Skip to playerSkip to main contentSkip to footer
  • 6/30/2025
Transcript
00:00Meet Anne.
00:01She often shops from www.shoppingcart.com.
00:06She has her information like email ID, address, and credit card details saved on the website
00:12to enable a faster and hassle-free shopping experience.
00:16The required information is stored in a server.
00:19One day, Anne received an email which stated her eligibility for a special discount voucher
00:24from shoppingcart.com.
00:26In order to receive the coupon code, she was asked to fill in her shoppingcart.com account
00:31credentials.
00:32This didn't seem fishy to her at the time as she thought it was just an account verification
00:37step.
00:38Little did she realize the danger she would be facing.
00:42She was knocked off her feet when a substantial amount of money was wiped off her account.
00:47How do you think this happened?
00:49Well, yes, the email she received was fake.
00:53Anne's shoppingcart.com account witnessed unauthorized access from a third party.
00:58This type of attack is known as a cyber attack, and the person who carries it out is called
01:03a hacker.
01:04Could Anne have prevented this attack?
01:06Indeed, she could have.
01:09With the help of cybersecurity.
01:12Cybersecurity involves techniques that help in securing various digital components, networks,
01:16data, and computer systems from unauthorized digital access.
01:21There are multiple ways to implement cybersecurity, depending on the kind of network you are connected
01:26to and the type of cyber attacks you are prone to.
01:29So, let's take a look at the various cyber attacks that Anne could have been exposed to.
01:35One of the most common types of cyber attacks is a malware attack like Trojan, Adware, and
01:41spyware to name a few.
01:43Had Anne downloaded any suspicious attachments online, her system could have gotten corrupted
01:48by certain malicious viruses embedded within the attachments.
01:52Next is a phishing attack, the type of cyber attack which Anne experienced.
01:57Here, the hacker usually sends fraudulent emails, which appear to be coming from a legitimate source.
02:03This is done to install malware or to steal sensitive data like credit card information and login credentials.
02:10Another type of attack is the man-in-the-middle attack.
02:14Here, the hacker gains access to the information path between Anne's device and the website's server.
02:21The hacker's computer takes over Anne's IP address.
02:24By doing so, the communication line between Anne and the website is secretly intercepted.
02:30This commonly happens with unsecured Wi-Fi networks and also through malware.
02:35Password attack is one of the easiest ways to hack a system.
02:39Here, Anne's password could have been cracked by using either common passwords or trying
02:44all possible alphabetical combinations.
02:47To prevent future cyber attacks, Anne sought to implement a few cyber security practices.
02:52First, she installed a firewall.
02:54As the name suggests, it is a virtual wall between Anne's computer and the Internet.
02:59Firewalls filter the incoming and outgoing traffic from your device to safeguard your network.
03:04And, they can either be software applications or hardware reinforcements.
03:09Secondly, Anne implemented honeypots.
03:12Just like how flowers attract bees, dummy computer systems, called honeypots, are used to attract attackers.
03:19These systems are made to look vulnerable in order to deceive attackers, and this, in turn, defends the real system.
03:26In addition to these, she also decided to use unique alphanumeric passwords, antivirus software and started avoiding mails from unknown senders.
03:36That was Anne's story.
03:38Cyber attacks are not just confined to individuals, but also to public and private organizations.
03:44The cyber attacks carried out in such places are more deadly, and they result in colossal losses.
03:50Motives of such attacks are many, starting from tampering with crucial data to monetary gains.
03:57Let's have a look at a few of the cyber attacks that companies are subjected to.
04:01Various public sector organizations and large corporations face the Advanced Persistent Threat .
04:08In this form of attack, hackers gain access to networks for a prolonged period in order to continuously gain confidential information.
04:17Companies also witness the Denial of Service attack, where networks are flooded with traffic, which in turn leaves legitimate service requests unattended.
04:26A variant of this is the Distributed Denial of Service attack, when multiple systems are used to launch the attack.
04:34When a hacker manipulates a standard SQL query in a database-driven website, it is known as a SQL injection attack.
04:42By doing so, hackers can view, edit and delete tables from databases.
04:47Amidst a plethora of cyber attacks, it is indeed a challenge for organizations with several networks and servers to ensure complete security.
04:55This is not an easy task, and to help with this, cybersecurity professionals are hired to work on identifying cyber threats and securing a company's network.
05:04There are multiple job roles in the field of cybersecurity.
05:08If hacking fascinates you, then the role of an ethical hacker is something to be explored.
05:14Such professionals try to explore a network's vulnerabilities, just like how a hacker would do, but only to identify those vulnerabilities and resolve them for protection against an actual cyber attack.
05:26But, if you are looking to design robust security structures, then the role of a security architect is more apt.
05:32A Chief Information Security Officer plays a crucial role in enterprise security and is entrusted with the overall safety of the information in an organization.
05:44So, here's a question for you.
05:46Identify the type of cyber attack where the hacker's system takes over the client's IP address.
05:52A. DDoS attack B. Man in the middle attack C. Phishing attack D. Password attack
06:03Give it a thought, and leave your answers in the comments section below.
06:06Three lucky winners will receive Amazon gift vouchers.
06:09With the increase in the production of global digital data, it is anticipated that cyber attacks will quadruple in the near future.
06:17Organizations are going to need cybersecurity professionals who can prevent these attacks.
06:22A career in the field of cybersecurity is lucrative and a very smart decision for professionals now.
06:28So, what are you waiting for?
06:31Get certified with Simply Learn and become a cybersecurity expert.
06:35If you enjoyed this video, a thumbs up would be really appreciated.
06:40Don't forget to subscribe to the Simply Learn channel and hit the bell icon to never miss an update on the latest trending technology.
06:47Thank you for watching and stay tuned for more from Simply Learn.

Recommended