1. Types of cyber attacks
1.1. Using malicious software (malware) –to hack into computer networks and illegally access information;
1.2. Phishing. To gain sensitive information such as usernames, passwords, credit card and other personal details, by disguising as a trustworthy entity in an electronic communication
1.2.1. Cybercriminals can target individuals and ways of carrying out various financial transactions
1.2.1.1. Protecting yourself from these attack
1.2.1.1.1. 1.Ensure that your computer is defended against technological threats.
1.2.1.1.2. 2. Create strong passwords that are used effectively and changed regularly.
1.2.1.1.3. 3. Be smart about how and where you surf.
1.2.1.1.4. 4. Never be complacent about maintaining your privacy online.
1.3. Social engineering –Pretending to be someone on the Internet and getting personal information
1.4. Computer espionage –spying on private information
2. Possible targets
2.1. A country’s computer system controlling its criticalinfrastructures
2.2. A person’s personal computer
2.3. A government’s website
2.4. An educational institution’s server
3. Managing cyberattacks
3.1. Singapore encountered a series of cyber attacks, including the hacking of government websites, such as the PMO and the Istana.
3.1.1. Singapore takes a strong stance against cyber attacks and strengthen its cyber-security systems, and
3.1.1.1. Cyber Security Agency (CSA) formed tomanage the national cyber security strategy, education and outreach, and industry development.
4. Motives
4.1. Target government networks to gain secret information concerning a country or dealings between countries.
4.1.1. E.g. China's military hacking USA
4.2. Hacktivists hack into networks for a political or social agenda; they gain access to secret government documents and publish them to expose the information
4.2.1. Wikileaks realeasing secret records of American military
4.3. Cybercriminals can use electronic ways to steal information of corporations or its customers.
4.3.1. Yahoo security breach
4.4. Cybercriminals target individuals too. Create malware to steal our information that we put online.
4.4.1. Vriuses/malware