AsiaQuest Indonesia
AsiaQuest Indonesia AsiaQuest Indonesia

News / Blog

The No.1 WEB development in Indonesia. AsiaQuest Indonesia will share news, events, and blog of WEB utilization in Indonesia. We post in English, Indonesia, and Japan.

NewsMonday June 28th, 2021

5 Types of Cyber Attacks

The increasing number of digitalization has also increased the potential of cyberattacks. Cyber attacks are attacks that aim to target individual computers, companies, and/or institutions. Cyberattacks are usually committed by hackers for personal gain whether it is for money or satisfaction.

Cyber attacks are reported to increase significantly during the COVID19 pandemic at the beginning of 2020. The COVID19 pandemic has pushed every living being on the planet to stay at home, work from home, and school from home. It is no surprise that in 2020 alone, there is a sudden spike in the number of internet users. This increase of internet users has increased the number of cyberattacks.

Therefore, every individual, company, and/or institution needs to understand the types of cyberattacks. Below we have summarized the 5 types of cyberattacks in the world:

(1) DoS

In 2018, Github, which became a platform for project management and versioning code systems as well as a social networking platform for developers, was known to have been down due to hacker attacks. The type of attack that Github experienced at that time was known to be DoS.

DoS stands for Denial of Service, which is a type of attack that tries to disable a website so that it cannot be accessed by users. Hackers will carry out attacks repeatedly so that the site is down until it is completely paralyzed.

(2) Malware

Malware is malicious software designed to damage computer systems. Malware also contains viruses. When malware manages to enter a device, it can quickly damage the system.

Apart from damaging the system, another ability of malware is to steal data. It would be very dangerous if malware entered a company computer that stores important data.

Malware can infiltrate a device when a user downloads a file and then installs it on the device. Malware is categorized as the most dangerous cyber attack.

(3) Phishing

Phishing is often used to steal important data, such as PIN, password, and username. As we know before, by obtaining a username, password, and PIN, a thief can log into our account and take over control of the account.

Imagine if the stolen accounts were banking accounts, email accounts, social media accounts, and e-commerce accounts, the consequences could be bigger than we can imagine. Hackers can gain control of our accounts while we lose control, which can result in financial losses.

Phishing is done by distributing emails posing to be someone we know, official institutions, etc that play with our psychological side. The email contains attachments or links. The link will direct the target to a scam page that looks credible or official. For example, a link to purchase the latest mobile phone products with super cheap discounts. Recipients who are interested in the promotion may intend to place an order and then fill in their credit card data on the scam page. Finally, hackers managed to get important user data to be used for further crimes.

(4) Credential Reuse

This type of cyberattack takes advantage of similar usage of credentials across multiple accounts. For example, using a similar username and password for email, social media, e-commerce, etc. Using the same/similar credentials for multiple accounts becomes easy targets for cyber attacks.

Hackers may get your credentials and can easily take over your multiple accounts. Therefore, it is recommended to use a different username and password for each account.

(5) SQL Injection

The next type of attack is SQL Injection. Every IT company must be careful of SQL injection. It can happen due to loopholes that cannot be covered by the security system of the database.

Hackers will enter codes such as periods, single quotes, and dashes. When the code is successful, all data in a database will be deleted and the data can be used by hackers to take other actions that can harm a company.

Reference: mtp.co.id

Computer photo created by Racool_studio – www.freepik.com

cyber attack
DX News
Tags

Event
Calendar

Mar
12
2020

Kintone Seminar, 12th March 2020
Pemanfaatan IT Untuk Efesiensi Kerja Integrasi dan Pembuatan Aplikasi tanpa…

Apr
15
2020

Seminar WFH Lebih Mudah dan Efisien dengan…
Sorry, this entry is only available in Indonesian.

Back To Top