8/21/2020
4 Comments
Hello friends, all of you are familiar with the term Cyber
Security. Today we will know in detail about Cyber Security, in this article.
In this article, Let's discuss, What is Cyber Security, Why is
Cyber Security important. And discuss How many types of Cyber Attacks
are there and How to Protect Yourself from Cyber Attacks.
What is Cyber Security?
Cyber Security
is the practice of protecting computers, servers, mobile devices, electronic
systems, networks, and information from malicious attacks. It is also known as
information technology security or electronic data security. This term applies
to a wide range of situations, from business to laptop, and can be divided into
a few general categories. Network security is the practice of detecting
computer networks from intruders, whether targeted attackers or malicious
malware.
A
risk-based Security report revealed that shocking 7.9 billion records were
exposed to data breaches in the first nine months of 2019 alone. This figure is
more than double (112%) the number of records disclosed during the same period
in 2018. Medical services, retailers, and community structures have experienced
serious violations, with vicious criminals targeting multiple incidents.
Why is Cyber Security important?
In
today's the connected world, everyone benefits from advanced cybersecurity tools,
cybersecurity programs. On a personal level, a cybersecurity attack can result
in the loss of important data for family photos, from identity theft to
extortion attempts. Everyone relies on critical infrastructures such as power
plants, hospitals, and financial services companies. Securing these and other
organizations is essential to keep our society functioning.
How many types of Cyber Attacks are there?
There
are many types of Cyber Security attacks. This includes malware, phishing
attacks, denial-of-service (DoS), human-in-the-middle (MITM), etc. to hack
systems, demanding money in the form of cryptocurrency, or selling data on the
Dark Web.
Phishing
This
is the most common method of online attacks using by hackers. In phishing, the
attacker presents itself as a trusted source and sends a malicious email that
at first glance seems legitimate. The reason behind sending such
genuine-looking emails is to hack the hacker name, password, credit card, and
other banking details.
An
example of a common phishing attack could be an email about the expiration of
your social media account password. The email is likely to contain a link that
seems legitimate at first, but if you look carefully, you may notice some
manipulation of its spelling.
Smishing
Smishing
is a method of executing a phishing attack which is usually done via an SMS.
Usually, SMS claims that the user has won a lottery, and to receive it, the user
has to provide his details. If you click on such a link, the website (which may
also look legitimate) can steal your personal information without your consent. You must read such emails carefully and avoid clicking
suspicious URLs.
Malware
It
is malicious software, as the name suggests is software that uses a payload to
gain access to the victim's data. This software installs a program that
contains many types of malware such as Ransomware, spyware, Trojans, worms,
etc., designed to damage a system or network or to delete and hijack system
data.
Ransomware
Ransomware
is the most common malware using to steal data. Once the malware installs into
the system, it hunts for sensitive information and encrypts it. Then a pop-up
message on the system asks for a ransom.
If
the victim refuses to pay the ransom, hackers often threaten to delete the data
or sell it online. Subsequently, if he gives the amount demanded, the victim is
likely to have access to their data again. Although there is no guarantee that
the hacker will give back your data or delete them from your system.
Denial of Service (DoS)
DoS attack is a brute force attack that aims to reduce the traffic of a system or
website and make it offline. Attackers can flood a system or website with
excessive traffic or send altered information triggering a crash, making it out
of reach for the rest.
In
computer networks, attackers in computer networks can use a distributed DoS
(DDoS) name of a DoS attack. Like DoS, DDoS saturates bandwidth with excessive
traffic from multiple systems connected to the main server, thus clogging the
network and then bringing it down. The goal of such an attack is to ensure that
the traffic of the victim network or website is reduced or used to target the
rest of the network.
Man-in-the-Middle (MITM)
In
this, the attacker reveals communication between the two parties. These parties
can be between two users or one user and one application or one system. The
attacker presents itself as one of two entities, making it appear that both
legitimate parties are communicating with each other.
The
attacker tracks the communication between the two (as if they are sitting in
the middle), thus making access to all the information shared between the two
parties. The goal of such attacks is to obtain personal and sensitive
information from the victim. Which usually includes banking and finance-related
information.
To
avoid such attacks, make sure that you are connecting to a secure internet
connection. Go to the website with HTTPS protocol which uses different
encryption levels to avoid any spoofing attacks.
SQL Injection and Cross-Site Scripting (XSS)
In
a SQL injection attack, the hacker attacks the database of a vulnerable website
to obtain sensitive information. The attacker uses malicious code to target the
SQL vulnerabilities of any database. Thus gaining access to all data stored in
the database for successful implementation.
In the case of an XSS attack, the attacker targets a web application that delivers
malicious code to a web browser. The web browser acts as a bridge to execution.
And the code is injected only when the user visits the website containing the
attack. During such attacks, sensitive information that enters the user's
website can be hijack without the knowledge of any website or users.
How to Protect Yourself from Cyber Attacks?
1. Do
not share your sensitive information such as email id, password, credit card
details, etc. on forums or websites.
2. Make
sure that your password is hard and not something that can be easily guessed. For
example, avoid using a common password such as date of birth, your name, or
12345 for the required account. Use different character and number combinations
instead.
3. Before
clicking on the link, make sure the website is valid. Check for any spelling
mistakes in the message or in the URL.
4. Use
reliable anti-virus software to scan your system frequently.
5. Do
not open or reply to spam messages and emails.
6. Avoid
using open Wi-Fi. These networks are not secure, so hackers can easily inject a
malicious code to gain access to your data.
7. Use
a virtual private network (VPN) that creates a secure tunnel between you and
the website.
I hope you understand, What is Cyber Security, Why is Cyber Security important. And understood How many types of Cyber Attacks are there and How to Protect Yourself from Cyber Attacks.
Keep it up👍
ReplyDeleteThankyou
ReplyDeleteWhile it has never been officially confirmed, a combination of leaks and evidence uncovered by security experts indicates that the United States has launched a series of cyber-attacks against Iran and its allies designed to hamper its nuclear program and its funding of terrorism. How to hire a cybersecurity expert
ReplyDeleteEfficiently written information. It will be profitable to anybody who utilizes it, counting me. Keep up the good work. For certain I will review out more posts day in and day out. sviluppo siti web Milano
ReplyDelete