top of page

How do Cyber Attacks Work?

Writer's picture: Megan HaybyrneMegan Haybyrne

Cyberattacks can differ in many ways such as type of attack, size and results.

However, there is a basic structure that cyber criminals follow when carrying out cybercrimes. The steps used are listed below.

  • Survey, or alternatively called Reconnaissance is the starting point for most attacks. It consists of a series of actions to investigate and analyse available information about the target in order to identify potential vulnerabilities.

  • Delivery - getting to the point in a system where you have an initial foothold, usually in the form of some malware or a backdoor into a system. In other words, you have gotten past the defenses and are within the corporate environment. Think of it like a burglar.

  • Breach - exploiting the vulnerability/vulnerabilities to gain some form of unauthorised access.

  • Affect - carrying out activities within a system that achieve the attacker’s goal.

  • The goal, or reward may be monetary or destructive, depending on the motivation of the attack.




Comments


Testimonials

Ibec - For Irish Business

"Ibec engaged with VISO two years ago.  While our primary objective was to improve our information security posture, we were also looking for a long-term partner with expertise and knowledge of the continually evolving cyber landscape. The professionals at VISO are a pleasure to work with and their team is always on hand when we need them."

2-3 Prospect Road, Glasnevin, Dublin 9, D09 K5V2

Telephone: Ireland +353 1 9121331  U.K.  +44 20 30260575

 

We simplify Cyber Security 

Privacy Policy

  • Twitter
  • Facebook
  • LinkedIn

© 2022 proudly created by The Rainbow Vault

ISO 27001 Cyber Security standard_Awarded to VISO Cyber Security
cyberessentials_certification- awarded to VISO Cyber Security
bottom of page