-
Via a phishing email that tricks the user into following a link to a malicious website or opening an attachment that executes malicious code.
-
Through security holes in browser plugins.
-
Via other infected software.
-
Data theft. Sensitive company data, such as financial documents, can be copied or transferred to an attacker’s server.
-
Shutdown. An attacker can shut down one or several machines, or even bring down a company’s network.
-
Reboot. Infected computers may suddenly and repeatedly shutdown and reboot, which can disrupt normal business operations.
-
Distributed denial of service. DDoS attacks overwhelm server or networks by flooding them with internet traffic. Once a botnet is established, an attacker can instruct each bot to send a request to the targeted IP address, creating a jam of requests for the targeted server. The result is like traffic clogging a highway – legitimate traffic to the attacked IP address is denied access. This type of attack can be used take a website down
This Article Was Written & published by Meena R, Senior Manager - IT, at Luminis Consulting Services Pvt. Ltd, India.
Over the past 16 years, Meena has built a following of IT professionals, particularly in Cybersecurity, Cisco Technologies, and Networking...
She is so obsessed with Cybersecurity domain that she is going out of her way and sharing hugely valuable posts and writings about Cybersecurity on website, and social media platforms.
34,000+ professionals are following her on Facebook and mesmerized by the quality of content of her posts on Facebook.
If you haven't yet been touched by her enthusiastic work of sharing quality info about Cybersecurity, then you can follow her on Facebook:
Click Here to follow her: Cybersecurity PRISM