A Brief Note on Threats

A minor or major threat can harm a person or a group. It is necessary to identify threats and be up-to-date with how threats can be contained.

A threat is something that poses harm to a person, a thing, or an organisation. The reasons for threats can be many, depending on the person or thing which is threatened and the person or something which is being threatened. If a threat remains unheeded or unattended, it may harm the particular person or thing being threatened. Depending on the way threats are carried out and the harms they pose, threats can be categorised into types and several intensities. Some may have short-term effects, and some may have long-term consequences. 

Types of threats

There are 4 types of threats related to network systems:

  • Unstructured threats

The unstructured threats are unfocused attacks on one or more network systems. They are not performed by professionals, but by amateurs who have limited knowledge or are in their developing phase. The person who launches such attacks is often known as script kiddy, as he lacks much knowledge about the system and how it works. The attackers don’t have any information about the computers and the systems they attack. It is a random act with or without any intention of accumulating or stealing data. 

Unstructured threats are often inconclusive as they do not help establish malicious intent. Viruses, worms, and Trojan horses could be possible reasons a system comes under unstructured attacks. This happens when we click on some unreliable sites. These attacks involve a code that reproduces and multiplies and mails a copy to everyone on the person’s list. It can create problems for many people to whom the emails are sent. 

  • Structured threats

Structured attacks are planned, focused threats usually performed by highly-skilled attackers with malicious intent. The attacker creates scripts that attack and compromise systems. Structured attacks can target political parties, governments, ethnic communities, minorities, etc. 

  • Internal threats

These threats are by people who are a part of the organisation that has been attacked. For instance, an employee could manipulate a system to steal data for personal benefit. Employees, former employees, and associates with access to confidential company information could be suspected internal attackers and might attack their company’s systems with the intention to cause loss and damage. 

  • External Threats

Attackers using this kind of attack could be monitoring a system or an organisation for months to extract information or plan an elaborate series of attacks that could pose a risk to an individual, organisation, and even a nation’s security. 

The three major classes of threats

  • Denial of Server threats

Their purpose is to make a device so busy that it can’t do what it should ideally do. A DoS activity hampers the ability of a device to function smoothly, creating problems. The target can easily locate the method and the origin of the attack. The attacker takes control of botnets and hampers their activity. 

  • Social Engineering threat

Social methods are used for the extraction of the required information by the attacker. A common example of social engineering is phishing. The email generated looks like from a reliable and renowned source. But the truth is, it is sent by a person or an organisation with malicious intent. 

  • Malware

Malware is malicious software. The methods of attack used by the attacking organisation are viruses, worms, spyware, Trojans, spam, and adware. One can use alarms to get notified if this malware attacks one’s system. You can use antivirus programs in your network system to safeguard your PC from this malware. They are used by large organisations to protect their data and important information. 

Conclusion

With the advent of technology, many companies are under constant cyberattacks. These can be targeted at a person, a group, or data systems. While some attacks are random, others are meticulously planned with malicious intent, sometimes over months or years. Identifying threats and amping up cybersecurity protocols can help tackle threats and protect company data and reputation.

faq

Frequently asked questions

Get answers to the most common queries related to the Railway Examination Preparation.

What is a threat?

Ans : A threat is a risk posed to a network system due to any attacker or an organisation with mali...Read full

What are the examples of threats in SWOT?

Ans : There can be many threats posed to SWOT. Some of the most common examples of threat...Read full

How can threats be classified?

Ans : Threats can be of two types. They can be major threats and minor threats. Minor threats damag...Read full

What can be done to prevent threats?

Ans : Antivirus software can be used to detect and get rid of malware. Threats can be detected if y...Read full