<ul><li>Computer</li><li>Networking</li><li>Virtualization</li><li>Cloud</li><li>Cyber-Security</li></ul>
Hello, I'm David!
I have been working in the IT department of SYSNETTECH Solutions for many years. I usually fix problems we encounter on computer networks. I am also developing guards in today's technological attack areas.
Let me briefly tell you what is a cyber attack and what are its types;
Malware is short for malicious software. Examples are worms, viruses, trojans. They are malicious software that infiltrates computer systems without their permission. They can render computers or networks inoperable, hide, replicate, or give attackers access and control the system remotely.
In this method, which is called phishing attacks, the attackers try to steal people's site information and credit card information by sending e-mails that are shown to people as if they came from reliable sources. The victims, who usually click on the links they send via e-mail, are directed to cloned sites and share the information they enter with the attackers.
These methods, whose English stands for Denial of Services and Distributed Denial of Services, are attacks to try to prevent some online services from working properly. Attackers send too many requests to a website or database and keep the system busy, which can cause systems to stop working. DDoS is done by doing these attacks from more than one computer.
In this type of cyber attack, the attackers hide between the victims and the web service they want to access and direct the victims to the service they want to access their networks. For example, they imitate a Wi-Fi network, and victims enter the attackers' Wi-Fi network instead of the Wi-Fi network they want to access. Attackers can see everything they do next and collect users' data.
Many databases today are designed to comply with SQL-written commands, and many websites that receive information from users send this data to SQL databases. Attackers take control of victims' databases using SQL vulnerabilities. For example, in a SQL injection attack, a hacker writes some SQL commands into a web form that requests name and address information; If the website and database are not programmed correctly, the database can try running these commands.
Cryptojacking is a special attack that involves someone else's computer doing the job of generating cryptocurrency for you. Attackers install malware on the victim's computer to perform the necessary calculations or run code they sometimes use maliciously in JavaScript running in the victim's browser.
It gets its name after a patch is released, from users accessing a small number of computers while downloading security updates. The vulnerabilities in the software have not been corrected yet, which provides attackers with opportunities. Techniques to exploit such vulnerabilities are now published or sold through Darkweb.
Since encryption is the most common mechanism we use when entering a system, password attacks are among the most common attacks. In a variant called Brute Force, a malicious technique is used to try and randomly try random passwords for password prediction. The easiest way to prevent this is to implement a self-locking account lockout policy after multiple attempts at a password.
In this type of attack, attackers infiltrate a network and listen secretly and listen to personal data such as credit card information, passwords, and conversations that users will send over that network. In the passive method, information is collected only by listening, but in the active method, the attackers collect information by asking questions to the users by looking like a friendly unit in the network.
Birthday attacks are done against mixed algorithms used to verify the integrity of a message, software, or digital signature. A message processed by a hash function generates fixed-length message digestion (MD) regardless of the length of the input message. This MD uniquely characterizes the message. The birthday attack refers to the possibility of finding two random messages that produce the same MD when processed by a hash function. If an attacker calculates the same MD for his message as his user, he can safely replace the user's message with him, and even if the receiver compares the MDs, he cannot detect the replacement.
You can follow me on my social networks;
1) Facebook
2) YouTube
3) Linkedin
4) Wikipedia
5) Microsoft MSDN
6) Microsoft Social
7) Microsoft Technet
8) Networking Business 1
9) Networking Business 2
10) Flickr
11) IMDB
12) Amazon
13) Cisco
14) Patreon
15) Telegram 1, Telegram 2
16) BuzzFeed
17) My WordPress Support Page
18) Blogger
19) My Adobe Page, and Project
20) My Mozilla Addon
I'm involved in the following OpenStack projects: Dashboard (Horizon),Compute Service (Nova),Networking (Neutron),Computable object storage (Storlets)