Cyber security
⟶ Cyber security refers to the protection of data, computer system and network from digital attack.⟶ Protection from unauthorized access, modification of data and destruction of sensitive data.
Aspect or principle of cyber security
⟶ Confidentially
⤷ It deals with the protection of data or information from unauthorized access
⤷ It ensures that data can be accessed only by the authorized access
⤷ E.g. Password, encryption, access control
⟶ Integrity
⤷ Information should not be modified by unauthorized access.
⤷ Ensures receiver receives the information exactly it was sent by the sender.
⤷ It also refers to the accuracy and consistency of data.
⤷ E.g. Digital signature
⟶ Availability
⤷ Information should be in complete form when it is required by authorized user.
⤷ E.g. backup
⟶ Non-repudiation
⤷ A person cannot deny task having performed.
⤷ Useful for the activities like sending email or making online transaction
⤷ E.g. Digital signature, Audit log
Security Threats
Types of security threat
⟶ Ransom ware: Security threats that encrypt data making unable to access data and demand ransom to decrypt data
⟶ Spyware: Malicious software used to steal information form computer system and send it to third person
⟶ Trojan horse: Threats that steal information from computer and granting unauthorized access to computer through backdoor.
⟶ Logic Bomb: Threats that use a trigger to activate itself.
⟶ Worm: Host independent malware that replicate itself and spread to other computer through computer network.
⟶ Phishing: Threats in which attackers sends bait in the link form and encourage user to share information
⟶ Social engineering: Threats in which attacker creates social situation and encourage user to share their personal information.
⟶ Man in Middle: Attackers intercepts the communication between two individual to steal their data.
⟶ Eavesdropping: Attacker observe the computer activities such as email monitoring, website visited and collect information without consent.
⟶ SQL injection: Security threats that inject malicious code into SQL statement and infect database of website to access in username and password
⟶ DoS attack: Denial of Service attack is the threats that made service of website unavailable by making unusual fake request repeatedly.
⟶ Virus: Host dependent malware that can execute and replicate itself and infect computer system.
Type of virus
⟶ Boot sector virus: Infect the boot sector or MBR of disk and stop computer to boot
⟶ Script virus: Infect program written in High level scripting language such as VB script, JavaScript.
⟶ Macro virus: Infect macros within document or template while opening excel or word program.
⟶ Multipartile virus: Infects both boot sector and executable files
⟶ Polymorphic Virus: also called self modifying virus, that changes its appearance after every infection
⟶ Stealth virus: Bind itself with antivirus software and infect files
0 Comments