Page 76 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 76

1. Botnets:

            The Botnet attacks are also known as ‘’Thingbot Attacks’’. A botnet is a link of systems which targets
            networks of connected computers and other smart devices with the intention of infecting them, taking
            control over them and distributing malware. The cybercriminal is capable of grasping control of the entire
            network without the user becoming aware of it.

            Botnets can cause various damaging effects to the business networks together with the distribution of
            data,  sending  inappropriate  spam  messages,  data,  and  identity  theft.  Because  of  botnets,  the  IoT
            networks are at great risk because botnets can easily access and control not only laptops and computers
            but also every device which is connected to the network, creating endless chances to for cybercrimes.



            2. Man-In-The-Middle Concept:


            The man-in-the-middle concept happens when the cybercriminals hack an entire network with the goal
            of interrupting communications among two systems.  These concepts give hackers and  attackers the
            chance to fool users who might think they are having communication.


            In other words, it means that the hacker will secretly capture and spreads messages to other parties while
            they assume that they are communicating directly with each other.


            These kinds of attacks are extremely unsafe and serious in the IoT era because of the nature of things
            being  hacked  or  stolen.  For  instance,  these  devices  can  be  anything  from  being  industrial  tools,
            machinery, vehicles to harmless connected things like smart TVs.



            3. Data and Identity Theft:

            The data and identity theft of useful data is another leading cybercrime in the IoT era. This can be of
            business data. However, hackers or attackers seek to steal the identity details of an individual for financial
            fraud and within IoT, and it is even easier.


            The extreme data theft or hacker attacks like DNS hijacking could become more destructive with IoT as
            the access to one device could be a key to enter numerous connected devices.













                                 76
   71   72   73   74   75   76   77   78   79   80   81