Cyber Security
Cyber Security
5. Cross-site scripting
Cross-site scripting (also known as XSS) is a web security vulnerability that allows an attacker to
compromise the interactions that users have with a vulnerable application. It allows an attacker to
circumvent the same origin policy, which is designed to segregate different websites from each other.
6. Types of Attacks
1. Malware. Cyber attackers use harmful software such as spyware, viruses, ransom ware, and worms
known as malware to access your system's data.
2. Phishing.
3. Spoofing.
4. Backdoor Trojan.
5. Ransom ware.
6. Password attacks.
7. Internet of Things attack.
8. Crypto jacking.
Click the icon to learn more about the cyber-attacks around the
world…………………….
7. Reason for the commission of cybercrimes
Money
Cybercriminals may hack into banks and financial institutions to make money. They may also use cyber
extortion, such as ransom ware attacks, to extort money from their victims.
Socio-political purposes
Cybercriminals may hack websites to spread messages for a socio-political purpose.
National security
Cybercriminals may attack a nation's important assets or sovereignty to upset the government and citizens.
This is known as cyber terrorism.
Fraud
Cybercriminals may commit online payment fraud, such as non-payment, non-delivery, advance fee, and
misrepresentation.
Strong passwords: Use strong passwords that are at least eight characters long and include a mix of
upper- and lower-case letters, numbers, and symbols. Change passwords regularly.
Data backups: Back up data regularly and store backups securely, both on and off-site.
Encryption: Use encryption to keep data secure, even if there is unauthorized access.
Antivirus software: Install and keep up-to-date antivirus software on all company devices to protect
against malware and other online threats.
Network security checklist: Use a network security checklist to ensure everything is secure.
Educate employees: Educate employees about network security and social engineering attacks.