Cyber security Report 2022

   

Added on  2022-09-17

12 Pages2352 Words20 Views
Cyber Security
Cyber security Report 2022_1
CYBERSECURITY 1
Table of Contents
Introduction.....................................................................................................2
Spyware walkthrough.....................................................................................2
What is spyware attack?..............................................................................2
How does spyware attack work?..................................................................4
Real word spyware incident............................................................................6
Conclusion.......................................................................................................8
References.......................................................................................................9
Cyber security Report 2022_2
CYBERSECURITY 2
Introduction
The term spyware is defined as malware attack which infiltrates the
computer device and networks of the consumers. Such kind of malware is
mainly designed and implemented in order to gain access and damage the
computer networks and devices used by the consumers. It is one of the
common security attacks that have the ability to obtain data from
consumers and organizations without taking their permission (Marczak,
Scott-Railton, & McKune, 2015). The key goal of this paper is to explore the
spyware attack and evaluate a real-life example based on the spyware
attack. It is observed that spyware utilizes internet connections in order to
send traffic signals and viruses to the main server and obtain reliable data
of the consumers by blocking communication channels and networks. This
report mainly focuses on the major two sections, for example, spyware
walkthrough and a real-world example of spyware attack.
Spyware walkthrough
What is spyware attack?
Spyware is a kind of malware software which is able to obtain data of
the consumers without their knowledge. It is observed that spyware is
mainly divided into major four parts including adware, tracking cookies,
Trojans and system monitors. Such kind of process is mainly utilized by the
criminals for performing signals and networks to the main servers and
transfers the unwanted signals from one computer to others using internet
connections.
A recent study examined that spyware is a common form of malware
attack that has the potential to gather personal information of the
consumers including, log in details, financial data, profiles and so on
(Abualola, Alhawai, Kadadha, Otrok, & Mourad, 2016). With the spyware
Cyber security Report 2022_3
CYBERSECURITY 3
signals, the hackers are able to control and handle the computing devices
and systems used by the companies and produce unauthorized changes in
the computing networks. The signs of a spyware attack involve unwanted
behavior and degradation of system effectiveness by which the sensitive
data of consumers can be collected in less time.
The below figure 1 shows the fundamental concept of spyware attack
which includes target and legitimate applications. The process described in
the below diagram can help for understanding the key idea behind spyware
attack.
Figure 1: Spyware
(Source: Kwon, Na, & Park, 2014)
The below figure 2 shows the various types of spyware attack occur in
the area of computing networks and devices. It is observed that there are
major four types of spyware attack including adware, keyboard loggers,
mobile spyware and Trojans.
Figure 2: Types of Spyware
Legitimate app
Target
Legitimate app
trojanized with
FinFisher
Types of
Spyware
Cyber security Report 2022_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Ransomware Attack and its Impact
|13
|2416
|74

Malware Attack and Malware Analysis: A Research
|9
|2293
|146

Malware attack and Malware Analysis: A Research
|13
|933
|239

Assignment on Risks and Risk Management
|11
|781
|13

Cyber Security WannCry Attack Case Study 2022
|11
|2314
|16

Ransomware & Malware
|5
|581
|276