowe

    At Linx International Group, the security, risk management, consultancy and training services company, its Director of Group Operations, Ciaran Barry, has been…

  • Training

    Cyber morphed

    by Mark Rowe

    My perception of the typical cybercriminal has shifted. They might not be ‘suited and booted’ but, in my mind, he or she…

  • Training

    Cloud talkers

    by Mark Rowe

    Security is among the topics at the conference part of the annual exhibition Cloud Expo Europe 2014, at the ExCel, London Docklands.…

Newsletter

Subscribe to our weekly newsletter to stay on top of security news and events.

© 2024 Professional Security Magazine. All rights reserved.

Website by MSEC Marketing