0% found this document useful (0 votes)
13 views2 pages

It 123

Uploaded by

tromechyme
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

It 123

Uploaded by

tromechyme
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

1.

What is types of cyber attack

A cyber attack is an attempt by cybercriminals, hackers or other digital adversaries to access a


computer network or system, usually for the purpose of altering, stealing, destroying or exposing
information.

1. Malware 10.IoT – Based Attacks


2. Denial-of-Service (DoS) Attacks
3. Phishing
4. Spoofing
5. Identity-Based Attacks
6. Code Injection Attacks
7. Supply Chain Attacks
8. Insider Threats
9. DNS Tunneling

2.Linux OS and security


Linux is a Unix-like operating system kernel, but it is often used to refer to the entire family of
Unix-like operating systems that use the Linux kernel, as well as the ecosystem of software
surrounding it. Linux is open-source, meaning its source code is freely available for anyone to
use, modify, and distribute. This has led to a large community of developers contributing to its
development and a wide variety of distributions, or "distros," tailored to different needs.
In terms of security, Linux is generally considered to be more secure than other operating
systems like Windows, primarily due to its design and the open-source nature of its development.
Here are some key aspects of Linux security:
1. **User Privileges**: Linux follows a principle of least privilege, meaning users only have the
permissions necessary to perform their tasks. By default, users operate with limited permissions,
and they must escalate their privileges using tools like sudo or su to perform administrative tasks.
2. **Secure Architecture**: Linux is built with security in mind. Its multi-user, multi-tasking
capabilities are designed to isolate processes from one another, which helps prevent one process
from affecting others. Additionally, the file permission system is robust, allowing administrators to
control access to files and directories.
3. **Security Updates**: Linux distributions typically have robust package management systems
that simplify the process of installing, updating, and removing software. This makes it easier to
keep the system up-to-date with the latest security patches and fixes.
4. **Open Source**: The open-source nature of Linux allows for constant review and
improvement of its code by a large community of developers worldwide. This means security
vulnerabilities can be identified and addressed quickly.
5. **Community Support**: The Linux community is known for its active support forums,
mailing lists, and online resources where users can seek help, share information, and learn about
best security practices.
6. **Firewalls and Security Tools**: Linux distributions often come with built-in firewall tools
like iptables or more modern replacements like firewalld. Additionally, there are numerous
security-focused distributions and tools available for enhancing security, such as SELinux
(Security-Enhanced Linux) and AppArmor.
7. **Auditing and Monitoring**: Linux provides tools for auditing and monitoring system
activities, which can help administrators detect and respond to security incidents. These include
tools like auditd for system auditing and monitoring utilities like Nagios or Zabbix.
While Linux is generally considered secure, it's important to note that no system is immune to
security threats. Proper security practices, regular updates, and user education are essential for
maintaining the security of Linux systems.

3.Cyber law and IT law

Cyber law and IT law, often used interchangeably, generally refer to legal issues related to the
use of information technology (IT). Cyber law, also known as IT law or ICT law, encompasses a
wide range of legal areas, including but not limited to intellectual property, privacy, data
protection, and e-commerce.

Cyber law specifically focuses on the laws that govern the internet, digital systems, and their
users. It deals with the legal challenges that arise from the use of the internet and digital
technologies, such as cybercrime, online privacy, and intellectual property rights.

IT law, on the other hand, is a broader term that includes cyber law but also covers legal issues
related to the creation, sharing, and use of information through technology. It addresses the legal
aspects of computing and technology, including software, hardware, data, and communications
technologies.

Both areas are concerned with the regulation of digital information and technology, and they
overlap in many respects. However, IT law can be seen as the broader discipline that includes
cyber law within its scope.

You might also like