2. What is Cyber
Security?
The technique of protecting internet- connected
systems such as computers, servers,mobile
devices, Electronic systems,, networks, and data
from malicious attacks is known as cybersecurity.
By applying Cyber
security Methods.
3. Why it is needed?
With so much good
coming from technology
it can be hard to believe
that potential threats
lurk behind every device
and platform . A steady
rise in cyber crime
highlights the flaws in
devices and services
we’ve come to depend
on. This concern
focuses to ask what
cyber security is why
it’s essential and what
to learn about it.
4. Types of Cyber crime or threats
(i) Malware
(ii) Phishing
(iii) Password attacks
(iv) DDOS (Distributed denial of service)
(v) Man in the middle
(vi) Drive by downloads
(vii) Mal-advertising
(viii) Rogue Software
7. (ii) Phishing
Phishing is a fraudulent
practice in which an attacker
masquerades as a reputable
entity or person in an email
or other form of
communication. Attackers
commonly use phishing emails
to distribute malicious links
or attatchments that can
extract login credentials ,
account numbers and other
personal information from
victims.
8. (ii)Password attacks
Password attack is a type of cyberattack
where hackers attempt to access a file folder
account or computer secured with a password.
password attacks in cyber security require
special techniques and software. If a hacker is
close to you they may try guessing your
password using a combination of names
hobbies essential years or numbers.
If that doesn’t work they use specialised
applications that scan through a list of words
many people use as passwords. Surprisingly
over 75% of the internet population set
password consisting of the first 500 words
only.
With this in mind imagine how easy it is for
malicious actors to gain access to your crucial
information!
9. (iv) DDoS(Distributed denial of service)
It is a cybercrime in which
the attacker floods a server
with internet traffic to
prevent users from accessing
connected online services with
sites. It is a malicious
attempt to disrupt the normal
traffic of a targeted server
service or network by
overwhelming the target or
its surrounding infrastructure
with a flood of internet of
traffic.
10. (v) Man in the middle
A man in the middle (MITM)
attack is a general term for
when a perpetrator positions
himself in a conversation
between a user and an
application-either to eavesdrop
or to impersonate one of the
parties, making it appear as if
a normal exchange of
information is underway.
The goal of an attack is to
steal personal information,
such as login credentials,
account details and credit card
numbers.
11. (vi) Drive by downloads
A drive by download refers to the
unintentional download of malicious code
onto a computer or mobile device that
exposes user to different types of threats.
What sets this type of attack apart from
others is that users need not click on
anything to initiate the download Simply
accessing or browsing a website can
activate to initiate the download.
The malicious code is designes to download
malicious files onto the victim’s PC without
the user being aware that anything
untoward has happened.
12. (vii) Mal-advertising
Mal-advertising combines the
words “malicious advertising”
to describe “the practice of
using advertisements to
distribute malware. We’re
accustomed to recognising it
in pop-ups , or ads in the
margins begging us to click,
offering a surprise , and
distracting us from otherwise
enjoyable game of tetris.
13. (Viii) Rogue Software
Rogue security software is a
form of malware that’s
designed to trick victims
into thinking their computer
or device has been infected
with a virus. Like legitimate
antivirus products, it
displays pop-up messages
telling the victim that his or
her computer or device has
been infected with a virus.
16. Cyber Security Methods
1. Use Strong password
(i) Use a combination of capital and lower-case letters
,numbers and symbols.
(ii) making it between eight and twelve characters long.
(iii) avoid the use of personal data.
(iv) changing it regularly.
(v) never use it in case of multiple accounts.
(vi) using two-factor authentication.
19. Don’t click on suspicious emails,
websites and pop-ups.
4.
20. 5. Use security software.
Security software is designed to protect and secure servers, laptops, mobile devices,
and networks from unauthorized access, intrusions, viruses, and other threats.Types
of security software include anti-virus software, firewall software, network security
software, Internet security software, malware/spamware removal and protection
software, cryptographic software, and more.
24. 9. Download softwares or any data from
trusted and authorised sources only.
In practice if a software is getting many honest good reviews it is probably safe.