The document provides an introduction to cyber security, including definitions and explanations of key terms. It discusses the importance of cyber security in protecting systems and networks from malicious attacks. It also outlines various types of cyber threats like malware, phishing, and denial-of-service attacks. Additionally, it covers cyber security goals to ensure confidentiality, integrity, and availability of data. The document provides an overview of cyber security and important considerations for organizations.
Best BCA colleges in Delhi NCR JIMS Vasant Kunj New Delhi.
cyber ethics is a part of curriculum of BCA 6TH Sem of BESTBCACOLLGE IN DELHI NCR.
JIMS Vasant KunjII is the Top institute for BCA. JIMS is one of the Best BCA Colleges in Delhi which offers best placements in Top IT Companies in Delhi NCR. It is amongst the top A+ Category highest ranked colleges in Delhi, provides 3 years Regular Degree from UGC Approved University
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
Cyber security positions have considerably taken the top list in the job market. Candidates vying for elite positions in the field of cyber security certainly need a clear-cut and detailed guide to channeling their preparation for smooth career growth, beginning with getting a job. We have curated the top cyber security interview questions that will help candidates focus on the key areas. We have classified the regularly asked cyber security interview questions here, in this article into different levels starting from basic general questions to advanced technical ones.
Before we move on to the top cyber security interview questions, it is critical to reflect on the vitality of cyber security in our modern times and how cyber security professionals are catering to the needs of securing a safe cyber ecosystem.
The times we live in is defined by the digital transition, in which the internet, electronic devices, and computers have become an integral part of our daily life. Institutions that serve our daily needs, such as banks and hospitals, now rely on internet-connected equipment to give the best possible service. A portion of their data, such as financial and personal information, has become vulnerable to illegal access, posing serious risks. Intruders utilize this information to carry out immoral and criminal goals.
Cyber-attacks have jeopardized the computer system and its arrangements, which has now become a global concern. To safeguard data from security breaches, a comprehensive cyber security policy is needed now more than ever. The rising frequency of cyber-attacks has compelled corporations and organizations working with national security and sensitive data to implement stringent security procedures and restrictions.
Computers, mobile devices, servers, data, electronic systems, networks, and other systems connected to the internet must be protected from harmful attacks. Cybersecurity, which is a combination of the words "cyber" and "security," provides this protection. 'Cyber' imbibes the vast-ranging technology with systems, networks, programs, and data in the aforementioned procedure. The phrase "security" refers to the process of protecting data, networks, applications, and systems. In a nutshell,
cyber security is a combination of principles and approaches that assist prevent unwanted access to data, networks, programs, and devices by meeting the security needs of technological resources (computer-based) and online databases.
The body of technologies, processes and practices designed to protect networks, devices, programs and data from attack, damage, or unauthorized access is referred to as cyber security. It is also known as information technology security. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.
Best BCA colleges in Delhi NCR JIMS Vasant Kunj New Delhi.
cyber ethics is a part of curriculum of BCA 6TH Sem of BESTBCACOLLGE IN DELHI NCR.
JIMS Vasant KunjII is the Top institute for BCA. JIMS is one of the Best BCA Colleges in Delhi which offers best placements in Top IT Companies in Delhi NCR. It is amongst the top A+ Category highest ranked colleges in Delhi, provides 3 years Regular Degree from UGC Approved University
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
Cyber security positions have considerably taken the top list in the job market. Candidates vying for elite positions in the field of cyber security certainly need a clear-cut and detailed guide to channeling their preparation for smooth career growth, beginning with getting a job. We have curated the top cyber security interview questions that will help candidates focus on the key areas. We have classified the regularly asked cyber security interview questions here, in this article into different levels starting from basic general questions to advanced technical ones.
Before we move on to the top cyber security interview questions, it is critical to reflect on the vitality of cyber security in our modern times and how cyber security professionals are catering to the needs of securing a safe cyber ecosystem.
The times we live in is defined by the digital transition, in which the internet, electronic devices, and computers have become an integral part of our daily life. Institutions that serve our daily needs, such as banks and hospitals, now rely on internet-connected equipment to give the best possible service. A portion of their data, such as financial and personal information, has become vulnerable to illegal access, posing serious risks. Intruders utilize this information to carry out immoral and criminal goals.
Cyber-attacks have jeopardized the computer system and its arrangements, which has now become a global concern. To safeguard data from security breaches, a comprehensive cyber security policy is needed now more than ever. The rising frequency of cyber-attacks has compelled corporations and organizations working with national security and sensitive data to implement stringent security procedures and restrictions.
Computers, mobile devices, servers, data, electronic systems, networks, and other systems connected to the internet must be protected from harmful attacks. Cybersecurity, which is a combination of the words "cyber" and "security," provides this protection. 'Cyber' imbibes the vast-ranging technology with systems, networks, programs, and data in the aforementioned procedure. The phrase "security" refers to the process of protecting data, networks, applications, and systems. In a nutshell,
cyber security is a combination of principles and approaches that assist prevent unwanted access to data, networks, programs, and devices by meeting the security needs of technological resources (computer-based) and online databases.
The body of technologies, processes and practices designed to protect networks, devices, programs and data from attack, damage, or unauthorized access is referred to as cyber security. It is also known as information technology security. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.
Cybersecurity is defined as the protection of computer systems, networks, or devices from malicious attacks. The objective of cybersecurity is to protect our digital data. If any online attack strikes you, then Secninjaz Technologies LLP is here to help you to overcome this problem. There are a group of expert security professionals who help you to overcome cyber fraud and protect yourself. It provides many services like reverse engineering, security assessment, cyber fraud protection, intelligence-led penetration testing, cyber threat intelligence, cyber risk management, etc.
For more info visit - www.secninjaz.com
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
Cyber security professionals are in high demand, and those willing to learn new skills to enter the area will have plenty of opportunities. Our goal is to present you with the most comprehensive selection of cybersecurity interview questions available.
Cybersecurity Vs Information Security.pptxInfosectrain3
A simple definition of information security is preventing unauthorized access during the storage or transmission of data. Biometric information, social media profiles, and data on mobile phones can be considered information. Therefore, research for information security covers various fields, such as cryptocurrency and online forensics.
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...cyberprosocial
With the digital world becoming an essential aspect of our connected environment, there is always a risk of cyberattacks. The phrase “CyberAttacks” refers to a broad category of malevolent actions directed towards computer networks, systems, and data. As technology develops, cybercriminals’ strategies also advance with it.
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
Unit 1: Introduction to Cyber Security and various challenges in cyber security
1.1. Overview of Cyber Security,
1.2. Internet Governance – Challenges and Constraints,
1.3. Cyber Threats: - Cyber Warfare-Cyber Crime-Cyber Terrorism-Cyber Espionage,
Cyber Security: A Hands on review on what is cyber security and how to prevent your devices from hacking and data breach. In today's era almost all devices are connected to internet are available for hackers to breach into and do their work. The data breach can be very dangerous and sometimes even more that it can demolish a company or a person.
In this presentation we will discuss about the ways and short description on Cyber Securty and Techniques.
Cybersecurity is the practice of defending computers and servers, mobile devices, electronic systems, networks and data from malicious attacks.
Topic Covered:
Cyber Security Introduction
Online & Offline Identities
Hackers and their types
Cyberwarfare
Cyber Attacks Concepts & Techniques
System, Software & Hardware Vulnerabilities
Security Vulnerabilities Categories
"Advanced Btech CSE Academic IEEE Major Cyber Security Projects in Hyderabad for Final Year Students of Engineering. Computer Science and Engineering latest major Cyber Security Projects
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...cyberprosocial
With the digital world becoming an essential aspect of our connected environment, there is always a risk of cyberattacks. The phrase "CyberAttacks" refers to a broad category of malevolent actions directed towards computer networks
Mitisol is the perfect solution for Cyber security and risk management, Cyber security and risk management, Cyber Security Company in Dhaka, Bangladesh.
We are the best instutute for Cyber security courses, Cyber Security Course Training, Advanced Cyber security courses in Dhaka, Bangladesh. So keep visiting our websites to get update on regular basis.
What exactly is internet safety?The process of shielding computers, networks, software applications, critical systems, and data from potential digital threats is known as cybersecurity. Data security is an important part of maintaining customer confidence and complying with regulations. They protect sensitive data from unauthorized access and prevent network activity that would disrupt business operations by utilizing cybersecurity tools and measures. By streamlining digital defenses across people, processes, and technology, organizations implement cybersecurity.How significant is cybersecurity?Digital systems and high-speed connectivity are used by businesses in a variety of industries, including manufacturing, energy, transportation, retail, and customer service. These industries also use digital systems to run their operations at a lower cost. They must safeguard their digital assets and systems from unauthorized access in the same way that they safeguard their physical assets. A cyber attack is the deliberate destruction and unauthorized access to a computer system, network, or connected facility. Confidential data could be leaked, stolen, deleted, or altered by a successful cyberattack. Cybersecurity measures provide the following advantages in addition to protecting against cyberattacks. Stop data breaches or cut costs associated with them Organizations that implement a cybersecurity strategy can reduce the negative effects of cyberattacks, which can have an impact on a company's reputation, finances, operations, and customer trust. Disaster recovery plans, for instance, are initiated by businesses to contain potential intrusions and minimize business disruption.To safeguard sensitive data from potential cyber risks, businesses in particular geographies and industries must adhere to regulatory requirements. For instance, European businesses are required to adhere to the General Data Protection Regulation (GDPR), which mandates the use of appropriate cybersecurity measures to safeguard data privacy.Reduce Emerging Cyber Threats As technology advances, so do cyberattacks. For gaining unauthorized system access, criminals utilize novel tools and devise novel tactics. To keep up with these brand-new and constantly evolving digital attack tools, organizations will implement and upgrade cybersecurity measures. Stop data breaches or cut costs associated with them Organizations that implement a cybersecurity strategy can reduce the negative effects of cyberattacks, which can have an impact
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
More Related Content
Similar to Cyber Security in detail PPT BY HIMANXU.pptx
Cybersecurity is defined as the protection of computer systems, networks, or devices from malicious attacks. The objective of cybersecurity is to protect our digital data. If any online attack strikes you, then Secninjaz Technologies LLP is here to help you to overcome this problem. There are a group of expert security professionals who help you to overcome cyber fraud and protect yourself. It provides many services like reverse engineering, security assessment, cyber fraud protection, intelligence-led penetration testing, cyber threat intelligence, cyber risk management, etc.
For more info visit - www.secninjaz.com
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
Cyber security professionals are in high demand, and those willing to learn new skills to enter the area will have plenty of opportunities. Our goal is to present you with the most comprehensive selection of cybersecurity interview questions available.
Cybersecurity Vs Information Security.pptxInfosectrain3
A simple definition of information security is preventing unauthorized access during the storage or transmission of data. Biometric information, social media profiles, and data on mobile phones can be considered information. Therefore, research for information security covers various fields, such as cryptocurrency and online forensics.
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...cyberprosocial
With the digital world becoming an essential aspect of our connected environment, there is always a risk of cyberattacks. The phrase “CyberAttacks” refers to a broad category of malevolent actions directed towards computer networks, systems, and data. As technology develops, cybercriminals’ strategies also advance with it.
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
Unit 1: Introduction to Cyber Security and various challenges in cyber security
1.1. Overview of Cyber Security,
1.2. Internet Governance – Challenges and Constraints,
1.3. Cyber Threats: - Cyber Warfare-Cyber Crime-Cyber Terrorism-Cyber Espionage,
Cyber Security: A Hands on review on what is cyber security and how to prevent your devices from hacking and data breach. In today's era almost all devices are connected to internet are available for hackers to breach into and do their work. The data breach can be very dangerous and sometimes even more that it can demolish a company or a person.
In this presentation we will discuss about the ways and short description on Cyber Securty and Techniques.
Cybersecurity is the practice of defending computers and servers, mobile devices, electronic systems, networks and data from malicious attacks.
Topic Covered:
Cyber Security Introduction
Online & Offline Identities
Hackers and their types
Cyberwarfare
Cyber Attacks Concepts & Techniques
System, Software & Hardware Vulnerabilities
Security Vulnerabilities Categories
"Advanced Btech CSE Academic IEEE Major Cyber Security Projects in Hyderabad for Final Year Students of Engineering. Computer Science and Engineering latest major Cyber Security Projects
Safeguarding the Digital Realm Understanding CyberAttacks and Their Vital Cou...cyberprosocial
With the digital world becoming an essential aspect of our connected environment, there is always a risk of cyberattacks. The phrase "CyberAttacks" refers to a broad category of malevolent actions directed towards computer networks
Mitisol is the perfect solution for Cyber security and risk management, Cyber security and risk management, Cyber Security Company in Dhaka, Bangladesh.
We are the best instutute for Cyber security courses, Cyber Security Course Training, Advanced Cyber security courses in Dhaka, Bangladesh. So keep visiting our websites to get update on regular basis.
What exactly is internet safety?The process of shielding computers, networks, software applications, critical systems, and data from potential digital threats is known as cybersecurity. Data security is an important part of maintaining customer confidence and complying with regulations. They protect sensitive data from unauthorized access and prevent network activity that would disrupt business operations by utilizing cybersecurity tools and measures. By streamlining digital defenses across people, processes, and technology, organizations implement cybersecurity.How significant is cybersecurity?Digital systems and high-speed connectivity are used by businesses in a variety of industries, including manufacturing, energy, transportation, retail, and customer service. These industries also use digital systems to run their operations at a lower cost. They must safeguard their digital assets and systems from unauthorized access in the same way that they safeguard their physical assets. A cyber attack is the deliberate destruction and unauthorized access to a computer system, network, or connected facility. Confidential data could be leaked, stolen, deleted, or altered by a successful cyberattack. Cybersecurity measures provide the following advantages in addition to protecting against cyberattacks. Stop data breaches or cut costs associated with them Organizations that implement a cybersecurity strategy can reduce the negative effects of cyberattacks, which can have an impact on a company's reputation, finances, operations, and customer trust. Disaster recovery plans, for instance, are initiated by businesses to contain potential intrusions and minimize business disruption.To safeguard sensitive data from potential cyber risks, businesses in particular geographies and industries must adhere to regulatory requirements. For instance, European businesses are required to adhere to the General Data Protection Regulation (GDPR), which mandates the use of appropriate cybersecurity measures to safeguard data privacy.Reduce Emerging Cyber Threats As technology advances, so do cyberattacks. For gaining unauthorized system access, criminals utilize novel tools and devise novel tactics. To keep up with these brand-new and constantly evolving digital attack tools, organizations will implement and upgrade cybersecurity measures. Stop data breaches or cut costs associated with them Organizations that implement a cybersecurity strategy can reduce the negative effects of cyberattacks, which can have an impact
Your Path to YouTube Stardom Starts HereSocioCosmos
Skyrocket your YouTube presence with Sociocosmos' proven methods. Gain real engagement and build a loyal audience. Join us now.
https://www.sociocosmos.com/product-category/youtube/
“To be integrated is to feel secure, to feel connected.” The views and experi...AJHSSR Journal
ABSTRACT: Although a significant amount of literature exists on Morocco's migration policies and their
successes and failures since their implementation in 2014, there is limited research on the integration of subSaharan African children into schools. This paperis part of a Ph.D. research project that aims to fill this gap. It
reports the main findings of a study conducted with migrant children enrolled in two public schools in Rabat,
Morocco, exploring how integration is defined by the children themselves and identifying the obstacles that they
have encountered thus far. The following paper uses an inductive approach and primarily focuses on the
relationships of children with their teachers and peers as a key aspect of integration for students with a migration
background. The study has led to several crucial findings. It emphasizes the significance of speaking Colloquial
Moroccan Arabic (Darija) and being part of a community for effective integration. Moreover, it reveals that the
use of Modern Standard Arabic as the language of instruction in schools is a source of frustration for students,
indicating the need for language policy reform. The study underlines the importanceof considering the
children‟s agency when being integrated into mainstream public schools.
.
KEYWORDS: migration, education, integration, sub-Saharan African children, public school
Improving Workplace Safety Performance in Malaysian SMEs: The Role of Safety ...AJHSSR Journal
ABSTRACT: In the Malaysian context, small and medium enterprises (SMEs) experience a significant
burden of workplace accidents. A consensus among scholars attributes a substantial portion of these incidents to
human factors, particularly unsafe behaviors. This study, conducted in Malaysia's northern region, specifically
targeted Safety and Health/Human Resource professionals within the manufacturing sector of SMEs. We
gathered a robust dataset comprising 107 responses through a meticulously designed self-administered
questionnaire. Employing advanced partial least squares-structural equation modeling (PLS-SEM) techniques
with SmartPLS 3.2.9, we rigorously analyzed the data to scrutinize the intricate relationship between safety
behavior and safety performance. The research findings unequivocally underscore the palpable and
consequential impact of safety behavior variables, namely safety compliance and safety participation, on
improving safety performance indicators such as accidents, injuries, and property damages. These results
strongly validate research hypotheses. Consequently, this study highlights the pivotal significance of cultivating
safety behavior among employees, particularly in resource-constrained SME settings, as an essential step toward
enhancing workplace safety performance.
KEYWORDS :Safety compliance, safety participation, safety performance, SME
Buy Pinterest Followers, Reactions & Repins Go Viral on Pinterest with Socio...SocioCosmos
Get more Pinterest followers, reactions, and repins with Sociocosmos, the leading platform to buy all kinds of Pinterest presence. Boost your profile and reach a wider audience.
https://www.sociocosmos.com/product-category/pinterest/
Multilingual SEO Services | Multilingual Keyword Research | Filosemadisonsmith478075
Multilingual SEO services are essential for businesses aiming to expand their global presence. They involve optimizing a website for search engines in multiple languages, enhancing visibility, and reaching diverse audiences. Filose offers comprehensive multilingual SEO services designed to help businesses optimize their websites for search engines in various languages, enhancing their global reach and market presence. These services ensure that your content is not only translated but also culturally and contextually adapted to resonate with local audiences.
Visit us at -https://www.filose.com/
Unlock TikTok Success with Sociocosmos..SocioCosmos
Discover how Sociocosmos can boost your TikTok presence with real followers and engagement. Achieve your social media goals today!
https://www.sociocosmos.com/product-category/tiktok/
Surat Digital Marketing School is created to offer a complete course that is specifically designed as per the current industry trends. Years of experience has helped us identify and understand the graduate-employee skills gap in the industry. At our school, we keep up with the pace of the industry and impart a holistic education that encompasses all the latest concepts of the Digital world so that our graduates can effortlessly integrate into the assigned roles.
This is the place where you become a Digital Marketing Expert.
Grow Your Reddit Community Fast.........SocioCosmos
Sociocosmos helps you gain Reddit followers quickly and easily. Build your community and expand your influence.
https://www.sociocosmos.com/product-category/reddit/
Enhance your social media strategy with the best digital marketing agency in Kolkata. This PPT covers 7 essential tips for effective social media marketing, offering practical advice and actionable insights to help you boost engagement, reach your target audience, and grow your online presence.
2. INTRODUCTION TO CYBER SECURITY
The technique of protecting internet-connected systems such as computers, servers,
mobile devices, electronic systems, networks, and data from malicious attacks is known as
cybersecurity. We can divide cybersecurity into two parts one is cyber, and the other is security.
Cyber refers to the technology that includes systems, networks, programs, and data.
And security is concerned with the protection of systems, networks, applications, and information.
In some cases, it is also called electronic information security or information technology security.
DEFINATION OF CYBER SECURITY
Cyber Security is the body of technologies, processes, and practices
designed to protect networks, devices, programs, and data from attack, theft,
damage, modification or unauthorized access.
3. WHAT IS CYBER CRIME
* The former descriptions were “computer crime”,
“computer-related crime” or “crime by computer”.
With the pervasion of digital technology, some new terms
Like “high-technology” or “information-age” crime
Were added to thr definition . Also, Internet brought
Other new terms, like “cybercrime’’ and “net” crime
* Other forms include “digital”, “electronic”, “virtual” ,
“IT”, “high-tech” and technology-enabled” crime
4. CYBER LAWS
Cyber Law also called IT Law is the law regarding Information-technology including computers and the
internet. It is related to legal informatics and supervises the digital circulation of information, software,
information security, and e-commerce.
IT law does not consist of a separate area of law rather it encloses aspects of contract, intellectual
property, privacy, and data protection laws. Intellectual property is a key element of IT law. The area of
software license is controversial and still evolving in Europe and elsewhere.
According to the Ministry of Electronics and Information Technology,
Government of India : Cyber Laws yields legal recognition to electronic documents and a structure to
support e-filing and e-commerce transactions and also provides a legal structure to reduce, check cyber
crimes.
IMPORTANCE OF CYBER LAW
• It covers all transactions over the internet.
• It keeps eye on all activities over the internet.
• It touches every action and every reaction in cyberspace
5.
6.
7. Types of Cyber Security
Every organization's assets are the combinations of a variety of different systems.
These systems have a strong cybersecurity posture that requires coordinated efforts across all
of its systems. Therefore, we can categorize cybersecurity in the following sub-domains:
Network Security: It involves implementing the hardware and software to secure a computer
network from unauthorized access, intruders, attacks, disruption, and misuse. This security helps
an organization to protect its assets against external and internal threats.
Application Security: It involves protecting the software and devices from unwanted threats. This
protection can be done by constantly updating the apps to ensure they are secure from attacks.
Successful security begins in the design stage, writing source code, validation, threat modeling,
etc., before a program or device is deployed.
Information or Data Security: It involves implementing a strong data storage mechanism to
maintain the integrity and privacy of data, both in storage and in transit.
Identity management: It deals with the procedure for determining the level of access that each
individual has within an organization.
8. Operational Security: It involves processing and making decisions on handling and securing
data assets.
Mobile Security: It involves securing the organizational and personal data stored on mobile devices such
as cell phones, computers, tablets, and other similar devices against various malicious threats. These
threats are unauthorized access, device loss or theft, malware, etc.
Cloud Security: It involves in protecting the information stored in the digital environment or cloud
architectures for the organization. It uses various cloud service providers such as AWS, Azure, Google,
etc., to ensure security against multiple threats.
Disaster Recovery and Business Continuity Planning: It deals with the processes, monitoring, alerts,
and plans to how an organization responds when any malicious activity is causing the loss of operations
or data. Its policies dictate resuming the lost operations after any disaster happens to the same
operating capacity as before the event.
User Education: It deals with the processes, monitoring, alerts, and plans to how an organization
responds when any malicious activity is causing the loss of operations or data. Its policies dictate
resuming the lost operations after any disaster happens to the same operating capacity as before the
event.
9. IMPORTANCE OF CYBER SECURITY
Today we live in a digital era where all aspects of our lives depend on the network, computer
and other electronic devices, and software applications. All critical infrastructure such as the
banking system, healthcare, financial institutions, governments, and manufacturing industries
use devices connected to the Internet as a core part of their operations. Some of their
information, such as intellectual property, financial data, and personal data, can be sensitive
for unauthorized access or exposure that could have negative consequences. This information
gives intruders and threat actors to infiltrate them for financial gain, extortion, political or
social motives, or just vandalism.
Cyber-attack is now an international concern that hacks the system, and other security attacks
could endanger the global economy. Therefore, it is essential to have an excellent cybersecurity
strategy to protect sensitive information from high-profile security breaches. Furthermore, as
the volume of cyber-attacks grows, companies and organizations, especially those that deal
with information related to national security, health, or financial records, need to use strong
cybersecurity measures and processes to protect their sensitive business and personal
information.
10. CYBER SECURITY GOALS
Cyber Security main objective is to ensure data protection. The security community
provides a triangle of three related principles to protect the data from cyber-attacks. This
principle is called the CIA triad. The CIA model is designed to guide policies for an
organization's information security infrastructure. When any security breaches are
found, one or more of these principles has been violated.
We can break the CIA model into three parts: Confidentiality, Integrity, and Availability.
It is actually a security model that helps people to think about various parts of IT
security. Let us discuss each part in detail.
11. Confidentiality
Confidentiality is equivalent to privacy that avoids unauthorized access of
information. It involves ensuring the data is accessible by those who are allowed to use
it and blocking access to others. It prevents essential information from reaching the
wrong people. Data encryption is an excellent example of ensuring confidentiality.
Integrity
This principle ensures that the data is authentic, accurate, and safeguarded from
unauthorized modification by threat actors or accidental user modification. If any
modifications occur, certain measures should be taken to protect the sensitive data from
corruption or loss and speedily recover from such an event. In addition, it indicates to make
the source of information genuine.
Availability
This principle makes the information to be available and useful for its authorized
people always. It ensures that these accesses are not hindered by system
malfunction or cyber-attacks.
12. TYPES OF CYBER SECURITY THREATS
A threat in cybersecurity is a malicious activity by an individual or organization to
corrupt or steal data, gain access to a network, or disrupts digital life in general. The
cyber community defines the following threats available today:
13. MALWARE
Virus: It is a malicious piece of code that spreads from one device to another. It
can clean files and spreads throughout a computer system, infecting files, stoles
information, or damage device.
Spyware: It is a software that secretly records information about user activities
on their system. For example, spyware could capture credit card details that can
be used by the cybercriminals for unauthorized shopping, money withdrawing,
etc.
Trojans: It is a type of malware or code that appears as legitimate software or
file to fool us into downloading and running. Its primary purpose is to corrupt or
steal data from our device or do other harmful activities on our network.
Ransomware: It's a piece of software that encrypts a user's files and data on a
device, rendering them unusable or erasing. Then, a monetary ransom is
demanded by malicious actors for decryption.
Worms: It is a piece of software that spreads copies of itself from device to device
without human interaction. It does not require them to attach themselves to any
program to steal or damage the data.
14. Adware: It is an advertising software used to spread malware and displays
advertisements on our device. It is an unwanted program that is installed
without the user's permission. The main objective of this program is to generate
revenue for its developer by showing the ads on their browser.
Botnets: It is a collection of internet-connected malware-infected devices that
allow cybercriminals to control them. It enables cybercriminals to get credentials
leaks, unauthorized access, and data theft without the user's permission.
PHISHING
Phishing is a type of cybercrime in which a sender seems to come from a genuine
organization like PayPal, eBay, financial institutions, or friends and co-workers.
They contact a target or targets via email, phone, or text message with a link to
persuade them to click on that links. This link will redirect them to fraudulent
websites to provide sensitive data such as personal information, banking and credit
card information, social security numbers, usernames, and passwords. Clicking on
the link will also install malware on the target devices that allow hackers to control
devices remotely.
15. A man-in-the-middle attack is a type of cyber threat (a form of eavesdropping attack) in
which a cybercriminal intercepts a conversation or data transfer between two individuals.
Once the cybercriminal places themselves in the middle of a two-party communication, they
seem like genuine participants and can get sensitive information and return different
responses. The main objective of this type of attack is to gain access to our business or
customer data. For example, a cybercriminal could intercept data passing between the target
device and the network on an unprotected Wi-Fi network.
MAIN-IN-THE-MIDDLE [MITM] ATTACK
DISTRIBUTED DENIAL OF SERVICE [DDOS]
It is a type of cyber threat or malicious attempt where cybercriminals disrupt targeted
servers, services, or network's regular traffic by fulfilling legitimate requests to the target or
its surrounding infrastructure with Internet traffic. Here the requests come from several IP
addresses that can make the system unusable, overload their servers, slowing down
significantly or temporarily taking them offline, or preventing an organization from carrying
out its vital functions.
16. BRUTE FORCE
A brute force attack is a cryptographic hack that uses a trial-and-error method to guess
all possible combinations until the correct information is discovered. Cybercriminals
usually use this attack to obtain personal information about targeted passwords, login
info, encryption keys, and Personal Identification Numbers (PINS).
SQUIL INJECTION [SQLI]
SQL injection is a common attack that occurs when cybercriminals use malicious SQL
scripts for backend database manipulation to access sensitive information. Once the
attack is successful, the malicious actor can view, change, or delete sensitive company
data, user lists, or private customer details stored in the SQL database.
DOMIAN NAME SYSTEM [DNS] ATTACK
A DNS attack is a type of cyberattack in which cyber criminals take advantage of
flaws in the Domain Name System to redirect site users to malicious websites
(DNS hijacking) and steal data from affected computers. It is a severe
cybersecurity risk because the DNS system is an essential element of the internet
infrastructure.
17. LATEST CYBER THREATS
The following are the latest cyber threats reported by the U.K., U.S., and
Australian governments:
ROMANCE SCAMS
The U.S. government found this cyber threat in February 2020. Cybercriminals used this
threat through dating sites, chat rooms, and apps. They attack people who are seeking a new
partner and duping them into giving away personal data.
DRIDEX MALWARE
It is a type of financial Trojan malware identifies by the U.S. in December 2019 that affects the
public, government, infrastructure, and business worldwide. It infects computers through
phishing emails or existing malware to steal sensitive information such as passwords, banking
details, and personal data for fraudulent transactions. The National Cyber Security Centre of
the United Kingdom encourages people to make sure their devices are patched, anti-virus is
turned on and up to date, and files are backed up to protect sensitive data against this attack.
18. EMOTET MALWARE
Emotet is a type of cyber-attack that steals sensitive data and also installs other malware
on our device. The Australian Cyber Security Centre warned national organizations about
this global cyber threat in 2019.
The following are the system that can be affected by security breaches and attacks:
Education: A cybercriminals target educational institutions to get their confidential research
data and information of students and employees.
Communication: Cyber attackers can use phone calls, emails, text messages, and messaging
apps for cyberattacks.
Finance: This system deals with the risk of financial information like bank and credit card
detail. This information is naturally a primary target for cyber attackers.
Governments: The cybercriminal generally targets the government institutions to get
confidential public data or private citizen information.
Transportation: In this system, cybercriminals generally target connected cars, traffic control
systems, and smart road infrastructure.
Healthcare: A cybercriminal targets the healthcare system to get the information stored at a
19. CYBER SAFTEY TIPS
Let us see how to protect ourselves when any cyberattacks happen. The following are the popular
cyber safety tips:
Conduct cybersecurity training and awareness: Every organization must train their staffs on
cybersecurity, company policies, and incident reporting for a strong cybersecurity policy to be
successful. If the staff does unintentional or intentional malicious activities, it may fail the best
technical safeguards that result in an expensive security breach. Therefore, it is useful to conduct
security training and awareness for staff through seminars, classes, and online courses that reduce
security violations.
Update software and operating system: The most popular safety measure is to update the software
and O.S. to get the benefit of the latest security patches.
Use anti-virus software: It is also useful to use the anti-virus software that will detect and removes
unwanted threats from your device. This software is always updated to get the best level of
protection.
Perform periodic security reviews: Every organization ensures periodic security inspections of all
software and networks to identify security risks early in a secure environment. Some popular
examples of security reviews are application and network penetration testing, source code reviews,
architecture design reviews, and red team assessments. In addition, organizations should prioritize
and mitigate security vulnerabilities as quickly as possible after they are discovered.
20. Use strong passwords: It is recommended to always use long and various combinations of
characters and symbols in the password. It makes the passwords are not easily guessable.
Do not open email attachments from unknown senders: The cyber expert always advises not
to open or click the email attachment getting from unverified senders or unfamiliar websites
because it could be infected with malware.
Avoid using unsecured Wi-Fi networks in public places: It should also be advised not to use
insecure networks because they can leave you vulnerable to man-in-the-middle attacks.
Backup data: Every organization must periodically take backup of their data to ensure all
sensitive data is not lost or recovered after a security breach. In addition, backups can help
maintain data integrity in cyber-attack such as SQL injections, phishing, and ransomware.
21. BENEFITS OF CYBER SECURIYT
The following are the benefits of implementing and maintaining cybersecurity:
* Cyberattacks and data breach protection for businesses.
* Data and network security are both protected.
* Unauthorized user access is avoided.
*After a breach, there is a faster recovery time.
* End-user and endpoint device protection.
* Regulatory adherence.
* Continuity of operations.
* Developers, partners, consumers, stakeholders, and workers have more faith in the company's
reputation and trust.
22. DISADVANTAGES OF CYBER SECURITY
* Net Affordable To Everyone
* Can Be Complicated
* Security Patches May Backfire
* Need Constant Monitoring
* Slow Down The System
* Can Be Risky
* Incorrect Configured System Blocks Firewall
* Only Some Updations Are Suitable For The system
* Not A Time Thing