Cyberattacks present serious security challenges to private organizations,individuals, and governments. The increasing global electronicinterconnection has contributed immensely towards increasing thesusceptibility to cyber attacks (Gandhiet al., 2011).In contemporary organizational and government settings, the workforcecontinues to spread remotely, therefore presenting loopholes forpossible cyber attacks. As governments and organizations move awayfrom the traditional work settings, many of them lack qualified ITpersonnel to design and monitor the security of their sensitiveinstallations (Khorshedet al., 2011). Additionally, providing secure IT infrastructure leads to enormousfinancial pressure for organizations. These factors present hackerswith the right environment to infringe the privacy of privateorganizations and government agencies with the aim of leakinginformation, stealing or disabling the interoperability of ITinstallations (Zhanet.al, 2013).
Currently,hackers can access complex networks that did not exist a decade ago.Cyber attacks have evolved just as much as the technology itself. Asignificant proportion of cyber attacks target the user. Therefore,the users, mostly individuals, are at a higher risk of sufferingcyber attacks (Uma& Padmavathi, 2013).Today, one of the emerging issues is the problem presented by blendedthreats. Blended threats are the combinations of codes, worms, andother malicious digital content with a disruptive aim. Hackers usemultiple techniques to achieve widespread damage (Zhanet.al, 2013).Cyber attackers are becoming skilled in areas such as creatingduplicate websites and software. User awareness can hardly keep upwith the evolving nature of cyberattacks because of many unsuspectingusers (Gandhiet al., 2011).This research will highlight how hackers execute their attacks aswell as ways of developing formidable firewalls to ensure maximumsecurity.
Gandhi,R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., & Laplante, P.(2011). Dimensions of cyber-attacks: Cultural, social, economic, andpolitical. IEEETechnology and Society Magazine, 30(1),28-38.
Zhan,Z., Xu, M., & Xu, S. (2013). Characterizing honeypot-capturedcyber attacks: Statistical framework and case study. IEEETransactions on Information Forensics and Security, 8(11),1775-1789.
Uma,M., & Padmavathi, G. (2013). A Survey on Various Cyber Attacksand their Classification. IJNetwork Security, 15(5),390-396.
Khorshed,M. T., Ali, A. S., & Wasimi, S. A. (2011, December). Trust issuesthat create threats for cyber attacks in cloud computing. In Paralleland Distributed Systems (ICPADS), 2011 IEEE 17th InternationalConference on(pp.900-905). IEEE.