Browse Definitions :
Definition

asymmetric cyber attack

An asymmetric cyber attack refers to cyberwarfare that bypasses or sabotages a victim’s strengths while targeting their vulnerabilities. In these types of attacks, the perpetrator has an unfair (or asymmetric) advantage over its opponent and can be impossible to detect. Oftentimes, the aggressor cannot compete in strength or numbers, making this popular among small intelligence groups.

Asymmetric cyber attacks are becoming more common due to their low cost, readily available equipment, and large damage potential. Computer networks are targets of mass destruction as the reliance on digital information becomes more apparent. Entire economies or governments can be taken down via network intrusions, firewall damages, or cyber terrorists.

In order to prevent asymmetric cyber attacks from occuring, companies, governments, or networks should be aware of their own vulnerabilities and create strategies that address potential weak points in those areas. Asymmetric cyber attacks should be treated as a serious threat as the damage can be detrimental, lack boundaries or borders, and cannot be specifically monitored.

Features of an Asymmetric Cyber Attack

  1. Technology: Cyber attacks are unconventional in that technology requires less planning and lower costs.
  2. Tactics: The nature of asymmetry makes the plan of attack unfair, uneven, hard to track, and removes any of the victim’s advantages.
  3. Exploitation: In order to increase odds for success, asymmetric attackers research their victim’s vulnerabilities and create strategies surrounding them.
  4. Impact: Asymmetric cyber attacks are employed to cause as much damage as possible physically and psychologically, including inflicting distress, shock, and confusion.

Examples of Asymmetric Cyber Attacks

In cybersecurity, an asymmetric attack might involve a perpetrator attacking security measures that have been put in place, such as the firewall or intrusion detection system, by capitalizing on the weakest link. Specific examples of this are:

  • The attacks of September 11th, 2001 was unequal in terms of manpower and intelligence, but played on the weaknesses within air transportation and global policies to strike down computer networks as well as cause physical destruction.
  • In 2013, the Syrian Electronic Army hacked the Associated Press Twitter account, claiming that President Obama had been injured due to an explosion in the White House. This simple action wreaked havoc as markets and stocks crashed in response to the tweet.
This was last updated in September 2018

Continue Reading About asymmetric cyber attack

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

What steps should governments or companies take to reduce vulnerabilities and minimize asymmetric threats?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

  • integrated risk management (IRM)

    Integrated risk management (IRM) is an approach to risk management that uses a set of practices and processes to improve an ...

  • MITRE ATT&CK framework

    The MITRE ATT&CK (pronounced 'miter attack') framework is a free, globally accessible service that provides comprehensive and ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close