Fundamentals Of Cyber-Security

 Introduction

The internet is home to the biggest information sharing network ever created with billions of devices that communicate across the globe. In developed economies, the average person now owns multiple devices, which are essential to most aspects of daily life. In this digital landscape, everyone is susceptible to getting hacked. Cyber-attacks impact large technology companies, financial institutions, media organizations, dating websites, political parties, small companies, and individuals just like us.

Cyber-security is important because of the unprecedented amounts of data that we as individuals and organizations collect, store, and process on our electronic devices. As the volume and sophistication of cyber attacks grow, we are all tasked with safeguarding this information. Think about what we need to protect now and in our future!


What is cyber Security?

cybersecurity is the practice of protecting and recovering networks, devices, and programs for many type of malicious cyber attack.

Good security cannot have one without the other and both must work towards the same objectives.




Fast Facts about cyber security








Most dangerous types of malware creators are the hackers and groups of hackers that create malicious software programs in an effort to meet their own specific criminal objectives. These cyber-criminals create computer viruses programs that can:

  • Steal access codes to bank accounts
  • Advertise products or services on a victim’s computer
  • Illegally use an infected computer’s resources – to develop and run:
    • Spam campaigns
    • Distributed Network Attacks (also called DDoS attacks)
    • Blackmailing operations


What is cyberspace?

The interdependent network of information technology infrastructures that includes the Internet, telecommunications networks, computer systems, internet -connected devices and embedded processors and controllers. It may also refer to the virtual world or domain as an experienced phenomenon, or abstract concept.

Cyberspace is the crazy world in which cyber-security professionals work. They strive to protect the world from those who would do it harm. They remain vigilant, focused, and unwavering in perusing objectives.

Who Are the Cyber Criminals?

Today, the world of the cyber criminals has become more dangerous. Attackers are individuals or groups who attempt to exploit vulnerabilities for personal or financial gain. Cyber criminals are interested in everything from credit cards to product designs, and anything with value.

 Hackers

This group of criminals breaks into computers or networks to gain access for various reasons, The intent of the break-in determines the classification of these attackers as white, gray, or black hats.

 White Hat Hackers

These are ethical hackers who use their programming skills for good, ethical, and legal purposes. White hat hackers may perform network penetration tests in an attempt to compromise networks and systems by using their knowledge of computer security systems to discover network vulnerabilities. Security vulnerabilities are reported to developers for them to fix before the vulnerabilities can be exploited. Some organizations award prizes or bounties to white hat hackers when they inform them of a vulnerability.




Gray Hat Hackers

These are individuals who commit crimes and do arguably unethical things, but not for personal gain or to cause damage. An example would be someone who compromises a network without permission and then discloses the vulnerability publicly. Gray hat hackers may disclose a vulnerability to the affected organization after having compromised their network. This allows the organization to fix the problem.

 

Black Hat Hackers

These are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks. Black hat hackers exploit vulnerabilities to compromise computer and network systems.

 

Cyber Criminal Motives

Cyber criminal profiles and motives have changed over the years. Hacking started in the ‘60s with phone freaking (or phreaking) which refers to using various audio frequencies to manipulate phone systems. In the mid-‘80s, criminals used computer dial-up modems to connect computers to networks and used password-cracking programs to gain access to data. Nowadays, criminals are going beyond just stealing information. Criminals can now use malware and viruses as high tech weapons. However, the greatest motivation for most cyber criminals is financial. Cybercrime has become more lucrative than the illegal drug trade.                                                                                                                

 Credits and References: Yash Bhoskar and Kushal Deulkar(Team Tech Tuesday) 

  •   14 Most Alarming Cyber Security Statistics in 2019 , The Best VPN, by Rob Mardisalu, April 2019[2]

  • 11 Eye Opening Cyber Security Statistics for 2019 , CPOMagazine, by Matt Powell, June 2019

  • (https://thebestvpn.com/cyber-security-statistics-2019/)

  • (https://www.cpomagazine.com/cyber-security/11-eye-opening-cyber-security-statistics-for-2019/)                                                                                                                                       

  •  NOTE : This blog is meant for Educational Purpose only .We do not own any Copyrights related to images and information , all the rights goes to their respective owners . The soul purpose of this blog is to Educate, Inspire, Empower and to create awareness in the viewers. The usage is non-commercial(Not For Profit) and we do not make any money from it.                                                                   




Comments

Popular posts from this blog

Managing Radioactive Waste: Modern Solutions and Innovations

WEB 3.0

TECHNOLOGY IN SPORTS: CRICKET