An important part of protecting your member data and cybersecurity risk is by understanding how your data and your information technology systems can be vulnerable.
Hacks can occur in unexpected ways, and the cyber world has its own terminology for each one. You may have heard of “phishing,” but how many of these other, newer terms are you familiar with? More importantly, is your data and IT system secure from all of them?
According to Chris Hauser, second vice president for Travelers Investigative Services's Cyber Program, there are a few essential terms describing how data breaches can occur and how confidential information can be obtained that every business should know.
Let us know in the comment section if there are other terms you've come across that you'd like to share with readers.
1. Botnets
Botnets are large networks of infected computers (sometimes called bots) under the control of a computer hacker. Hackers can use the distributed computing capabilities of botnets to send millions of spam emails, launch distributed denial-of-service attacks, conduct widespread theft of banking credentials, enable the mass installation of ransomware, and many other activities.
2. Exploits
Malware relies on flaws in computer software and hardware to function.
Sometimes a programming mistake can be exploited to gain escalated privileges, install additional malware or instruct a computer to perform unintended commands. Malicious code that takes advantage of these weaknesses are often termed exploits.
3. Distributed denial-of-service
In these malicious attacks, hackers interrupt a website or computer network to prevent a company or its customers from accessing it.
According to Techopedia, a DDoS is a type of computer attack that uses a number of hosts to overwhelm a server, causing a website to experience a complete system crash. This type of denial-of-service attack is perpetrated by hackers to target large-scale, far-reaching and popular websites in an effort to disable them, either temporarily or permanently. This is often done by bombarding the targeted server with information requests, which disables the main system and prevents it from operating. This leaves the site's users unable to access the targeted website.
DDoS differs from a denial-of-service attack in that it uses several hosts to bombard a server, whereas in a DoS attack, a single host is used.
4. Hacktivist
Hacktivists wreak havoc on a company's or organization's website or systems to promote a social or political cause.
The best known hacktivist group is Anonymous, described by USA Today as “an amorphous group of hacker activists who have inserted themselves into several conflicts worldwide. There is no one Anonymous group but rather several individuals and groups that make statements and take action under the broad umbrella of the name.” Anonymous has made claims that will destroy ISIS through its hacking activities.
5. Internal threats
Employees can be the weakest link in an organization's defenses. Costly errors and intentional malicious activity can lead to serious consequences, including the loss of sensitive data, financial theft and unauthorized access to network resources.
The best way to prevent cyber incidents by employees is to ensure that they are trained to be continually aware of the seriousness of protecting the company's data.
6. Network reconnaissance
Just as a common thief canvasses a neighborhood looking for vulnerable homes, a computer hacker often uses automated tools to scan large blocks of the Internet looking for systems and software to exploit.
After finding targets of opportunity, the hacker's next step is to identify the ones that may contain data or services that can be monetized.
7. Malware
Short for malicious software, the term malware describes the spectrum of tools used nefariously by cybercriminals to hack computer networks including exploitation kits, computer viruses, network worms and remote access trojans.
According to Technopedia, some forms of malware spy on user Internet traffic. Examples include spyware and adware. Spyware monitors a user's location and if enabled, it can capture sensitive information, for example, credit card numbers, promoting identity theft. Adware also acquires user information, which is shared with advertisers and then integrated with unwanted, triggered pop-up ads.
8. Ransomware
Modern ransomware attacks often use advanced encryption techniques to render a victim's data useless until the hacker's demands are met or a sum of money is paid.
Additional terms for ransomware include crypto-virus, crypto-Trojan or crypto-worm.
A well-known ransomware that surfaced on the Internet in 2013 is called CryptoLocker.
9. Social engineering
Not all attacks are technically sophisticated. Social engineering involves classic deception to trick individuals into parting with their data and funds.
In some instances, employees are misled into making a payment to a fraudster posing as a client or vendor through email, fax or even over the phone. Generally, the person emailing or calling has just enough information to sound legitimate.
Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.
Your access to unlimited CUTimes.com content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking credit union news and analysis, on-site and via our newsletters and custom alerts
- Weekly Shared Accounts podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical coverage of the commercial real estate and financial advisory markets on our other ALM sites, GlobeSt.com and ThinkAdvisor.com
Already have an account? Sign In Now
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.