0% found this document useful (0 votes)
35 views3 pages

Paper Format

Format

Uploaded by

Ankush Pawar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views3 pages

Paper Format

Format

Uploaded by

Ankush Pawar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

TITLE OF PAPER

Author’s:1, 2
1’[email protected] , 2’[email protected]
Guide1:
Guide2:
College Name

ABSTRACT KEYWORDS
Cyberattacks, phishing emails, cyber threats,
Cybersecurity is becoming increasingly important as
vulnerabilities, multifactor authentication,
more and more people and organizations rely on
mitigation, cybersecurity, vital .
technology to store and transmit sensitive
information. Cyberattacks can come in many forms, I. CONTENT

such as phishing emails, and denial-of-service How does Cyber Security make working son
attacks. Therefore, it is crucial for individuals and easy?
organizations to stay vigilant and take appropriate
Cybersecurity is essential not just for individuals and
measures to protect themselves from cyber threats.
organizations, but also for ensuring national security
To effectively use cyber security measures,
and public safety. Government agencies and military
individuals and organizations need to be aware of the
institutions depend on robust cybersecurity to defend
potential threats and vulnerabilities they face, and
against cyber-attacks, espionage, and to preserve the
take appropriate actions to mitigate those risks. This
integrity of sensitive data and critical infrastructure.
includes regularly updating software and hardware,
using strong passwords and multifactor
As our world becomes increasingly digital and
authentication, limiting access to sensitive data, and
interconnected, the importance of cybersecurity
providing security awareness training to employees.
continues to grow. With more devices connected to
the internet and a higher volume of data shared
Overall, cyber security is a critical aspect of modern
online, the threat of cyber-attacks and data breaches
life and essential for protecting sensitive information
rises, making it crucial for everyone to prioritize
and ensuring the proper functioning of vital systems
cybersecurity. Both individuals and organizations
and infrastructure. By staying informed and
must take proactive steps to safeguard their digital
implementing best practices, individuals and
assets. In essence, cybersecurity is a fundamental
organizations can help reduce the risks posed by
aspect of our keeping up with evolving threats, we
cyber threats and safeguard their valuable
can help maintain a secure and safe digital space for
data and assets.
all.
in internet infrastructure, and their impact can be minimal effort.Defending against DoS and DDoS
severe, causing financial losses and damaging attacks involves various strategies, including
reputations. Attackers often use automated tools to detection systems to identify attacks early,
launch these attacks, which can be initiated with prevention measures to block malicious traffic, and
1
traceback techniques to find the source of the attack.
However, the increasing number of vulnerable Fig 4 : Man-in-the-Middle Attack
devices on the internet and the evolving nature of Prevention
these attacks present ongoing challenges for Ensure HTTPS Usage: Always connect to websites
cybersecurity professionals. Understanding these using HTTPS (Hypertext Transfer Protocol Secure)
threats is crucial for developing effective defenses instead of HTTP. HTTPS encrypts the
and ensuring the availability of online services. communication between your browser and the
website, making it significantly more difficult for
attackers to intercept or access your data.
Fig 3 : Denial of Service (DoS) and Distributed Avoid Unsecured Networks: Refrain from using
Denial of Service (DDoS) public or unsecured Wi-Fi networks for any activities
that involve sensitive information, such as online
Prevention banking or shopping, to prevent potential security
Limit Request Rates: Set a cap on the number of risks.

requests a server can handle from a single IP address 4. SQL Injection


within a certain time frame. This helps prevent SQL Injection (SQLi) is a cyberattack in which
overloading the server and reduces the chances of attackers exploit security weaknesses in a web
resource depletion in a DoS or DDoS attack. application's database by inserting harmful SQL code
Connection Throttling: Control the number of into input fields, such as forms or URL parameters.
simultaneous connections a server can manage at This happens when the application does not correctly
once to avoid excessive traffic that could overwhelm
and crash the server.

3. MITM
A Man-in-the-Middle (MitM) attack is a cyberattack
where an attacker covertly intercepts and possibly
alters the communication between two parties, such
as a user and a server, without their knowledge. By
positioning themselves between the two, the attacker
can listen in, steal sensitive data, or manipulate the
exchanged information.

How a Man-in-the-Middle Attack Happens: The


attacker gains access to the communication between
two parties by various means. This can include
hijacking a public Wi-Fi connection, capturing data
over an unsecured network, or using malicious
software to access the communication.
2
validate or sanitize the user's input, giving the level functions. To defend against SQL injection,
attacker direct access to the database. With SQL developers should implement techniques like
injection, attackers can: prepared statements, parameterized queries, and
Access private information: Extract sensitive data rigorous input validation to prevent malicious code
such as login credentials, financial details, or from altering SQL commands.
personal records.
Alter the database: Add, modify, or delete common passwords or phrases, known as a
information stored in the database. "dictionary," to guess the password. Features: This
Bypass authentication: Gain unauthorized entry method is generally quicker than brute force attacks
into user accounts or administrative areas. because it targets frequently used passwords or
Perform administrative actions: Potentially gain predictable patterns.
control over the entire database and perform high-
[1]. Cyber Security: Understanding Cyber Crimes-
Sunit Belapure Nina Godbole
Prevention
To enhance password security, it's important to use
strong, complex passwords that are hard to guess or
crack. A robust password should include a
combination of uppercase and lowercase letters,
numbers, and special characters such as !, @, #, or $
Additionally, implement and enforce password
policies that mandate periodic changes and prohibit
easily guessable passwords. These policies should
specify A minimum length for passwords, such as at
least 12-character Complexity requirements to
ensure passwords are sufficiently diverse Regular
expiration of passwords, such as every 90 days.

II. CONCLUSION
It is essential to be aware of the cybersecurity threats
and know how to protect oneself and others from
them. Our courses can provide valuable knowledge
and skills on cybersecurity to help individuals
become more proficient in defending against cyber

III. REFERENCES

You might also like