<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1175921925807459&amp;ev=PageView&amp;noscript=1">
Vendor Risk Management

3 Attack Vectors That Lead To Cybersecurity Breaches

Melissa Stevens | September 8, 2016

When we talk about cybersecurity events, we often discuss “the three principles of security”—which are often abbreviated “CIA”: 

  • The confidentiality of the information. Informational confidentiality is what comes to mind most frequently when we consider cybersecurity breaches—if an attacker is able to access personal information and use it for nefarious purposes, confidentiality has been broken.
  • The integrity of the information. Informational integrity refers to information in its original format that hasn’t been manipulated by a bad actor.
  • The availability of the information. Informational availability can be impacted by DDOS attacks (which we’ll discuss below). If an attacker is able to bring down a service for a period of time, it affects whether people can access the information they want or need.

Many types of cybersecurity breaches that affect the three principles of security fall into three different attack vectors: 

  • Phishing Attackssecurity
  • SQL Injection Attacks
  • DDOS Attacks

Bad actors use these attack vectors to infiltrate a network or disrupt access to sensitive data, whether that’s personally identifiable information (PII), payment card information, health care information, intellectual property, or another type of data.

Below, we’ve given some more detail about each of these three attack vectors that often result in network security breaches.

3 Attack Vectors That Lead To Various Types Of Cybersecurity Breaches

Phishing Attacks

To conduct a phishing attack, a bad actor tries to impersonate either a legitimate person or a corporation (for example, a company that the person they’re phishing does business with) through an email that asks the user to take an action that would give the phisher an access point to critical data or information.

Bad actors using phishing attacks often try to spoof the logo or website of a well-known corporation or individual so their email request appears legitimate. For instance, a hacker may try to get someone in the finance department of a company to transfer funds to the hacker’s account by spoofing an email to look like the recipient's bank. We’ve also seen phishers try to obtain employee information—like W-2 records. They do this by reaching out to someone in the HR department of an organization, posing as a trusted source, to see if they’ll send the information.

To avoid a phishing attack, it’s critical to teach employees to pay close attention to anything that may be slightly wrong with an email, including misspellings, strange syntax, or logos that have been slightly altered. You should also teach employees never to click on a link within an email. For example, if an employee is contacted by their bank and encouraged to reset a password, it’s best to go directly to the bank’s website.

SQL Injection Attack

Structured query language (SQL) is a programming language used to deal with back-end databases and applications. SQL injection attacks have been around for a long time but are still commonly used to exploit companies. If a web developer creates an application where the user can interact with a database to add information—and this developer does not take proper precautions—an attacker can perform a “get request” or “select request” function, which essentially dumps the entire database so they can harvest sensitive information.

To avoid a SQL injection attack, be sure to have these precautions in place: 

  • Create validation standards for the information you’re allowing to come into your database. This includes adding character limits for usernames and passwords.
  • Outlaw certain characters that are associated with SQL injection requests—this makes it more difficult (or even impossible) for an attacker to send information to your database and have it enumerate anything.  

Looking to streamline your vendor risk management process? Take a look at these tools and techniques.

DDOS Attack

Distributed denial-of-service (DDOS) attacks impact information availability. The attack comes when a bad actor creates a slew of traffic requests on a website at once in order to crash it or severely cripple it for a period of time.

Many websites are not set up to handle the kind of traffic that attackers can harness using botnets, which makes them susceptible to DDOS attacks. Interestingly, much of the news coverage that tends to surround DDOS attacks is political. “Hacktivist” groups are known to perform DDOS attacks on government and corporation websites for political purposes. DDOS attacks happen all the time to many other types of organizations as well—but those that get the most news coverage are able to bring down a website or cause a noticeable disruption in service.

To avoid a DDOS attack, employ the use of DDOS prevention services. These are often provided by hosting companies who are able to help your website handle large influxes of traffic in case of a DDOS event.

In Summary

When you’re dealing with attack vectors that lead to different types of cybersecurity breaches, employee vigilance and attention to detail both become very important. It’s critical to train all employees on these three attack vectors so they’re aware of the common methods used to compromise valuable data. A lot of damage can be prevented by teaching employees how to avoid clicking links that could lead to a phishing attack or make sure all of the company’s systems are robust enough to prevent these common types of attacks.

security-managers-guide-to-VRM

Suggested Posts

Worthwhile TPRM Certifications for Security & Risk Professionals

As the importance of third-party risk management (TPRM) continues to grow, organizations are hiring for related roles more seriously than ever before. To compensate, security and risk professionals are seeking out certification programs in...

READ MORE »

Which Third-Party Risk Management Tools Do You Really Need?

With high-profile breaches being traced back to supply chain vulnerabilities and a regulatory environment that’s waking up to the realities of vendor risk, many organizations are investing heavily in third-party risk management (TPRM)...

READ MORE »

New Study: Organizations Struggle to Manage Cyber Risk in Their Supply Chains

A new report from McKinsey & Company sheds light on something we’ve known for many years – organizations are struggling to make significant progress in managing cybersecurity risk in their supply chains.

READ MORE »

Subscribe to get security news and updates in your inbox.