Common characteristics of cyber attacks revealed in ten new case studies

Print

LONDON, UK: In series of case studies just published, global information security consultancy, MWR InfoSecurity, has revealed the characteristics of ten different cyber-attacks. Each paper, produced with the support of the UK’s Centre for the Protection of National Infrastructure, aims to help organisations understand how these attacks are conducted. Describing real-world events, they also help show the potential impact of attacks and the failures that lead to compromise.

 

The papers include:

Application Layer Attack

Brute Force Attack

DDoS Attack

Network Protocol Attack

Known Vulnerability Exploitation

Zero Day Exploitation

Phishing for Credentials

Phishing with Malware

Rogue Update Attack

Watering Hole Attack

Dr David Chismon, Senior Security Researcher at MWR InfoSecurity said, ““While all attacks will be tailored to the organisation being targeted, there will be similarities in how they’re orchestrated. Understanding common attack methodologies is key to better protecting the network. I hope users will find these case studies insightful, and will use the contents to help illustrate the reality of the threat and the need for investment in security measures perhaps even including them in training materials.”