Cyber Threat Spectrum

In computer and computer networks an attack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset. A cyberattack is any type of offensive maneuver that computer information system, infrastructures, computer networks or personal computer devices. An attacker is a person or process that attempts to access data, functions or other restricted areas of the system without authorization, potentially with malicious intent. Depending on context, cyberattacks can be part of cyberwarfare or cyberterrorism.

A cyberattack can be employed by sovereign state, individuals, groups, society or organizations, and it may originate from an anonymous source. A product that facilitates a cyberattack is sometimes called a cyber weapon.

A cyberattack may steal, alter, or destroy a specified target by hacking into a susceptible system. Cyberattacks can range from installing spyware on a personal computer to attempting to destroy the infrastructure of entire nations. Legal experts are seeking to limit the use of the term to incidents causing physical damage, distinguishing it from the more routine data breaches and broader hacking activities.

Cyberattacks have become increasingly sophisticated and dangerous. User Behaviour Analytics and SIEM can be used to help prevent these attacks.


Speaker 1: img Dr. Kashif Naseer
Assoc. Prof. CS Dept. Bahria University

Speaker 2: img Mr. Hafiz Muhammad Arslan Maqsood
Cyber Security Expert - CRC Lab

Speaker 3: img Mr. Muhammad Saidu Aliero
Cyber Security Expert - School of Information Technology
Monash University, Malaysia


Talk 1: Recent Cyber Threats and Breaches

Talk 2: Threat Classification Models - Industry Perspective

Talk 3: Emerging Cyber Security Threats under COVID-19