0% found this document useful (0 votes)
105 views13 pages

Cyber Security Best Practices

The document outlines various types of cyber threats, including malware, ransomware, phishing, data breaches, banking fraud, and cyber espionage, detailing how they operate and their potential impacts. It emphasizes the importance of cybersecurity best practices, such as using strong passwords, maintaining updated systems, and being cautious of fraudulent communications. The conclusion stresses the need for individuals to be aware of these threats and to adopt protective measures to safeguard their online privacy and security.

Uploaded by

aadyasingh.2254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
105 views13 pages

Cyber Security Best Practices

The document outlines various types of cyber threats, including malware, ransomware, phishing, data breaches, banking fraud, and cyber espionage, detailing how they operate and their potential impacts. It emphasizes the importance of cybersecurity best practices, such as using strong passwords, maintaining updated systems, and being cautious of fraudulent communications. The conclusion stresses the need for individuals to be aware of these threats and to adopt protective measures to safeguard their online privacy and security.

Uploaded by

aadyasingh.2254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Cyber security

best practices
an important aspect while
working on computer
Types of Cyber threats to a user
In the simplest sense, a cybersecurity threat, or cyberthreat, is an indication that a hacker or malicious actor is
attempting to gain unauthorized access to a network for launching a cyberattack. ...

MALWARE
Data Breeches
Harms computers ,
network and servers gaining of private
informations using
unauthorized links

Ransomware Banking fraud


prevents users
from accessing use of illegal
their files meansto obtain
money,assets
Cyber
Phishing
fraud done using Espionage
means like mail use of digital techniques
or calls to obtain confidential
information
MALWARE
• Malware, or malicious software, is a program or file
that cybercriminals create to harm computers,
networks, or servers.

• Malware can steal data, encrypt or delete


sensitive information, and disrupt an organization's
operations

• It can also alter core computing functions, monitor


user activity, and redirect users to malicious
websites.
Types of Malware
v Spyware :-Enters a user's computer, gathers data, and sends it to
third parties without their consent. Spyware can monitor or control
your computer use, such as sending pop-up ads, redirecting your
computer to unwanted websites, or recording your keystrokes

v Adware:- Displays unwanted advertisements on your computer,


such as pop-up ads, banner ads, or sponsored content

v Rootkit:-Gives malicious actors remote control of a victim's


computer with full administrative privileges.
Ransomware
Ø Ransomware is a type of malware that prevents
users or organizations from accessing their files by
encrypting them

Ø Attackers often demand ther payment through


cryptocurrency

Ø It blocks the access to the victims peronal data


unless the ransom is paid

Ø Some of the most common ways ransomware is


delivered are through phishing emails, drive-by
downloads, exploit kits and RDP exploits.

Ø Comprehensive antivirus and anti-malware software


are the most common ways to defend against
ransomware. They can scan, detect, and respond to
cyber threats.
PHISHING
v Phishing is a cyber security scam that involves
sending fraudulent messages that appear to come
from a legitimate source, such as an email or text
message.

v The goal of phishing is to trick the victim into


revealing personal or confidential information, such
as login credentials, that can be used for illegal
purposes

v Attackers may also use phishing to install malware


on the victim's device or steal money

v there are several types of phishing.


Types of Phishing

Ø There are several types of phishing attacks,


including
Ø Spear phishing
A targeted attack that impersonates someone the victim
knows, such as a friend, colleague, or boss, to steal
sensitive information or infect their device with malware
ØSmishing
A mobile device-oriented attack that uses text messages to
trick the victim into clicking a link, calling a number, or
sending an email, and then providing private data.
ØVishing
Also known as voice phishing, this attack uses caller ID
spoofing to make the victim believe the call is from a
trusted source, and then uses IVR to make it difficult for
authorities to trace the attacker
Data Breeches
v A data breach is any security incident in which
unauthorized parties access sensitive or
confidential information, including personal data
(Social Security numbers, bank account numbers,
healthcare data) and corporate data (customer
records, intellectual property, financial information)

v The terms "data breach" and "breach" are often


used interchangeably with "cyberattack." However,
not all cyberattacks are data breaches. Data
breaches include only those security breaches
where someone gains unauthorized access to data.
How do Data Breeches happen ?

Data breaches are caused by:

Ø Innocent mistakes, such as an employee emailing confidential


information to the wrong person.

Ø Malicious insiders, including angry or laid-off employees who


want to hurt the company and greedy employees who want to
profit off the company's data.

Ø Hackers, malicious outsiders who commit intentional


cybercrimes to steal data. Hackers can act as lone operators
or part of an organized rin
Banking Frauds
Ø There are various types of bank fraud, and they keep evolving as the world leans more toward
technology enhancement as fraudsters hatch new methods of obtaining cash illegally. Some
types of bank fraud include:
Ø Identity theft is acquiring another person's private information like social security numbers and
street addresses, then using it to obtain money fraudulently. For example, a scammer uses
someone's driver's license information to obtain a loan from that person's bank.
Ø Credit card fraud involves acquiring a person's credit card information and using it to
purchase items. For example, scammers obtain someone's credit card information, then use it
to purchase goods on Amazon, and then bill it to the cardholder.
Ø Check fraud is the form of fraud that involves illegitimately using checks to commit fraudulent
activities such as forging checks. For example, a fraudster can access someone's check, forge
that person's signature, and table it at the bank to obtain cash.
Ø Internet fraud is electronically scamming or spying on people to obtain their personal
information and use it for fraudulent activities. For example, a scammer uses spyware to obtain
an individual's bank account logins and then uses the information to transfer that person's cash
to another account.
Cyber Espionage
Ø Cyber espionage, or cyber spying, is a type of cyberattack in which an unauthorized user
attempts to access sensitive or classified data or intellectual property (IP) for economic gain,
competitive advantage or political reasons.

Ø Why Is Cyber Espionage Used?

Ø Cyber espionage is primarily used as a means to gather sensitive or classified data, trade
secrets or other forms of IP that can be used by the aggressor to create a competitive
advantage or sold for financial gain. In some cases, the breach is simply intended to cause
reputational harm to the victim by exposing private information or questionable business
practices.

Ø Cyber espionage attacks can be motivated by monetary gain; they may also be deployed in
conjunction with military operations or as an act of cyber terrorism or cyber warfare. The impact
of cyber espionage, particularly when it is part of a broader military or political campaign, can
lead to disruption of public services and infrastructure, as well as loss of life.
How can these threats be prevented ?
v Ensure Your system is Up-to-date. ...

v Use Full Service Internet Security Suite. ...

v Use a Secure Internet Connection. ...

v Use Strong Password. ...

v Be Aware of Pop-ups and Fraudulent


Emails. ...

v Protect yourself from identity threats. ...

v Manage Your Social Media Settings. ...

v Get the Right Cyber Insurance Policy


At last it is concluded that to be safe and secure in
the internet one should be responsible and aware or
the threats surrounding them, we should know and
be aware that with the easy and conventional living
of internet comes a great danger to our privacy and
we should be well aware all the danger coming with
it. We should know all the cyber security protocols
and we should know ways to protect our account if it
is attacked by viruses.

You might also like