BS (Hons.) Information Technology: University of Okara
BS (Hons.) Information Technology: University of Okara
Introduction:
Cyber security is the practice of defending computer, servers, mobile, devices, electronic system,
network and data from malicious attacks. It’s also known as information technology security or
electronic information security. The term applied in the variety of the context from business to mobilr
computing and can be divide into a few common categories.
Network security- is the practice of securing a computer network from intruders whether targeted
attacker are opportunistic malware.
Application security- focuses on keeping software and devices free of threats. A compromised
application could provide access to the data its design to protect. Successful security begin in the design
stage, well before a program or device is deployed.
Operational security include the process and decision for handling and protecting data assets. The
permissions users have when accessing a network and the procedure that determine how and where
data may be stored and shared all fall under this umbrella.
. Regulatory compliance.
. Business continuity
. Improve confidence in the company ‘ reputation and trust for developers partners customers
stakeholder and employee.
This is depth cybersecurity planning guides provides informations and device to help organization
develop a successful strategy to protect their IT system for attacks.
1. Cybercrime- include single actors or group targeting system for financial gain or to cause disruption.
The term cyber security is used to refer to the security offered through on-line services to protect your
online ifformation. With an increasing amount of people getting connected to internet, the security
threats that cause massive harm are increasing also.
To Understood
What is the meaning of the word cyber.
Hacker
Malware
Trojan
Password cracking
Solution:
Install a security suits that protect the computer against threats such as viruses and worm.
Hacker:
In common a hacker is person who breaks into computer usually by gaining access to administrative
control.
Types of hacker:
1. White hat hacker
2. Grey hat hacker
3. Black hat hacker
Malware:
The word malware comes from the term Malicious software. Malware is any software that infects and
damages of a computer system without the owner’s knowledge or permission. Malware is a software
that a cybercriminal or hacker as created to disrupt or damage a legitimate user computer. Often spread
via an unsolicited email attachment and legitimate users computers. Often spread via an unsolicited
email attachment or legitimate looking download malware may be used by cybercriminal to make
money or in politically motivated cyber-attacks.
Trojan:-A type of malware that is disguised as legitimate software. Cybercriminals trick user into
uploading Trojans onto their computer where they cause damage or collect data.
Spyware:- A program that secretly records what a user doe’s file and data with the threats of erasing
it unless a ransom is paid.
Ransomware:-Malware which lockdown a user file and data, which the threats of erasing it unless it
ransom is paid.
Dridex Malware
In December 2019the US department of justice charged the leader of an organize cyber-criminal groups
of their parts in a global dridex malware attacks. This malicious campaign affected the public
government infrastructure and business worldwide. Dridex is financial Trojan with the range of
capabilities. Affective victims since 2014 it infects though phishing emails are existing malware. Capable
of stealing password banking detail and personal data which can be used in fraudulent transaction it has
cause massive financial lousing amount to hundred of millions.
Romance scams
In February 2020 the FBI warned US citizen to be aware of confidence fraud that cybercriminals commit
using dating sites, chat rooms and app. Perpetrators take advantages of people seeing new partners
duping victims into giving away personal data.
The FBI reports that romance cyber threats affected 114 victims in new Mexico in 2019 with financial
losses amounting to $1.6 millions.
To stop Malware:
Download and anti-malware program that also helps prevent actions.
Trojan horses:
Trojan horses are email viruses that can duplicate themselves or harm the computer system. These
viruses are the most serious threats to computer.
Password Chracking:
Password attacks are attached by hacker that are able to determine passwords to find password to
different protected electronic area and social network sites.
Securing Passwords:
Use always strong password.