Cyber Security
Cyber Security
"Cyber Security is the body of technologies, processes, and practices designed to protect
networks, devices, programs, and data from attack, theft, damage, modification or
unauthorized access."
"Cyber Security is the set of principles and practices designed to protect our computing
resources and online information against threats."
PauseNext
Unmute
Duration 18:10
Loaded: 4.77%
Â
Fullscreen
Cyber-attack is now an international concern that hacks the system, and other security
attacks could endanger the global economy. Therefore, it is essential to have an
excellent cybersecurity strategy to protect sensitive information from high-profile
security breaches. Furthermore, as the volume of cyber-attacks grows, companies and
organizations, especially those that deal with information related to national security,
health, or financial records, need to use strong cybersecurity measures and processes to
protect their sensitive business and personal information.
We can break the CIA model into three parts: Confidentiality, Integrity, and Availability.
It is actually a security model that helps people to think about various parts of IT
security. Let us discuss each part in detail.
Confidentiality
Integrity
This principle ensures that the data is authentic, accurate, and safeguarded from
unauthorized modification by threat actors or accidental user modification. If any
modifications occur, certain measures should be taken to protect the sensitive data from
corruption or loss and speedily recover from such an event. In addition, it indicates to
make the source of information genuine.
Availability
This principle makes the information to be available and useful for its authorized people
always. It ensures that these accesses are not hindered by system malfunction or cyber-
attacks.
o Virus: It is a malicious piece of code that spreads from one device to another. It
can clean files and spreads throughout a computer system, infecting files, stoles
information, or damage device.
o Spyware: It is a software that secretly records information about user activities on
their system. For example, spyware could capture credit card details that can be
used by the cybercriminals for unauthorized shopping, money withdrawing, etc.
o Trojans: It is a type of malware or code that appears as legitimate software or file
to fool us into downloading and running. Its primary purpose is to corrupt or
steal data from our device or do other harmful activities on our network.
o Ransomware: It's a piece of software that encrypts a user's files and data on a
device, rendering them unusable or erasing. Then, a monetary ransom is
demanded by malicious actors for decryption.
o Worms: It is a piece of software that spreads copies of itself from device to
device without human interaction. It does not require them to attach themselves
to any program to steal or damage the data.
o Adware: It is an advertising software used to spread malware and displays
advertisements on our device. It is an unwanted program that is installed without
the user's permission. The main objective of this program is to generate revenue
for its developer by showing the ads on their browser.
o Botnets: It is a collection of internet-connected malware-infected devices that
allow cybercriminals to control them. It enables cybercriminals to get credentials
leaks, unauthorized access, and data theft without the user's permission.
Phishing
Phishing is a type of cybercrime in which a sender seems to come from a genuine
organization like PayPal, eBay, financial institutions, or friends and co-workers. They
contact a target or targets via email, phone, or text message with a link to persuade
them to click on that links. This link will redirect them to fraudulent websites to provide
sensitive data such as personal information, banking and credit card information, social
security numbers, usernames, and passwords. Clicking on the link will also install
malware on the target devices that allow hackers to control devices remotely.
Brute Force
A brute force attack is a cryptographic hack that uses a trial-and-error method to
guess all possible combinations until the correct information is discovered.
Cybercriminals usually use this attack to obtain personal information about targeted
passwords, login info, encryption keys, and Personal Identification Numbers (PINS).
Romance Scams
The U.S. government found this cyber threat in February 2020. Cybercriminals used this
threat through dating sites, chat rooms, and apps. They attack people who are seeking a
new partner and duping them into giving away personal data.
Dridex Malware
It is a type of financial Trojan malware identifies by the U.S. in December 2019 that
affects the public, government, infrastructure, and business worldwide. It infects
computers through phishing emails or existing malware to steal sensitive information
such as passwords, banking details, and personal data for fraudulent transactions. The
National Cyber Security Centre of the United Kingdom encourages people to make sure
their devices are patched, anti-virus is turned on and up to date, and files are backed up
to protect sensitive data against this attack.
Emotet Malware
Emotet is a type of cyber-attack that steals sensitive data and also installs other malware
on our device. The Australian Cyber Security Centre warned national organizations
about this global cyber threat in 2019.
The following are the system that can be affected by security breaches and
attacks:
o Communication: Cyber attackers can use phone calls, emails, text messages, and
messaging apps for cyberattacks.
o Finance: This system deals with the risk of financial information like bank and
credit card detail. This information is naturally a primary target for cyber
attackers.
o Governments: The cybercriminal generally targets the government institutions to
get confidential public data or private citizen information.
o Transportation: In this system, cybercriminals generally target connected cars,
traffic control systems, and smart road infrastructure.
o Healthcare: A cybercriminal targets the healthcare system to get the information
stored at a local clinic to critical care systems at a national hospital.
o Education: A cybercriminals target educational institutions to get their
confidential research data and information of students and employees.
Conduct cybersecurity training and awareness: Every organization must train their
staffs on cybersecurity, company policies, and incident reporting for a strong
cybersecurity policy to be successful. If the staff does unintentional or intentional
malicious activities, it may fail the best technical safeguards that result in an expensive
security breach. Therefore, it is useful to conduct security training and awareness for
staff through seminars, classes, and online courses that reduce security violations.
Update software and operating system: The most popular safety measure is to update
the software and O.S. to get the benefit of the latest security patches.
Use anti-virus software: It is also useful to use the anti-virus software that will detect
and removes unwanted threats from your device. This software is always updated to get
the best level of protection.
Use strong passwords: It is recommended to always use long and various combinations
of characters and symbols in the password. It makes the passwords are not easily
guessable.
Do not open email attachments from unknown senders: The cyber expert always
advises not to open or click the email attachment getting from unverified senders or
unfamiliar websites because it could be infected with malware.
Avoid using unsecured Wi-Fi networks in public places: It should also be advised not
to use insecure networks because they can leave you vulnerable to man-in-the-middle
attacks.
Backup data: Every organization must periodically take backup of their data to ensure
all sensitive data is not lost or recovered after a security breach. In addition, backups can
help maintain data integrity in cyber-attack such as SQL injections, phishing, and
ransomware.