eBooks/eGuides

State & Local Government Cybersecurity

Issue link: https://insights.oneneck.com/i/1290656

Contents of this Issue

Navigation

Page 3 of 10

2. Social Engineering Social engineering relies on human emo on and error rather than technical vulnerabili es. A user is sent a fake email or other communica on that tricks them into submi ng passwords or personal informa on. As the source appears to be legi mate, this a ack is hard to detect. Phishing is a prevalent form of social engineering; users may be tricked into submi ng sensi ve informa on, by pretending to need to verify bank data, threatening legal consequences, or offering a me-sensi ve offer. This very useful technique may place cri cal enterprise informa on into malicious hands. 3. Advanced Persistent Threats (APT) APT involves any breach where the a acker infiltrates the network and remains undetected for as long as it takes to escalate privileges and steal sensi ve data. Connec ons may ini ally be made through phishing or social engineering schemes to create a backdoor access, which allows hackers the ability to stay inside the network for a long me. It can be weeks or months, or even years, before the breach is detected, and some mes is only discovered when conduc ng an audit. 4. Cybercrime Syndicates Organized cybercrime is on the rise. According to a McAfee report, there are an es mated 20 to 30 cybercrime syndicates with na on-state level capabili es opera ng in Russia alone. These syndicates offer hacking-as-a-service, such as the widespread use of malicious so ware to steal credit card informa on and sell it on the black market. Kits available on the dark web allow hackers with even low-level skills to launch a ransomware a ack or other malware. 5. Major Data Breaches A major data breach may have employed a number of tac cs used to infiltrate a network and extract vast amounts of sensi ve data with the intent to expose, disrupt opera ons or bring down an en re company. 4 oneneck.com

Articles in this issue

Links on this page

Archives of this issue

view archives of eBooks/eGuides - State & Local Government Cybersecurity