Cyber Security and Security Threats

Cyber security

⟶ Cyber security refers to the protection of data, computer system and network from digital attack.
⟶ Protection from unauthorized access, modification of data and destruction of sensitive data.

Aspect or principle of cyber security

⟶ Confidentially
     It deals with the protection of data or information from unauthorized access
     It ensures that data can be accessed only by the authorized access
     E.g. Password, encryption, access control

⟶ Integrity
     Information should not be modified by unauthorized access.
     Ensures receiver receives the information exactly it was sent by the sender.    
     It also refers to the accuracy and consistency of data.
     E.g. Digital signature

⟶ Availability
     Information should be in complete form when it is required by authorized user.
     E.g. backup

⟶ Non-repudiation
    ⤷ A person cannot deny task having performed.
    ⤷  Useful for the activities like sending email or making online transaction
     E.g. Digital signature, Audit log

Security Threats


⟶ Security threats refer to the harmful software that is design to affect or harm data, computer system and network.

Types of security threat
⟶ Ransom ware: Security threats that encrypt data making unable to access data and demand ransom to decrypt data
⟶ Spyware: Malicious software used to steal information form computer system and send it to third person
⟶ Trojan horse: Threats that steal information from computer and granting unauthorized access to computer through backdoor.
⟶ Logic Bomb: Threats that use a trigger to activate itself.
⟶ Worm: Host independent malware that replicate itself and spread to other computer through computer network.
⟶ Phishing: Threats in which attackers sends bait in the link form and encourage user to share information
⟶ Social engineering: Threats in which attacker creates social situation and encourage user to share their personal information.
⟶ Man in Middle: Attackers intercepts the communication between two individual to steal their data.
⟶ Eavesdropping: Attacker observe the computer activities such as email monitoring, website visited and collect information without consent.
⟶ SQL injection: Security threats that inject malicious code into SQL statement and infect database of website to access in username and password
⟶ DoS attack: Denial of Service attack is the threats that made service of website unavailable by making unusual fake request repeatedly.
⟶ Virus: Host dependent malware that can execute and replicate itself and infect computer system.

Type of virus
⟶ Boot sector virus: Infect the boot sector or MBR of disk and stop computer to boot
⟶ Script virus: Infect program written in High level scripting language such as VB script, JavaScript.
⟶ Macro virus: Infect macros within document or template while opening excel or word program.
⟶ Multipartile virus: Infects both boot sector and executable files
⟶ Polymorphic Virus: also called self modifying virus, that changes its appearance after every infection
⟶ Stealth virus: Bind itself with antivirus software and infect files


Post a Comment

0 Comments