eBooks/eGuides

State & Local Government Cybersecurity

Issue link: https://insights.oneneck.com/i/1290656

Contents of this Issue

Navigation

Page 2 of 10

The Threat Landscape Cyber-a acks con nue to evolve in scope and sophis ca on – it's much larger than hacking and data breaches. Research firm Gartner forsees the worldwide informa on security market is forecast to reach $170.4 billion in 2022. According to IBM, the average cost of a data breach is $3.86 million as of 2020. While scale and scope vary, a acks fall into one of the following five categories. 1. Network and Applica on Layer A acks Applica on layer a acks are the hardest to defend against, because this is the layer that is most exposed. These a acks result in a suspension of internet- connected server and network resources. Exploit kits, readily available on the black market, make these a acks easy to launch and difficult for companies to resolve. There are many different methods — here a just a few: Denial of service (DDoS) — This a ack targets either the applica on layer or the network layer where traffic floods the network to prevent authorized users from accessing informa on or services. Network level: Malicious packets are sent over many different network protocols to clog the pipes to consume the bandwidth and prevent access to the target. Applica on level: Also known as an HTTP flood, consumes a Web server's CPU and RAM to deny legi mate clients from accessing the server. Brute Force — Passwords, session iden fiers, directories and credit cards are deciphered through trial and error to determine an unknown value by using an automated process. This a ack underlines the importance of using complicated passwords and two-factor authen ca on. Secure Socket Layer (SSL) A acks — A acks with names like Lucky 13, RC4 Cipher, Heartbleed, POODLE, Shellshock and FREAK work to decrypt protected browser cookies and encrypted SSL communica ons. 02 3 oneneck.com

Articles in this issue

Links on this page

Archives of this issue

view archives of eBooks/eGuides - State & Local Government Cybersecurity