What is a cyber attack?
Cyber Attacks (also known as Cyber Attacks) refer to any type of offensive action targeting computer information systems, infrastructure, computer networks or personal computer equipment.
For computers and computer networks, destroying, exposing, modifying, causing software or services to lose functionality, stealing or accessing data from any computer without authorization will be considered an attack in computers and computer networks.
Common cyber attack methods
. Password intrusion: Criminals illegally log in to your account and then carry out attack activities.
. Trojan horse : The bad guy puts a "bait" and waits for you to download, install, and run, and then your account will have no secrets.
.WWW Deception: You want to visit website A. After the bad guy tampered with it, you actually visited the bad guy's website B, and then you can do whatever you want to cheat you.
. Email Attack : Criminals keep sending spam to your email address, paralyzing the system, and then they can do bad things.
5. Node Attack: After criminals attack and control your computer, they attack and control other important websites. After investigation, they usually only find out where you are, and your computer becomes commonly known as broiler and zombie machine.
6. Network monitoring: In the same network segment, criminals can receive all the transmitted information after turning on a certain working mode.
7. Hacker software: Criminals can illegally obtain the ultimate user-level rights of the user's computer and give full control over it. In addition to being able to operate files, they can also perform desktop capture pictures, obtain passwords, etc.
8. Security vulnerabilities: Many systems of have security vulnerabilities (bugs). For example, the Windows operating system we often use often needs to be patched to make up for the security vulnerabilities that occur. If these vulnerabilities are not repaired, they will be exploited by bad people and obtain your computer permissions and even the information data in the computer.
9. Port scan : Bad guys can know whether the port of your computer is activated, what services the host provides, whether the service is provided contains certain defects, etc. It is often the prelude to launching further attacks.
At first glance, cyber attack methods are dazzling and unpredictable. In fact, it is through a series of technical operations to achieve the purpose of control, stealing and destruction.
How should we prevent cyber attacks
For individuals -
. The password is no less than 8 digits and should contain numbers, letters, symbols, and no complete vocabulary, username, name, birthday, etc.
. Install antivirus software and check and kill regularly.
. Apply system patches in time.
. Install software downloaded by regular channels, and software of unknown origin will not be installed.
5. Do not browse irregular websites.
For units and enterprises -
. Strengthen internal security awareness training, strengthen network security prevention awareness, and keep a good network security barrier from the source.
. Adhere to basic prevention, security risk assessment and regular inspections, formulate network security systems and emergency plans, and improve emergency response capabilities.
. Strengthen the control of servers, network security equipment , computer room and other facilities, timely and accurately fill in the new equipment, maintenance and change configuration record tables, and regularly modify the server password.
. Optimize network security policies, equip professional firewalls, perform operation monitoring, traffic monitoring and threat monitoring of the internal network, and generate network security logs.
5. Regularly detect software, computer firewall and antivirus software, update and upgrade in a timely manner, fix existing vulnerabilities, backup databases in a timely manner, and strengthen computer external equipment management.
Source: Netcom Guangxi WeChat official account