Analysis of Cyber Attacks and Security Intelligence
A cyber attack is deliberate exploitation of computer systems, technology-dependent enterprises and networks. Cyber attacks use malicious code to alter computer code, logic or data, resulting in disruptive consequences that can compromise data and lead to cybercrimes, such as information and identity theft. Cyber attack is also known as a computer network attack (CNA). Cyber attacks occurred targeting banks and broadcasting companies in South Korea on March 20. The malware involved in these attacks brought down multiple websites and interrupted bank transactions by overwriting the Master Boot Record (MBR) and all the logical drives on the infected servers rendering them unusable. It was reported that 32,000 computers had been damaged and the exact amount of the financial damage has not yet been calculated. More serious is that we are likely to have greater damages in case of occurring additional attacks, since exact analysis of cause is not done yet. APT(Advanced Persistent Threat), which is becoming a big issue due to this attack, is not a brand new way of attacking, but a kind of keyword standing for a trend of recent cyber attacks. In this paper, we show some examples and features of recent cyber attacks and describe phases of them. Finally, we conclude that only the concept of security intelligence can defend these cyber threats.
KeywordsCyber Attacks Security Intelligence MBR APT Threat
Unable to display preview. Download preview PDF.
- 1.Advanced Persistent Threat (APT), http://en.wikipedia.org/wiki/Advanced_persistent_threat
- 2.Pangalos, G., et al.: The Importance of Corporate Forensic Readiness in the information security framework. In: 2010 Workshops on Enabling Technologies (2010)Google Scholar
- 3.Zero-day attack, https://en.wikipedia.org/wiki/Zero-day_attack
- 4.Rootkit, http://en.wikipedia.org/wiki/Rootkit
- 5.Rivner, U.: Anatomy of an Attack, http://blogs.rsa.com/rivner/anatomy-of-an-attack/
- 6.MacDonald, N.: The future of information Security is Context Aware and Adaptive. GartnerGoogle Scholar
- 16.Kim, Y., Park, N., Won, D.: Privacy-Enhanced Adult Certification Method for MultimediaContents on Mobile RFID Environments. In: Proc. of IEEE International Symposium onConsumer Electronics, pp. 1–4. IEEE, Los Alamitos (2007)Google Scholar
- 19.Park, N.: The Implementation of Open Embedded S/W Platform for Secure Mobile RFID Reader. The Journal of Korea Information and Communications Society 35(5), 785–793 (2010)Google Scholar