To appreciate how crucial cybersecurity is, it is important to understand the threats that cybersecurity must to protect against. Below a look at some of the more common types of cyberattacks found worldwide and in Namibia.
Malware
Malware is an umbrella term for any malicious software or code intentionally designed to harm computers, servers or networks. Types of malware include computer viruses, worms, Trojan horses, spyware and ransomware. Although malware can be installed by a hacker who has gained access to the system, most commonly malware is installed unwittingly by an individual during a phishing attack. The installed malware may be used to steal, encrypt, and delete sensitive data; alter or hijack core computing functions; or monitor the user's computer activities. Regardless of the reason or method used to install the malware, all types of malware are designed to exploit the system at the expense of the user and to the benefit of the hacker.
Phishing
Phishing is a type of cyberattack in which a scammer impersonates a legitimate business or individual in order to trick them into disclosing sensitive information or install malware. Scammers communicate in a variety of ways, including email, text messaging, and phone calls. The purpose of phishing is to gain access to sensitive accounts and information. Since 2020, phishing has consistently ranked among the top five types of cyberattacks.
Distributed Denial of Service (DDoS) Attacks
A DDoS attack aims to crash a server, website, or network by flooding it with Internet traffic. To create the flood, DDoS attacks utilize multiple computer systems that have been compromised by malware attacks. DDoS attacks are motivated by a variety of reasons, including hacktivists making a social or political statement, unscrupulous companies attempting to sabotage a competitor, and a disgruntled employee or unhappy customer seeking retribution by shutting down the company's website. DDoS attacks target a wide range of industries and business sizes around the world and are frequently combined with ransomware attacks.