CYBERATTACKERS: AN INFOGRAPHIC GUIDE

Sudarshan S
3 min readMar 8, 2022

--

Hey everyone, after a long time writing about “Networking”, I came up with a new interesting topic related to “Cybersecurity”. Cyberattacks are the reason why we need a cybersecurity. So, in this blog we’ll be discussing about Cyber attacks and cyber attackers. Let’s hop into the topic!

Attackers are a group of people or individuals who attempt to exploit vulnerability to gain personal or financial data. Now, we can classify the attackers into different categories based on how they exploit and what is their motive.

Types of Attackers

Amateurs

The term “script kiddies” refers to amateur or inexperienced hackers who use existing tools or techniques on the internet to launch attacks. While white hat attackers may use basic tools, their attacks can still have devastating consequences.

Hackers

They are group of attackers who break into computer systems or networks to gain access. Based on the intent of their break in, they can be classified into the following categories.

  • White hat hackers: They break into networks or systems to identify the vulnerabilities that are present in order to improve the security. These break-in are done with prior permission from the organization or owner and the results are reported back to them.
  • Grey hat hackers: They may set out to find vulnerabilities in a system, but they will report to owners only if doing so coincides with their agenda. Or they might even publish about the vulnerabilities on the internet so that other attackers could exploit it.
  • Black hat hackers: They take advantage of the vulnerabilities for illegal, personal or political purposes.

Organized Hackers

These attackers include organizations of cyber criminals, hacktivists, terrorists and state-sponsored hackers. They are usually highly organized, and may even provide cybercrime as a service to other criminals. State-sponsored attackers gather intelligence or commit damages to other systems on behalf of their government. They are usually highly trained and well-funded and their attacks are focused on specific goals that are beneficial to their government.

Internal and External Threats

Cyberattacks may originate from within an organization as well as outside the organization.

Internal threats

The following activities of employees in an organization could lead to a threat. Employees can be accidentally or intentionally:

  • mishandle confidential data
  • facilitate outside attacks by connecting infected USB media into the organization’s computer systems
  • invite malware onto the organization’s network by clicking on malicious emails or links

External threats

Attackers outside of the organization can:

  • exploit vulnerabilities in the network or system
  • gain unauthorized access to computing devices
  • use social engineering to gain unauthorized access to organizational data

We can conclude that profile of a cyber attacker varies depending on their goals, motivations and capabilities. At the extreme, the attackers can launch cyber attacks launch attacks against nations and states, compromising their computer systems and networks.

“Buy me a coffee” is a global platform where millions of people support creators and artists, financially.

--

--

Sudarshan S
Sudarshan S

Written by Sudarshan S

Tech enthusiast | Developer | Machine learning | Data science | Cybersecurity

No responses yet