Do you know the roles of Cyber Warrior in network Security attacks in Nigeria. Hold on a bit. That is what I am about to talk about in this article.
When it comes to cyber security , we have various categories of hackers that can attack a networks. It is just that agenda of various hackers are different.
in my previous article , I have discussed about Hackticists and Cyber Criminals in this article, I want to focus on role of cyber warriors in network security attacks in Nigeria. Follow me as we are going to look at that in this article.
A cyber-warrior is a person who engages in cyberwarfare, whether for personal reasons or out of patriotic or religious belief.
Cyberwarfare may be pursued either to defend computer and information systems or to attack them. Cyber-warriors come in different forms, depending on their roles, but all deal with information security in one form or another.
Cyber-warriors wage war using information technology. They may attack computers or information systems through hacking or other related strategies, or defend them from their counterparts.
Cyber-warriors may also find better ways to secure a system by finding vulnerabilities through hacking and other means and closing those vulnerabilities before other hackers find and exploit them.
Given this, the term cyber-warrior has different meanings depending on the context in which it is used; the term may refer to someone with malicious intent (the attacker) or a professional who is working to defend against such attackers.
The latter context is an emerging career field, similar to ethical hacking.
Some facts
- They always take advantage of vulnerabilities in common OS and Applications.
- Facts about Cyber Warriors
They adopt the use of Espionage, extortion and embarrassment. - They are well funded by governments because they represent government interests.
- They make use of existing exploit methods, and they are also capable of developing new ones.
- They always look for how to create a “Zero-Day”. Zero-day happens when you discover new vulnerability or attack path and you never knew how to fix it.
- This always gives Cyber warriors enough time to launch more attacks until developers can find a solution to the attack created.
- Once these attacks are discovered, the software vendor will issue a patch update to correct it. That is why once a particular attack method is used, it might not be possible to use it again.
Earlier, I said the Cyber Warriors always take advantage of vulnerabilities. That means they will always try to find loophole in your network and us that as a means of coming into your network. That is why a cyber warrior must always analyse his network and block every loopholes when they are discovered on the network.
Cyber warrior can leverage on existing explous and also develop new malware from existing malware on a network. They will have to analyse existing malware and see what they can tweak in order to launch attacks on the network.
You also need to get aware of the Zero Day attack. This is when a new malware is developed from existing malware on a network.
At this stage, the Cyber Security Experts seems not to have answers or the attack that was launched. At this stage, the Cyber Security expert supposed to isolate the device that has been attacked so that the malware will not spread to other part of the network.
Action Point
PS: I know you might agree with some of the points raised in this article or disagree with some of the issues raised.
Please share your thoughts on the topic discussed. We would appreciate it if you could drop your comment. Thanks in anticipation.