Browse Definitions :
Definition

Gen V attack (5th generation cyberattack)

Contributor(s): Matthew Haughn

A Gen V attack, also known as a 5th generation cyberattack, is a large scale, multi-vector attack vetor that is designed to infect multiple components of an information technology infrastructure, including networks, virtual machines, cloud instances and endpoint devices. 5th generation attacks can be extremely dangerous because they can spread quickly and outmaneuver conventional detection-based defenses such as firewalls. Gen V attacks are a part of the natural evolution of threats as changing defenses force attackers to hone their craft. NotPetya and WannaCry are two early examples of Gen V attacks. 

Gen V attacks are typically charactered by their ability to cause very large data breaches and destruction of service (DeOS). Check Point Software Technologies uses the term "generations" to divide the evolution of information security into different segments characterized by date, attack vector and malicious payload. The first generation of cyberattacks in the late 1980s consisted of viruses carried on floppy discs that would need to be inserted into computers. During the second generation, which came about in the early 90s, attacks were launched over the internet instead of through floppy disks. During the third generation, which took place in the early 2000s, cyber-attackers evolved again to exploit vulnerabilities in software applications that relied on internet access. And in roughly 2010, cyber-attackers continued this evolution by developing 4th generation polymorphic malware that could take a different form in different attacks.

To be effective, Gen V cybersecurity must be built to decrease attack surfaces and provide real-time threat prevention. Because Gen V cyber-attacks can happen faster than conventional security systems can deal with, the focus for dealing with this type of cybersecurity problem should be on preventing attacks by correlating, storing and analyzing data across all network devices in real time. Strategies include the use of next-generation firewalls (NGFWs) with advanced functions including application awareness and the ability to use external threat intelligence feeds that provide security engineers with a live data stream related to potential or current threats. Other strategies include the use of microsegmentation and intelligent application delivery controls.

This was last updated in February 2019

Continue Reading About Gen V attack (5th generation cyberattack)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close