INTRO TO CYBER SECURITY

Muqadas Urooj
3 min readApr 27, 2021

--

CYBER SECURITY ATTACKS

INTRODUCTION

Cybersecurity in simple means that process or mechanism to protect our data. Cybersecurity is the combination of 2 words cyber which means internet-connected systems and security means protection, we say cybersecurity is the science of protecting the information, data, software hardware from cyber-attacks.

In other words;

It is the collection of technologies, processes, and practices designed to protect networks, system devices, installed programs, and precious data from attack, theft, damage, modification. It may also be termed information technology security.

Cyberattacks

Cyber attacks are committed by cyber attackers. Attackers can be any individual or organization who intends and perform malicious activities to destroy the system, expose, alter the data, disable any functionality, steal or gain unauthorized access to or try to access the unauthorized asset.

  1. State-sponsored Attack
  2. Hacktivists
  3. Cybercriminals

BACKGROUND;

let for supposing our data is not protected by malicious attacks, or by hackers will we would like to use that system? Of course not.it is now most important that all of our data must be well protected even a small breach in security create thousands of issues, many attempts and ways have been discovered to making strong the security like by putting passwords using firewalls, but in the big contract we cannot rely on this small security mechanism the integrity of data, the confidentiality of user and the authority to pass the right user is most important it has been found that with the globalized nature of the internet we need more and more security, here comes the need of cybersecurity.

COMPONENTS OF CYBERSECURITY

1. INFORMATION SECURITY;

It includes three things Confidentiabilty, INTEGRITY, AVAILABILITY

2. NETWORK SECURITY

It is the most important one its means the network in which our data is being transferred must be protected at any cost this could be achieved by using any of these technologies;

Firewall, Antimalware/Antivirus software, Behavioral analytics that detects abnormal network behavior, and, Access control

3. Applications security

Application security means at the development phase of any application developers must consider the values and principles of cybersecurity and should add a security feature of cybersecurity in it. The best example of application security is the security of the website if there would be any vulnerabilities in the website the risk of cyberattacks will be high.

The application threats or vulnerabilities can be SQL injection, Denial of service attacks (DoS), data encryption, data breaches

OPERATIONAL SECURITY

Operational security mainly focuses on the risk management processes of any organization it identifies the what is the critical data of any organization and how to ensure its security concerning cybersecurity mechanism.

TOP TECHNOLOGIES OF CYBERSECURITY

Artificial Intelligence & Deep Learning

Behavioral Analytics

Blockchain Cybersecurity

Embedded Hardware Authentication

Zero-Trust Model

CYBER ATTACKS;

Cybersecurity could be damaged by the cyber attacks and here are some main cyber attacks;

1. Malware

Malware is a type of software such as spyware, ransomware, viruses, and worms. when a user unintentionally clicks any link or attachment the malware got activated and make a dangerous effect on the user’s system.

Denial of Service

A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks.

Phishing

Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. “The goal is to steal sensitive data like credit card and login information or to install malware on the victim’s machine,” Cisco reports.

SQL Injection

A (SQL) injection results from inserting malicious code into a server that uses SQL. When infected, the server releases information.

Password Attacks

Cyber attackers try to get the password information they mostly used to trick the users make fake communication or guess the password of the victim.

--

--

Muqadas Urooj
Muqadas Urooj

No responses yet