What is Cyber Security?

Cyber Security Man in the Middle

What is Cyber Security?

As the number of mobile users increase, so do the opportunities for exploitation. In fact, hundreds to thousands of network outages, computer viruses, data compromised by hackers, and other incidents are affecting our lives. Cyber security is an attempt to protect your data, programs, computers, and networks from such exploitation. And, this has even become a critical issue in the society considering that the growing volume and sophistication of cyber attacks have been at a point where national security is threatened.
Cyber Security

Cyber Security

Cyber security is everyone’s responsibility, especially those directly affected such as governments, military, financial institutions, corporations, hospitals, and other businesses. To have strong cyber security, you must know cyber security definition, the importance of it and understand how cyber attacks work and affect your data, programs, computers, and networks. So, the article will introduce you to some forms of cyber attacks including cyber crime, cyber terror, and cyber war.

Cyber Attacks

Cyber attacks can be dropped down into three: cyber crime, cyber terror, and cyber war.

  1. Cyber crime
    The attack includes the acquisition of debit/credit card data and intellectual property, and impairment of the operations of a web or service. All forms of cyber crime focus on stealing data or money and causing disruption.
  2. Cyber terror
    The attack includes terrorist activities on the cyberspace.
  3. Cyber war
    The attack includes espionage and sabotage against another nation in order to extract data or cause disruption.

Cyber attacks are done at a distance using numerous means of attack in malware (malicious software) domain.

Cyber Attacks

Malware

There are many types of malware with each having its specific goal and technique.

  • Viruses
    Viruses are aimed to steal, modify, or corrupt data from targeted computers. A virus can replicate and spread itself from one computer to another by attaching itself to another file.
  • Worms
    Worms are aimed to seek out and exploit weaknesses in operating systems to allow remote control of the infected computers. A worm can replicate and spread itself from one computer to another without the need of attaching itself to another file.
  • Spyware
    Spyware, or also known as adware, is aimed to steal data through remote control of the infected computers. Spyware infects computers through attachments, links, or downloadable software.
  • Trojans
    Trojan is aimed to steal or damage data through the creation of another door on the infected computers.

Attack Vectors

Besides the above attacks, there are also some attack vectors that allow cyber criminals to infect computers to harvest stolen data.

  • Phishing
    Aimed to collect users’ data by masquerading as a legitimate entity.
  • Pharming
    Aimed to redirect a web’s traffic to a fake web where users’ data are compromised.
  • Drive-by
    Aimed to attack against specific weakness in a system.
  • MITM (Man in the Middle) Attack
    Aimed to manipulate impersonate each endpoint and manipulate them.

Cyber criminals are indiscriminate. They will try to exploit every weakness within a system. Thus, all businesses will need to arm themselves with strong cyber security IT support with IT Solution.

/ Security

About the Author

Comments

Comments are closed.