The National Institute of Cybersecurity (INCIBE) has published the document “Cyber attack guide. Everything you need to know at the user level ”. It is a guide that aims to become a reference for those Internet users interested in knowing the types ofcyberattacksto those who are exposed . All this, without the need for great technical knowledge.
The document, written in a simple and close language, collects the characteristics of all possible cyberattacks that citizens can face. In addition, it details how these attacks are carried out and the interest cybercriminals have in executing them; as well as what users must do to be specifically protecte against each one of them.
To Learn More Click: buy email address
INCIBE Cyber Attacks Guide
Structure of the Cyber Attack Guide
The guide is divided into four broad categories, depending on the type of attacks:
To passwords. Brute force and dictionary attacks are analyzed.
By social engineering. What are phishing, vishing, and smishing attacks are explained; those of baiting or hook; those of shoulder surfing or looking over the shoulder; those of dumpster diving or rummaging through the garbage, those of spam or junk mail and online fraud.
To Learn More Click: asp .net hosting
To connections. This section talks about honeynets (fake Wifi), spoofing or impersonation (IP spoofing, web spoofing, email spoofing and DNS spoofing), attacks on cookies, DDoS attacks, SQL injection, port scanning, Man in the middle or middle man attack and sniffing.
By malware. It details what are viruses, adware or malicious ads, spyware or spyware, Trojans (backdoors, keyloggers, stealers and ransomware), worms, rootkits, botnets or zombie networks, rogueware or fake antivirus, the cryptojacking and malicious apps.
Finally, as a complement, the manual offers a decalogue of good practices in cybersecurity to improve the protection of devices and information security against cyberattacks.
Offer comprehensive protection against advanced cyber threats in IoT devices and in industrial environments. This is the goal for whichDeloitte Y Kasperskyhave signed a collaboration agreement with which they want to respond to the growing demand for cybersecurity in IoT . Through this partnership, Deloitte will offer its customers KICS for Nodes and KICS for Network solutions , which are integrated into Kaspersky Industrial CyberSecurity (KICS). The former is designed to protect endpoints, while the latter monitors network security. To this is added, in addition, the services associated with these technologies.
IoT and industrial cybersecurity
Remember that cyberattacks in industrial environmentsthey are a reality that increasingly worries senior management. This trend is reflected in the latest report on industrial cybersecurity by Kaspersky. Among its main results, it stands out that 55% of those surveyed review the security of their OT networks at least once a year . Likewise, 44% declared that they are working on cybersecurity initiatives for their digital transformation.
To Learn More Click: mail365
In this regard, Andreu Bravo, a Deloitte Risk Advisory partner specialized in cybersecurity for OT and IoT environments , states: “Through this agreement, the combination of our capabilities allows a global vision of all assets and, at the same time, a specialized understanding of the processes to be protected. Both qualities are essential to be able to offer security guarantees in the current risk context ”.
For his part, Óscar Suela, Head of Enterprise, Kaspersky Iberia , points out: “We are sure that, through this collaboration, we will help organizations protect and manage the complexity of their industrial control networks. All this, thanks to our joint experience and specific knowledge of the needs of these critical industries . Our collaboration will enable a progressive path to a comprehensive holistic cybersecurity solution that encompasses people, processes and technologies. ”
Finally the agreement also includes the specific Kaspersky IoT solution for Smart Stadiums , which makes Deloitte a specialized provider of this technology. The consultancy will create a specific environment for this type of sports facilities, in which it will be able to show its capabilities to protect sports stadiums.