0% found this document useful (0 votes)
133 views

BS (Hons.) Information Technology: University of Okara

1. Cyber security is the practice of defending computer systems, networks, and data from malicious attacks. It involves protecting networks, applications, computers, and mobile devices from cyber threats. 2. Common cyber threats include viruses, hackers, malware, and password cracking. Malware like viruses, Trojans, spyware, and ransomware can damage systems or steal data. Hackers may gain unauthorized access to systems. 3. Implementing cyber security practices like installing antivirus software, using firewalls, and creating strong unique passwords for all accounts can help protect against these threats. Maintaining cyber security is important for businesses, governments, and individuals to protect sensitive data and systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
133 views

BS (Hons.) Information Technology: University of Okara

1. Cyber security is the practice of defending computer systems, networks, and data from malicious attacks. It involves protecting networks, applications, computers, and mobile devices from cyber threats. 2. Common cyber threats include viruses, hackers, malware, and password cracking. Malware like viruses, Trojans, spyware, and ransomware can damage systems or steal data. Hackers may gain unauthorized access to systems. 3. Implementing cyber security practices like installing antivirus software, using firewalls, and creating strong unique passwords for all accounts can help protect against these threats. Maintaining cyber security is important for businesses, governments, and individuals to protect sensitive data and systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

UNIVERSITY OF OKARA

BS (Hons.) Information Technology


(Semester-4th)
(Section B-eve)
Subject: information security
Topic: cyber security
Submitted By
Group #3
5020 5068
5064 5116
5108 5026
5054 5048
Submitted To
Prof:ume Farwa
CYBER SECURITY

Introduction:
Cyber security is the practice of defending computer, servers, mobile, devices, electronic system,
network and data from malicious attacks. It’s also known as information technology security or
electronic information security. The term applied in the variety of the context from business to mobilr
computing and can be divide into a few common categories.
Network security- is the practice of securing a computer network from intruders whether targeted
attacker are opportunistic malware.

Application security- focuses on keeping software and devices free of threats. A compromised
application could provide access to the data its design to protect. Successful security begin in the design
stage, well before a program or device is deployed.

Operational security include the process and decision for handling and protecting data assets. The
permissions users have when accessing a network and the procedure that determine how and where
data may be stored and shared all fall under this umbrella.

What are the benefits of Cyber security:


The benefit of implementing and maintaining cyber security practices include;

.Business protection against cyber attack and data breaches.

.Protection for data and network.

.Prevention of unauthorized user access.

. Improve recovery time after a breach.

.Protection for end user and endpoint devices.

. Regulatory compliance.

. Business continuity

. Improve confidence in the company ‘ reputation and trust for developers partners customers
stakeholder and employee.

What are the element of cybersecurity and how does it work?


The cyber security field can be broken down into several different sections the coordination of which
within the organization is crucial to the success of a cybersecurity program. These section include of
following:

This article is a part of;

cyber security To ultimate guide to planning for business:

This is depth cybersecurity planning guides provides informations and device to help organization
develop a successful strategy to protect their IT system for attacks.

What is the future of cyber security:


Remote work is here to stay so’ it’s time to rethink the short term fix made in 2020. What else is the
cards? Here are the trend shaping of future of cybersecurity. 2020 was a tough year for cyber security .
Security teams has here to remote work environments in a matter of days.

Scale of the cyber threates:


The global cyber threats continue to evolve at a rapid pace with arising number of data breaches each
year. A report by riskBased Security revealed that a shocking 7.9 billion record have been exposed by
data breaches in the first nine month of 2019 alone. This figure is more than double the number of
records exposed in the same period in 2018. Medical services retailers and public entities experience the
most branches with malicious criminals responsible for most incident. Some of these sectors are more
appealing to cyber criminals because they collect financial and medical data but all business that use
network can be targeted for customer data corporate espionage or customer attacks.

Types of Cyber threats:


The threats countered by cyber security are three-fold;

1. Cybercrime- include single actors or group targeting system for financial gain or to cause disruption.

2. Cyber-attacks- often involves politically motivated information gathering.

3. Cyberterrorism- is intended to undermine electronic system to cause panic or fear.

The term cyber security is used to refer to the security offered through on-line services to protect your
online ifformation. With an increasing amount of people getting connected to internet, the security
threats that cause massive harm are increasing also.

To Understood
What is the meaning of the word cyber.

What is the need of cyber security.


What are the security problem in cyber fields.

How to implement and maintain security of a cyber field around us.

Meaning of the word CYBER.


. It is combining from relating to information technology the internet and virtual reality.

Need of CYBER security


Cyber security is necessary since it helps in securing data from threats such as data theft or misuse, also
safeguards your system from viruses.

Major security problems:


Virus

Hacker

Malware

Trojan

Password cracking

Viruses and worm:


A virus is a program that is loaded onto your computer without your knowledge runs against your
wishes.

Solution:
Install a security suits that protect the computer against threats such as viruses and worm.

Hacker:
In common a hacker is person who breaks into computer usually by gaining access to administrative
control.

Types of hacker:
1. White hat hacker
2. Grey hat hacker
3. Black hat hacker

How to prevent hacking:


It may be impossible to prevent computer hacking, however effective security controls including strong
password and the use of firewalls can helps.

Malware:

The word malware comes from the term Malicious software. Malware is any software that infects and
damages of a computer system without the owner’s knowledge or permission. Malware is a software
that a cybercriminal or hacker as created to disrupt or damage a legitimate user computer. Often spread
via an unsolicited email attachment and legitimate users computers. Often spread via an unsolicited
email attachment or legitimate looking download malware may be used by cybercriminal to make
money or in politically motivated cyber-attacks.

There are different type of malware , including:


Virus:-A self-replicating that program that attaches itself to clean file and spreads through out a
computer system infacting file with malicious code.

Trojan:-A type of malware that is disguised as legitimate software. Cybercriminals trick user into
uploading Trojans onto their computer where they cause damage or collect data.

Spyware:- A program that secretly records what a user doe’s file and data with the threats of erasing
it unless a ransom is paid.

Adware:-Advertising software which can be used to spread malware.

Ransomware:-Malware which lockdown a user file and data, which the threats of erasing it unless it
ransom is paid.

Latest cyber threats:


What are the latest cyber threats that individual and organization need to guard against? Here are some
of the most recent cyber threats that’s the UK, US and Australian government have reported on.

Dridex Malware
In December 2019the US department of justice charged the leader of an organize cyber-criminal groups
of their parts in a global dridex malware attacks. This malicious campaign affected the public
government infrastructure and business worldwide. Dridex is financial Trojan with the range of
capabilities. Affective victims since 2014 it infects though phishing emails are existing malware. Capable
of stealing password banking detail and personal data which can be used in fraudulent transaction it has
cause massive financial lousing amount to hundred of millions.

Romance scams
In February 2020 the FBI warned US citizen to be aware of confidence fraud that cybercriminals commit
using dating sites, chat rooms and app. Perpetrators take advantages of people seeing new partners
duping victims into giving away personal data.

The FBI reports that romance cyber threats affected 114 victims in new Mexico in 2019 with financial
losses amounting to $1.6 millions.

To stop Malware:
Download and anti-malware program that also helps prevent actions.

Activate network threats protection firewall antivirus.

Trojan horses:
Trojan horses are email viruses that can duplicate themselves or harm the computer system. These
viruses are the most serious threats to computer.

How to avoid Trojan:


Security suite such as avast internet security will prevent you from downloading Trojan horses.

Password Chracking:
Password attacks are attached by hacker that are able to determine passwords to find password to
different protected electronic area and social network sites.

Securing Passwords:
Use always strong password.

Never use same passwords for two different sites.

You might also like