Information Security Blog

Main Categories Of Cyber Attack And How To Counter Them

Cyber threats are considered to be the top agenda worldwide as breaches that are high profile and advanced have raised concerns that they might endanger the world economy.

90% firms not equipped to counter cyber threats:-

A global risks report published in 2016 by the WEF (world economic forum) released a warning that over 90% of the companies all across the globe have admitted that they are not fully loaded to protect their networks from cyber threats.

Security System Design

Estimated cost worldwide:-

According to estimated costs every year cyber-crimes cost over $ 425 billion to the world economy. 2016 saw over 5000 company’s network breached by the cyber criminals and this number is likely to rise in the ongoing year.

Two main categories:-

Basically, cyber-attacks can be divided into two categories

  1. Breach in data
  2. Sabotage

Breach in data:-

Personal data, business secrets, client and biding info, intellectual property and other data are luring things for breaching networks. Cyber security system design must be well maintained to counter these attacks.


Denial of services, sweeping away of the data, use of bogus messages to flood the web and taking control over the whole defense mechanism, disabling of whole infrastructure fall in the category of sabotage.

Set of precautions:-

Precautions that need to be taken to counter these treats


Firewall is the most common and well established solution to check on to these breaches. Firewalls allow putting an end to the IP spoofing. The denial of DNS queries from outside the figures allocated prevents the exploitation of resolver name as open reflector in the DDoS attacks.

Intruder detection:-

It helps in the blockage of unauthorized users through the rules of DNS reporting. It can also be used in the counting or reporting of domain responses. These reports contain records with DNS queries using TCP, short TTLs and large DNS responses etc.

Intruder detector mechanism is used in the firewalls specifically to deny or permit the rules for many of these checks.

Analyzing traffic:-

This system is helpful in the identification of malware or malicious traffic through passive analysis of traffic. The DNS traffic between the resolver and the client need to be captured and filtered and saved to PCAP file. To find the suspicious specific activities that need to be investigated, scripts should be created to search the PCAP.

The need of a solid cyber security system design is the need of the time for any IT firm to secure its data log and info. Without which lot of damage can be done from financial losses to reputation loss.

Go Back