The most reading you may also like. Share your opinion after Ukraine's exposure to it .. What is the cybersecurity and how does it happen?
The Ukrainian authorities announced yesterday, Tuesday, that the Ministry of Defense sites and two government banks were subjected to an electronic attack.
The attack prolonged the sites of the government savings bank, "Ushad Bank" and "Barifat 24", which are considered one of the largest financial institutions of the state, and caused the blocking of the service, while the commission said in a statement that "there is no threat to the depositors' money."
Also, 10 Ukrainian websites stopped working due to the "DOS" viral attacks, on Tuesday, including special sites for defense, foreign and culture ministries, and a message appeared on the Ministry of Defense website indicating that it is broken and subject to technical maintenance.
The announcement issued by the Ukrainian Communications Control Authority came at a time when concerned about the former Soviet Republic of the possibility of a military attack by Russia, which is conducting widespread military exercises at its borders, according to Al -Arabiya Al -Hadath.
* What are the types of cybersecurity?
According to the UK Cyber Security Center, the cybersecurity is two guided and unguided species.
- Unreasonable attacks
Electronic attacks are not guided, targeting attackers randomly with the largest possible number of devices, services or users, it is not important to be the victim as much as there will be a number of devices or services that have weaknesses to penetrate them, which include fraudulent hunting, such as sending emails toLarge numbers of people to demand sensitive information (such as bank details) or encourage them to visit a fake website.
These attacks include "water cavity" and means creating a fake web site or bargaining on a legal site to exploit visiting users, or launch ransom programs, which can include the deployment of harmful programs that encrypt the disk, or penetrate devices by surveying by attacking large areas of the Internet randomly.
- Green attacks
In the directed attack, the institution is determined because the attacker has a specific interest, and the primary action of the attack may take months so that professionals can find the best way to deliver their gaps directly to the systems to be penetrated, and the directed attack is often more harmful than the targeted attack because it is designed specifically to attackSystems, operations or individuals in the office and sometimes at home.
Attacking attacks are taking place by speaking, which is to send emails to the targeted individuals that may contain an attachment with harmful programs, or a link that downloads harmful programs, or spread robots to impose an attack, or sabotage the supply chain to attack equipment or electronic programs of the party to be hacked.
* The stages of cybersecurity .. How does it happen?
Regardless of whether the attack is directed or not directed, or that the attacker uses a dedicated commodity or tools, electronic attacks have a number of common stages, the attack may be formed, especially if it is implemented by a permanent opponent, from repeated stages that the attacker investigates your defensesEffectively, in search of weaknesses that if they are exploited, they bring them closer to their final goal, and the cyber attack occurs through 4 main stages:
1. Survey
The investigation and analysis of the available information about the goal in order to determine the potential weaknesses, in order to reach a point in the system as it can be exploited as a security gap.
2. The breach
The exploitation of security gaps and weaknesses to obtain an unauthorized form.
3. The surveying stage
Attackers will use any means available to find technical, procedural or material weaknesses that they can try to exploit.
Here, the hacker can use open source information such as "Linked Inn, Facebook," in addition to using basic commodity tools and technology groups and standard network scanning tools to collect and evaluate any information about computers, safety systems and employees in the foundation to be hacked.
The attackers also use social engineering (mostly on social media) to exploit the naivety of the user and his good intention to derive more information that is less openly.
4. Delivery stage
During the delivery phase, the attacker will discuss access to a situation through which he can exploit the security vulnerability he has identified, or it is believed that it is likely to exist, and the examples include, trying to access the services of the organization via the Internet, send an email containing a link to a harmful or attached website that containsHarmful software instructions, enter the USB stick in the devices, or create a false web site in the hope that the user will visit and the penetration will occur.
5. The phase of penetration
The damage to the work depends on the nature of the weakness and the method of exploitation, as the hackers may be allowed to make changes that affect the system work, access to the online accounts and achieve full control of the computer, tablet or smartphone for the user after doing this, sometimes the attacker can pretend to beThe victim and the use of legitimate access rights to access other systems and information.
6. The influence stage
The attacker may seek to explore electronic systems, expand their access, and create a constant presence, a process sometimes called "integration", usually guarantees the seizure of the user's account, through administrative access to only one system.