Abstract
For cyber security, risk is the integrated effect of vulnerabilities, threats, and potential impact of cyber-attacks. Vulnerability is the potential weaknesses in the cyber security system. Threat is a possibility of cyber-attack by making use of system vulnerabilities. Internet and Internet of things (IoT) are the major threat entities. Data threat is increasing with scaling of new web applications. Some plug-ins are letting malwares enter in the system. Phishing is getting smart and passwords no longer guarantee security. Main threat actors are cyber criminals, nation states, and hacktivists.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ABC News (2017) The latest: FedEx confirms it hit by malware attack. The Associated Press, New York, 12 May 2017. http://abcnews.go.com/Technology/wireStory/latest-uks-health-service-hit-ransomware-attack-47372081
Bradley T (2013) Introduction to packet sniffing. Net security
Data Security Council of India (2011) Cyber crime investigation manual
de Ramos blog V (2016) The sequence of a targeted cyber attack, 20 July 2016. http://www.aim.ph/blog/the-sequence-of-a-targeted-cyber-attack/
Dimitrova M (2015) Types of trojan attacks 2015. Network, browser exploits and security essentials. Sensors TechForum, 31 Aug 2015
FOSSBYTES (2017) What is social engineering? What are different types of social engineering attacks? 28 Feb 2017. https://fossbytes.com/what-is-social-engineering-types-techniques/
Gite V (2006) Linux/UNIX command to find out who owns a domain name. Cybercity
Graves K (2010) CEH: certified ethical hacker study guide. Wiley Publishing, Inc., Indianapolis, Indiana
Holkar AM, Holkar NS, Nitnawwre D (2013) Investigative analysis of repudiation attack on MANET with different routing protocols. Int J Emerg Trends Technol Comput Sci (IJETTCS) 2(3)
Identity Week (2017) Identity Week, Cyber Security News and Analysis for the IT Community, The seven steps of a successful cyber attack. https://www.identityweek.com/seven-steps-of-successful-cyber-attack/
Ivanov I (2019) Cyber security and cyber threats: eagle vs ‘new wars’? Academia Publishing
Khanse A (2014) Cyber attacks-definition, types, prevention. The Windows Club, Dec 2014. https://www.identityweek.com/seven-steps-of-successful-cyber-attack/
Liska A (2003) Network security: understanding types of attacks. Pearson InformIT, 13 June 2003. http://www.informit.com/articles/article.aspx?p=31964&seqNum=3
Neumann PG (2000) Denial-of-service attacks. Commun ACM 136. (Academic OneFile)
O’Brien D (2018) The A to Z of cyber security. Symantech. https://medium.com/threat-intel/the-a-to-z-of-cyber-security-93150c4f336c
Rouse M (2005) Port scan. Techtarget
Simsolo Y (2016) COMSEC consulting, the art of securing your business. OWSAP Top Ten Backdoors
Smith-Spark L (2017) CNN, Global ransomware attack: 5 things to know, 13 May 2017. http://edition.cnn.com/2017/05/13/world/ransomware-attack-things-to-know/
The Telegraph, Internet Security (2017) Five of the biggest hacking attacks, 13 May 2017. http://www.telegraph.co.uk/technology/internet-security/9942462/Five-of-the-biggest-hacking-attacks.html
Webopedia Staff (2015) Well-known TCP port numbers. Webopedia
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Prasad, R., Rohokale, V. (2020). Cyber Threats and Attack Overview. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-31703-4_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31702-7
Online ISBN: 978-3-030-31703-4
eBook Packages: EngineeringEngineering (R0)