Cyber security attack types
"One of the main cyber-risks is to think they don’t exist. The other is to try to treat all potential risks. (Fix the basics, protect first what matters for your business and be ready to react properly to pertinent threats. Think data, but also business services integrity, awareness, customer experience, compliance, and reputation)."
– Stephane Nappo
As more and more systems and CIs are getting digitized, the number of security breaches is also growing. The attackers utilize novel techniques to exploit the vulnerabilities within the applications to get access to unauthorized information and administrative privileges. In this section, we will list some of the common attack types and generic resolutions to those.Â
Phishing
This is one of the most common and successful (from an attacker's perspective) attacks on the applications. Most of the time, the attacker sends an email or some kind of familiar communication to the user to trick him/her into following the URL and...