Enter your email id to get regular update free
Login
Your Email
Pasword
Home
Write
Trending
History
Liked
Earning

Cyber Security in our daily life

Cyber security is the practice of defending electronic systems such as computers, servers, mobile devices, and their data from malicious attacks or unauthorized access by hackers.

Cyber Security: 
      Cyber security is the practice of defending electronic systems such as computers, servers, mobile devices, and their data from malicious attacks or unauthorized access by hackers. Cyber security is also known as information technology (IT) security or electronic information and data security. Few categories of cyber security are, 
Network security is the process of securing a computer network or other device network from intruders. 
 • Application security focuses on keeping applications, software and devices free of threats. 
 • Information security protects the integrity, security and privacy of data and information, both in storage and in transmission. 
 • Operational security involves the processes and decisions for handling and protecting data and information assets. 
 • Endpoint security is the process of protecting a company’s network from remote access. Remote access is a necessary part of business, but can also be a weak point for data. 
 • Cloud security is the process of protecting data present in digital form or the cloud in a 100% online environment. 
 • Mobile security involves virtually every type of security challenge in and of them. 
IMPORTANCE OF CYBER SECURITY 
    Cyber security is important because government, military, corporate, and other organizations collect, process, and store large and unequal amounts of data and information on their computers and cloud. A large part of that data can be sensitive information or other types of data whose unauthorized access or disclosure could have negative or adverse consequences. As the number of cyber attacks grow, companies and other organizations, especially those that are tasked with safeguarding information relating to national security, or financial records, need to take strict steps to protect their sensitive data and information. From as early as March 2013, the nation’s top intelligence officials informed that cyber attacks and digital spying are the top threat to national security. 
Cyber attack 
     A cyber attack is a type of offensive action that targets computer information systems, or personal computer devices, using various methods to steal or alter data or information in a system. There are several types of cyber attack or threat. Some of them are discussed below, 
1. Denial-of-service (DoS) attack: A denial-of-service attack overloads a system’s or server resources and hardware so that it cannot respond to service requests. Purpose of a DoS attack is to take a system down offline so that a different kind of attack can be launched on it. 
2. Botnets: Botnets are the millions of systems infected with malware or other malicious software under hacker control in order to carry out DoS attacks. These type of DoS attacks are difficult to trace because botnets are located in differing geographic locations. 
3. IP Spoofing: IP spoofing is used by a hacker to convince a system that it is communicating with a known, trusted entity or website and provide the attacker with access to that system. The attacker then sends a packet with the IP source address of a known, trusted host instead of its own IP source address to a target host. The target host might accept the packet send by the hacker and act upon it. 
4. Phishing: Phishing attack is the method of sending emails to an unsuspicious user that appear to be from trusted sources with the goal of gaining personal information or influencing users to do something. It combines social engineering and technical trickery. It could involve an attachment to an email that loads malware onto your computer. It could also be a link to an illegitimate website that can trick you into downloading malware or handing over your personal information. 
5. SQL injection: A (Structured Query Language) SQL injection occurs when an attacker or hacker inserts or injects malicious code into a server that uses Structured Query Language. SQL injections are only successful when there exist a security vulnerability in an application software. Successful SQL injection by a hacker or an attacker will force a server to provide access to the data or modify them. 
6. Man-in-the-middle attack: A man-in-the-middle (MITM) attack occurs when a criminal hacker or attacker put themselves between a device and a server to intercept communications. MITM attacks often happen when an unsuspicious user logs on to an insecure public network. 
Some ways to reduce the chances of cyber attack: 
1. Always keep firewall active.
2. Use anti-virus/malware software. 
3. Use Stronger Passwords. 
4. Install and update the latest operating system updates. 
5. Avoid being scammed by lucrative e-mails. 
6. Protect your e-identity and information’s. 
7.  Call the right person for help like authorized service person.
Advantages of cyber security: 
1) Protects system and devices against viruses, worms, spyware and other unwanted programs. 
2) Protection against data and identity theft. 
3) Protects the computer and other devices from being hacked and used as botnet. 
4) Minimizes computer freezing, crashes and malfunctioning. 
5) Gives privacy and security to user’s information.
 Disadvantages of cyber security: 
1) Firewalls or other cyber security software can be difficult to configure correctl 
2) Need to keep updating the cyber security software in order to keep security up y. 
3) Incorrectly configured firewalls may block users from performing certain actions on the Internet. 
4) Can make the system slower than before. to date. 
5) Could be costly for average user. 
Cyber security
types of cyber threat
measures of cyber security
advantages and disadvantage of cyber security
cyber threat
Informational
Samiran Panda
Lecturer
Total 332 views