0% found this document useful (0 votes)
42 views4 pages

1) Cyber Security

Unit of SCT

Uploaded by

dungatejas77
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views4 pages

1) Cyber Security

Unit of SCT

Uploaded by

dungatejas77
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

What is Cybersecurity?

Cybersecurity refers to the practice of protecting systems, networks, and data from digital
attacks, unauthorized access, damage, or theft. It involves a variety of technologies,
processes, and practices designed to safeguard critical infrastructure, sensitive information,
and individuals from cyber threats.

Why is Cybersecurity Important?


1. Protection of Sensitive Data:
In an era where data is a valuable asset, cybersecurity ensures that personal, financial, and
organizational information is kept secure from unauthorized access or exposure. This
includes protecting data such as Social Security numbers, credit card information, intellectual
property, and confidential business documents.
2. Preventing Financial Loss:
Cyber-attacks, such as ransomware and phishing scams, can result in significant financial
losses for individuals and organizations. Cybersecurity measures help prevent these attacks,
reducing the risk of financial damage.
3. Ensuring Business Continuity:
Cyber-attacks can disrupt business operations, causing downtime, loss of productivity, and
damage to reputation. Implementing robust cybersecurity strategies helps organizations
maintain operational continuity and recover quickly from any disruptions.
4. Protecting National Security:
Cybersecurity is crucial for protecting a nation's critical infrastructure, including power
grids, transportation systems, and communication networks. Cyber-attacks on these systems
can have devastating consequences, making cybersecurity a key component of national
defense.
5. Safeguarding Privacy:
With the increasing use of digital services, personal privacy is more at risk than ever.
Cybersecurity practices help protect individuals' privacy by securing their online activities
and personal data from being accessed or misused by malicious actors.
6. Compliance with Regulations:
Many industries are subject to regulations that require specific cybersecurity measures to be
in place, such as the General Data Protection Regulation (GDPR) in Europe or the Health
Insurance Portability and Accountability Act (HIPAA) in the United States. Compliance with
these regulations is mandatory, and cybersecurity ensures that organizations meet these legal
obligations.
7. Preventing Cybercrime:
Cybercrime, including hacking, identity theft, and fraud, is a growing threat. Effective
cybersecurity measures help deter cybercriminals and reduce the risk of cybercrime affecting
individuals and businesses.
Key Components of Cybersecurity:
1. Network Security:
Protects the integrity, confidentiality, and availability of data as it is transmitted over or
accessed through networks.
2. Application Security:
Focuses on keeping software and devices free from threats, ensuring that applications are
secure from the development phase through their lifecycle.
3. Information Security:
Protects the privacy and integrity of data, both in storage and in transit.
4. Endpoint Security:
Protects individual devices, such as computers, smartphones, and tablets, from
cybersecurity threats.
5. Cloud Security:
Secures data and applications that are hosted in cloud environments, preventing
unauthorized access and data breaches.
6. Identity and Access Management (IAM):
Ensures that only authorized users have access to specific systems and data, typically
through strong authentication and access control mechanisms.
7. Disaster Recovery and Business Continuity Planning:
Ensures that an organization can recover quickly from a cyber attack or other disaster,
minimizing downtime and data loss.
8. User Education and Awareness:
Educates individuals about the risks of cyber threats and how to protect themselves, which
is crucial since human error is often a significant factor in successful cyber-attacks.

Categories of Cyber-attacks:
Cyber-attacks can be categorized based on their objectives, methods, and targets.
Understanding these categories helps in identifying potential threats and implementing
appropriate defense mechanisms. Here are some common categories of cyber-attacks:
1. Malware Attacks
Malware (short for "malicious software") refers to any software intentionally designed to
cause damage to a computer, server, client, or network.
Viruses: Malicious programs that attach themselves to legitimate files and spread to other
files and systems.
Worms: Standalone malware that replicates itself to spread to other computers without
human intervention.
Trojan Horses: Malicious programs disguised as legitimate software to trick users into
installing them.
Ransomware: Malware that encrypts a victim's data and demands payment (ransom) for
the decryption key.
Spyware: Software that secretly monitors user activity and gathers information without
their consent.
Adware: Malware that automatically displays or downloads advertising material when a
user is online.
2. Phishing Attacks
Phishing is a type of social engineering attack where attackers deceive individuals into
providing sensitive information (such as passwords, credit card numbers) by pretending to be
a trustworthy entity.
Email Phishing: Attackers send fraudulent emails that appear to be from reputable sources.
Spear Phishing: Targeted phishing attacks aimed at a specific individual or organization.
Whaling: Phishing attacks aimed at high-profile individuals such as executives or
celebrities.
Vishing (Voice Phishing): Phishing attacks conducted over the phone.
Smishing (SMS Phishing): Phishing attacks conducted via SMS (text messages).
3. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
DoS Attacks: Attackers flood a target system with excessive requests, overwhelming it and
rendering it unable to function properly.
DDoS Attacks: Similar to DoS attacks, but launched from multiple compromised systems
(botnets), making it more difficult to stop.
4. Man-in-the-Middle (MitM) Attacks
In MitM attacks, attackers secretly intercept and relay communications between two parties
who believe they are directly communicating with each other.
Session Hijacking: Attackers steal a session token to impersonate the user and gain
unauthorized access.
Eavesdropping: Attackers listen to or intercept communications without the consent of the
communicating parties.
5. SQL Injection Attacks
In SQL injection attacks, attackers exploit vulnerabilities in web applications to inject
malicious SQL statements, allowing them to manipulate the backend database.
Classic SQL Injection: Attackers insert or "inject" malicious code into a query.
Blind SQL Injection: Attackers infer database information by asking true or false
questions to the database.
6. Zero-Day Exploits
Zero-day exploits are attacks that target previously unknown vulnerabilities in software,
hardware, or firmware, giving developers "zero days" to fix the issue before it's exploited.
7. Advanced Persistent Threats (APTs)
APTs involve a prolonged and targeted cyber attack in which an intruder gains access to a
network and remains undetected for an extended period, often to steal sensitive data.
Phases of APTs: Initial intrusion, expansion of access, data exfiltration, and maintaining
persistence.
8. Insider Threats
Insider threats involve attacks from within the organization, where current or former
employees, contractors, or business partners misuse their access to compromise the security
of the organization.
Intentional Insider Threats: Malicious activities performed by insiders with the intent to
harm the organization.
Unintentional Insider Threats: Security breaches caused by careless or negligent insiders.
9. Social Engineering Attacks
Social engineering involves manipulating individuals into divulging confidential
information or performing actions that compromise security.
Pretexting: Attackers create a fabricated scenario (pretext) to trick the victim into
providing information.
Baiting: Attackers offer something enticing to lure victims into a trap, such as a free
download that installs malware.
Tailgating: Gaining unauthorized access to a physical location by following someone with
authorized access.
10. Credential-based Attacks
Credential-based attacks involve stealing or guessing user credentials (usernames,
passwords) to gain unauthorized access to systems.
Brute Force Attack: Attackers try every possible combination of passwords until they find
the correct one.
Credential Stuffing: Attackers use lists of stolen usernames and passwords to gain access
to multiple accounts.
11. Ransomware Attacks
Ransomware is a type of malware that encrypts the victim's data and demands a ransom for
the decryption key. It can spread through phishing emails, malicious downloads, or
vulnerabilities in software.
12. Cross-Site Scripting (XSS) Attacks
In XSS attacks, attackers inject malicious scripts into webpages viewed by other users.
These scripts can be used to steal cookies, session tokens, or other sensitive information.

You might also like