Cyber Security
Cyber Security
Cyber Security
Cyber security is the most concerned matter as cyber threats and attacks are overgrowing. Attackers are
now using more sophisticated techniques to target the systems. Individuals, small-scale businesses or
large organization, are all being impacted. So, all these firms whether IT or non-IT firms have understood
the importance of Cyber Security and focusing on adopting all possible measures to deal with cyber
threats.
Cyber security is the body of technologies, processes, and practices designed to protect networks,
computers, programs and data from attack, damage or unauthorized access.
Cyber security is the protection of Internet-connected systems, including hardware, software, and data
from cyber-attacks.
Cyber is related to the technology which contains systems, network and programs or data.
Whereas security related to the protection which includes systems security, network security and
application and information security.
Listed below are the reasons why cyber security is so important in what’s become a predominant digital
world:
In addition to financial damage suffered by the business, a data breach can also inflict untold
reputational damage.
Cyber-attacks these days are becoming progressively destructive. Cybercriminals are using more
sophisticated ways to initiate cyber-attacks.
Regulations such as GDPR are forcing organizations into taking better care of the personal data they
hold. Because of the above reasons, cyber security has become an important part of the business and
the focus now is on developing appropriate response plans that minimize the damage in the event of a
cyber attack.
Two-factor authentication
Biometric verification
Security tokens
1) Web-based attacks
2) System-based attacks
Web-based attacks These are the attacks which occur on a website or web applications. Some of the
important web-based attacks are as follows
1. Injection attacks It is the attack in which some data will be injected into a web application to
manipulate the application and fetch the required information. Example- SQL Injection, code Injection,
log Injection, XML Injection etc.
2. DNS Spoofing DNS Spoofing is a type of computer security hacking. Whereby a data is introduced
into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to
the attackers computer or any other computer. The DNS spoofing attacks can go on for a long period of
time without being detected and can cause serious security issues.
3. Session Hijacking It is a security attack on a user session over a protected network. Web
applications create cookies to store the state and user sessions. By stealing the cookies, an attacker can
have access to all of the user data.
4. Phishing Phishing is a type of attack which attempts to steal sensitive information like user login ID
and credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic
communication.
5. Brute force It is a type of attack which uses a trial and error method. This attack generates a large
number of guesses and validates them to obtain actual data like user password and personal
identification number. This attack may be used by criminals to crack encrypted data, or by security,
analysts to test an organization's network security.
6. Dictionary attacks This type of attack stored the list of a commonly used password and validated
them to get original password.
7. URL Interpretation It is a type of attack where we can change the certain parts of a URL, and one
can make a web server to deliver web pages for which he is not authorized to browse.
8. File Inclusion attacks It is a type of attack that allows an attacker to access unauthorized or
essential files which is available on the web server or to execute malicious files on the web server by
making use of the include functionality.
9. Man in the middle attacks It is a type of attack that allows an attacker to intercepts the connection
between client and server and acts as a bridge between them. Due to this, an attacker will be able to
read, insert and modify the data in the intercepted connection.
10. System-based attacks These are the attacks which are intended to compromise a computer or a
computer network. Some of the important system-based attacks are as follows
1. Virus It is a type of malicious software program that spread throughout the computer files without
the knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting
copies of itself into other computer programs when executed. It can also execute instructions that cause
harm to the system.
2. Worm It is a type of malware whose primary function is to replicate itself to spread to uninfected
computers. It works same as the computer virus. Worms often originate from email attachments that
appear to be from trusted senders.
3. Trojan horse It is a malicious program that occurs unexpected changes to computer setting and
unusual activity, even when the computer should be idle. It misleads the user of its true intent. It
appears to be a normal application but when opened/executed some malicious code will run in the
background.
4. Backdoors It is a method that bypasses the normal authentication process. A developer may create a
backdoor so that an application or operating system can be accessed for troubleshooting or other
purposes.
5. Bots A bot (short for "robot") is an automated process that interacts with other network services.
Some bots program run automatically, while others only execute commands when they receive specific
input. Common examples of bots program are the crawler, chatroom bots, and malicious bots.