Critical Infrastructure more vulnerable to cyber-attacks: Government Sectors especially Critical Infrastructures including transportation, gas, electricity, and energy are one of the most sensitive areas that are affected by the cyber-attacks. Critical Infrastructure …show more content…
All the economy, progress, development, and overall nations’ growth depends on how powerful and strong the government is. Most of the cyber-attacks are carried out by other countries in order to paralyze the targeted nation for some amount of time which will affect their day to day businesses affecting their economy.
Advanced Persistent Threats (APT): Advanced Persistent Threat which is also defines as APT goes back to start of this paper as attacks are becoming more and more sophisticated. The attack is carried on to attack government financial corporations and individuals with the motivation to paralyze and restrict the targeted institution from gaining future access and control to their information and data. Social Engineering, scams, phishing and malware are all the sources to gain access to the confidential information. As internet being more and more common way for daily activities, cyber-attacks are also becoming more and more sophisticated to attack the target audience. These attacks or threats are advanced because the operator has complex attacks and malicious code to compromise the intended …show more content…
It starts from monitoring organization’s network, their network traffic, gaining access to confidential information and exfiltrating that information (Lord, 2016).
Microsoft and Adobe Flash APT attack: Recent Microsoft and Adobe Flash vulnerability attacks that was carried out by Russian group was a zero day attacks on Microsoft Kernel and Adobe Flash to gain access to private and confidential data off the browser. According to Microsoft, the win32k kernel component targeted in these attacks had been recently updated with new exploit mitigations that should prevent the exploits from working. They also assured that the backdoor DLL used in these attacks can be blocked via strict Code Integrity policies, which Microsoft’s Edge browser does natively. (Mimoso, 2016).
Zero-day Attacks: Zero day attacks happen when a hacker or an attacker attacks the system or breach or compromise the data, and the developer or owner of that system doesn’t have the opportunity to create a patch or fix that attack. In other words, the owner or the developer is unaware of this attack. It happens because of an unknown vulnerability and the attacker spots that vulnerability and tries to gain access to that system by breaking in that