Internet
Fact-checked

At EasyTechJunkie, we're committed to delivering accurate, trustworthy information. Our expert-authored content is rigorously fact-checked and sourced from credible authorities. Discover how we uphold the highest standards in providing you with reliable knowledge.

Learn more...

What is a Cyberattack?

Malcolm Tatum
Malcolm Tatum
Malcolm Tatum
Malcolm Tatum

A cyberattack is an attempt to undermine or compromise the function of a computer-based system, or attempt to track the online movements of individuals without their permission. Attacks of this type may be undetectable to the end user or network administrator, or lead to such a total disruption of the network that none of the users can perform even the most rudimentary of tasks. Because of the increasing sophistication of these kinds of network attacks, the development of effective software defenses is an ongoing process.

It is important to understand that a cyberattack can be relatively innocuous and not cause any type of damage to equipment or systems. This is the case with the clandestine downloading of spyware onto a server or hard drive without the knowledge or consent of the owner of the equipment. With this type of cyberattack, the main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or server. While the ultimate goal is to capture and transmit information that will help the recipient achieve some sort of financial gain, the spyware runs quietly in the background and is highly unlikely to prevent any of the usual functions of the system from taking place.

A cyberattack may attempt to gain illicit access to files on a personal hard drive.
A cyberattack may attempt to gain illicit access to files on a personal hard drive.

However, a cyberattack can be malevolent in its intent. This is true with viruses that are designed to disable the functionality of a network or even a single computer that is connected to the Internet. In situations of this nature, the purpose is not to gather information without anyone noticing, but to create problems for anyone who uses the attacked network or computers connected with that network. The end result can be loss of time and revenue and possibly the disruption of the delivery of goods and services to customers of the company impacted by the attack. Many businesses today take steps to ensure network security is constantly being enhanced to prevent these types of malicious computer attacks.

To prevent a cyberattack  make sure to install high quality anti-virus software, and update it on a regular basis.
To prevent a cyberattack make sure to install high quality anti-virus software, and update it on a regular basis.

Attempts by cyberterrorists to interfere with the function of power grids and other means of delivering public services are also classified as cyberattacks. Because attacks of this kind can quickly cripple the infrastructure of a country, they are considered an ideal means of weakening a nation. A strategy utilizing a series of cyberattacks timed to simultaneously disrupt several different key systems can, in theory, render a nation unable to successfully overcome any of the attacks before a great deal of damage has taken place. Fortunately, many nations recognize the very real threat of cyberterrorism and take steps to protect government and public service systems from any type of Internet attack, as well as the manual introduction of software that could disrupt the systems.

Just as governments and corporations must be aware of the potential for a cyberattack to occur, individuals must also take steps to protect their home computers and related equipment from sustaining an attack. A basic preventive measure is to secure high quality anti-virus and anti-spyware software, and update it on a regular basis. End users should also make sure to scan and files or programs that are stored on a CDR or similar remote storage system before loading them onto a hard drive.

Malcolm Tatum
Malcolm Tatum

After many years in the teleconferencing industry, Michael decided to embrace his passion for trivia, research, and writing by becoming a full-time freelance writer. Since then, he has contributed articles to a variety of print and online publications, including EasyTechJunkie, and his work has also appeared in poetry collections, devotional anthologies, and several newspapers. Malcolm’s other interests include collecting vinyl records, minor league baseball, and cycling.

Learn more...
Malcolm Tatum
Malcolm Tatum

After many years in the teleconferencing industry, Michael decided to embrace his passion for trivia, research, and writing by becoming a full-time freelance writer. Since then, he has contributed articles to a variety of print and online publications, including EasyTechJunkie, and his work has also appeared in poetry collections, devotional anthologies, and several newspapers. Malcolm’s other interests include collecting vinyl records, minor league baseball, and cycling.

Learn more...

Discussion Comments

anon996244

To protect us, the consumers of internet should have "simple" options to choose from that make sense to those who do not know even basic internet code or whatever stuff. When they don't know, then they search to find out what it is and maybe those options should not have been available. Let the owners or inventors of internet and internet security be the only ones ale to change settings. SOme people change settings and they don't even know what that setting is and that can lead to I guess open channels for hackers or something? i don't know. Keep it simple.

anon275863

I just searched a website and when I applied there, I was called by cell phone, but their number didn't appear until they asked me based on my resume. And afterward, she asked me for an initial payment of 100 pesos just for processing my paper for a working visa. But according to their policy, full payment must be paid before a month goes by, but I refuse to pay my balance because I'm wandering if this is a scam or counterfeiting money. Please help me. My money is not be refundable according to their policy, as I have quit their website.

sherlock87

@hyrax53, it's true most information security technology available to consumers is pretty useless. One of the best ways to protect yourself if you're really concerned is to refuse to save passwords on websites; even websites you like and enjoy using, such as Facebook for example, can send you all sorts of garbage by giving your information away, and when you stay logged in it can sometimes know what you're doing on the internet outside of its site.

hyrax53

Computer network security is something many lay users of personal computers do not pay enough attention to. Spy ware is not something that can only come from the websites that you use; in fact, many of the ad blocking or ad filtering software programs available for download have their own set of spy ware data that will still be allowed into your computer to send you specific ads.

Post your comments
Login:
Forgot password?
Register:
    • A cyberattack may attempt to gain illicit access to files on a personal hard drive.
      By: merydolla
      A cyberattack may attempt to gain illicit access to files on a personal hard drive.
    • To prevent a cyberattack  make sure to install high quality anti-virus software, and update it on a regular basis.
      By: creative soul
      To prevent a cyberattack make sure to install high quality anti-virus software, and update it on a regular basis.