Trends
How to prepare for cyber attacks? Some tips you need to know
Cyber attacks utilise complex tactics for control, theft, and disruption, posing significant challenges for effective prevention.

Headline
Cyber attacks utilise complex tactics for control, theft, and disruption, posing significant challenges for effective prevention.
Context
Cyber attack is any type of offensive action against a computer information system, infrastructure, computer network, or personal computing device. For computers and computer networks, damaging, exposing, modifying, disabling software or services, and stealing or accessing data from any computer without authorisation are all considered to be attacks on computers and computer networks. Active attacks result in the tampering of certain data streams and the creation of false data streams. Such attacks can be categorised as tampering, falsification of message data and termination.
Evidence
Pending intelligence enrichment.
Analysis
Tampering with a message is when some part of a legitimate message is altered, or removed, the message is delayed or the order is changed, usually to produce an unauthorised effect. For example, modifying the data in a transmission message by changing “Allow A to perform an operation” to “Allow B to perform an operation”. Forgery means that an entity (person or system) sends a data message containing the identity information of other entities, pretending to be other entities, so as to obtain the rights and privileges of some legitimate users in a deceptive way. Denial of Service is often referred to as DoS (denial of service), which leads to the unconditional interruption of the normal use or management of communication equipment. Usually, the entire network is disrupted to achieve the purpose of reducing performance and terminal services. This attack may also have a specific goal, such as to a particular destination (such as security audit services) where all packets are blocked. Also read: 4 ways to prevent ransomware attacks
Key Points
- Cyber attacks can take various forms, such as tampering with messages, forgery, denial of service, eavesdropping, and traffic analysis, targeting both active and passive attacks on computer systems and networks.
- It is crucial to understand how cyber attacks work and the various methods used by attackers in order to prevent and protect against potential security breaches and data theft.
- Implementing security measures such as improving security awareness, using firewall software, anti-virus tools, and setting up proxy servers can help enhance cybersecurity defences and mitigate the risks posed by cyber attacks.
Actions
Pending intelligence enrichment.





