Page 60 - CMA Journal (May-June 2025)
P. 60

Focus Section
             Cybersecurity Risks: A Growing



             Threat to Business Stability





             A chain is only as strong as its weakest link – and in today’s   unavailable to
             era, where most of our lives have been transformed into a   legitimate users.
             digital landscape, one weak password, unpatched system,   This attack
             or lack of cybersecurity awareness can be the breaking   exhausts network
             point, resulting in a cascading effect that impacts multiple   resources due to
             systems and causes significant data, reputational, and   the high volume of
             financial loss. Cybercriminals don’t need to defeat the   requests received,
             entire defense system; they can find and exploit that one   resulting in the
             weakest link in the chain to gain access to critical systems   system becoming
             and information. In this article, we’ll explore how cyber   unresponsive. DoS
             threats expose these vulnerabilities, their impact, and   attacks can take
             what measures we can take to strengthen our systems   various  forms— Muhammad Shahab Iqbal
             and safeguard our digital identity.                   such as ICMP flood,   Assistant Vice President /
                                                                   SYN flood, and
             Imagine your digital world as a Jenga tower, where each                  Head of Business Applications
                                                                   UDP flood—but all
             block represents a digital element such as cloud services,                 Al Meezan Investments
                                                                   share a common
             IaaS (Infrastructure as a Service), PaaS (Platform as a
                                                                   goal: to drain network resources. Distributed Denial
             Service), SaaS (Software as a Service), IoT devices, digital
                                                                   of Service (DDoS) is a more severe version, as the
             wallets, third-party services, and many more. The higher   attack originates from multiple sources, making it
             the tower goes, the more unbalanced and vulnerable it
                                                                   more complex and difficult to mitigate.
             becomes, where the black hat only needs to pull out one
             block to dismantle the entire ecosystem.          d)  Man-in-the-Middle (MitM) Attack – This type of
                                                                   attack works by intercepting communication
             Each technological innovation or layer comes with its
             own risk, adding more complexity to the systems and   between two points, allowing attackers to
             making it harder to monitor and secure each endpoint,   eavesdrop, modify the data, mimic legitimate
             gap, and doorway for ransomware, data breaches, and   requests, and compromise data integrity.
             thefts to occur.  With this, it's becoming increasingly
                                                               e)  Cross-Site Scripting (XSS) Attack – Attackers
             important for businesses to balance the innovation and   embed malicious scripts on websites that get
             usage of technology with the required security strategies
                                                                   executed on users’ web browsers. This can result in
             like continuous monitoring, threat intelligence, user   stealing personal information, credentials, and credit
             awareness, and a Zero Trust policy. With increasing digital
                                                                   card details, modifying website content and
             adoption, attackers now have an enormous attack       appearance, or exploiting browser vulnerabilities to
             surface available to exploit vulnerabilities. These threats
                                                                   install malware and gain system access.
             may occur individually or in various combinations of the
             following, out of the wide range already available and   f)  Zero-Day Exploits – Like human systems, digital
             new ones constantly being developed:                  systems also possess weaknesses. Many reaches
                                                                   production unnoticed, and these can be exploited
             a) Malware – Software designed to penetrate systems
                                                                   by attackers.
                 to steal data, disrupt operations, and gain
                 unauthorized system access. These include viruses,      At times, these exploits can have severe impacts
                 worms, trojans, ransomware, and spyware.          because they are previously unknown in the system

             b) Phishing  – Deceptive communication, such as       before being used by attackers—and remain
                 emails, messages, and chats, used to trick people   vulnerable until a patch is deployed.
                 into revealing sensitive information like personal   g)  Brute Force Attack – A trial-and-error method to
                 details, account credentials, PINs, and access codes,
                                                                   guess passwords, login credentials, PINs, and
                 or installing malware that either steals or encrypts   encryption keys until one attempt succeeds. Once
                 the data—against which a huge ransom is then
                                                                   cracked, not only is the individual system
                 demanded for decryption.
                                                                   compromised, but other connected systems can also
             c)  Denial-of- Service (DoS) Attack – Overloading a   be exposed and exploited.
                 system with bot-generated traffic to make it
              58    ICMA’s Chartered Management Accountant, May-June 2025
   55   56   57   58   59   60   61   62   63   64   65