Home>

In my impression, a cyber attack first obtains a user name and password in some way, and uses it to destroy data with legitimate privileges on the system. Is there a type of attack that does something that wouldn't be possible with your account without it?

  • Answer # 1

      

    In my impression, a cyber attack first obtains a user name and password in some way and uses it to destroy data with legitimate privileges on the system.

    This is called unauthorized login. This is one of the methods of cyber attack, but this is not all. Rather, it may be a small percentage.

      

    Is there a type of attack that does something that wouldn't have been possible with your account without obtaining formal privileges?

    Yes, there is. The reason you can do what you can't do with your account is because the software is vulnerable.

    Also, targeted attacks use viruses (malware). The malware infects the target computer, and the malware (the entity is a program) steals information or performs unauthorized operations. This will also allow you to perform operations with privileges that the attacker did not originally have.

  • Answer # 2

      

    My impression is that a cyber attack first obtains a username and password in some way and uses it to destroy data with legitimate privileges on the system.

    There are many attacks that are not limited to this.

    Vulnerability attacks that can elevate privileges

    Attack that allows users to execute malicious programs such as targeted attacks

    Attack to physically destroy the machine

    Denial-of-service attacks that demand a lot of services and make it difficult for legitimate users to navigate

  • Answer # 3

    The cyber attack that the questioner says is "illegal access attack".
    If you want to gain unauthorized access to your machine and attack, you need to know your username and password.

    However, cyber attacks do not require an attacker to access the machine.

    Did you know the ransomware "WannaCry", which was devastating last year?
    This is called a worm and the infection spread without any user interaction.
    When infected, files on the PC are encrypted and can no longer be used.

    There are a variety of attack methods other than "illegal access attacks" that many people think of when they hear "cyber attacks".

    In addition, "unauthorized operations" are not always attacks.

    There are a variety of cyber attacks.

Related articles