Cyber Security
Cyber Security
Security
By: Vaibhav Nikunj
Class: VI
Section : C
Definition of Cyber Security
Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks.
It's also known as information technology security or electronic
information security. The term applies in a variety of contexts, from
business to mobile computing, and can be divided into a few common
categories.
Cyber Threat Categories
Common categories of cyber threats include malware, social
engineering, man in the middle (MitM) attacks, denial of service
(DoS), and injection attacks—we describe each of these categories in
more detail below.
Cyber threats can originate from a variety of sources, from hostile
nation states and terrorist groups, to individual hackers, to trusted
individuals like employees or contractors, who abuse their privileges
to perform malicious acts.
Common Sources of Cyber Threats
Here are several common sources of cyber threats against organizations:
Nation states
Hostile countries can launch cyber attacks against local companies and institutions,
aiming to interfere with communications, cause disorder, and inflict damage.
Terrorist organizations
Terrorists conduct cyber attacks aimed at destroying or abusing critical infrastructure,
threaten national security, disrupt economies, and cause bodily harm to citizens.
Criminal groups
Organized groups of hackers aim to break into computing systems for economic
benefit. These groups use phishing, spam, spyware and malware for extortion, theft of
private information, and online scams.
Hackers
Individual hackers target organizations using a variety of attack techniques. They are
usually motivated by personal gain, revenge, financial gain, or political activity.
Hackers often develop new threats, to advance their criminal ability and improve their
personal standing in the hacker community.
Malicious insiders
An employee who has legitimate access to company assets and abuses their privileges to
steal information or damage computing systems for economic or personal gain. Insiders
may be employees, contractors, suppliers, or partners of the target organization. They
can also be outsiders who have compromised a privileged account and are
impersonating its owner.
Cyber Security is required for our computer and phone security
There are many types of Cyber Security
Socially Engineered
Attacks
Steps to be taken for prevention of
Cybercrime
11 ways to help protect yourself against cybercrime
1. Use a full-service internet security suite.
2. Use strong passwords. *****************
3. Keep your software updated.
4. Manage your social media settings.
5. Strengthen your home network.
6. Keep up to date on major security breaches.
7. Take measures to help protect yourself against identity theft.
8. Know that identity theft can happen anywhere.
9. Know what to do if you become a victim.
Special thanks to
1. Norton
2. UND (University of North Dakota)
3. Imperva
4.
And all known and unknown websites