Fundamentals Of Cyber-Security
Introduction
The internet is home to the biggest information
sharing network ever created with billions of devices that communicate across
the globe. In developed economies, the average person now owns multiple
devices, which are essential to most aspects of daily life. In this digital
landscape, everyone is susceptible to getting hacked. Cyber-attacks impact large
technology companies, financial institutions, media organizations, dating
websites, political parties, small companies, and individuals just like us.
Cyber-security is important because of the unprecedented amounts of
data that we as individuals and organizations collect, store, and process on
our electronic devices. As the volume and sophistication of cyber attacks grow,
we are all tasked with safeguarding this information. Think about what we need
to protect now and in our future!
What is cyber Security?
cybersecurity is the practice of protecting and recovering networks, devices, and programs for many type of malicious cyber attack.
Good security cannot have one without the other and both must work towards the same objectives.
Fast Facts about cyber
security
Most dangerous types of malware creators are the hackers and groups of hackers that create malicious software programs in an effort to meet their own specific criminal objectives. These cyber-criminals create computer viruses programs that can:
- Steal access codes to bank accounts
- Advertise products or services on a victim’s computer
- Illegally use an infected computer’s resources – to develop and run:
- Spam campaigns
- Distributed Network Attacks (also called DDoS attacks)
- Blackmailing operations
What is cyberspace?
The interdependent network of information technology
infrastructures that includes the Internet, telecommunications networks,
computer systems, internet -connected devices and embedded processors and
controllers. It may also refer to the virtual world or domain as an
experienced phenomenon, or abstract concept. Cyberspace is the crazy world in which
cyber-security professionals work. They strive to protect the world from those
who would do it harm. They remain vigilant, focused, and unwavering in
perusing objectives. |
Who Are the Cyber Criminals?
Today, the world of the cyber criminals has become more dangerous.
Attackers are individuals or groups who attempt to exploit vulnerabilities for
personal or financial gain. Cyber criminals are interested in everything from
credit cards to product designs, and anything with value.
This group of criminals breaks into computers or networks to gain
access for various reasons, The intent of the break-in determines the
classification of these attackers as white, gray, or black hats.
These are ethical hackers who use their programming skills for
good, ethical, and legal purposes. White hat hackers may perform network
penetration tests in an attempt to compromise networks and systems by using
their knowledge of computer security systems to discover network
vulnerabilities. Security vulnerabilities are reported to developers for them
to fix before the vulnerabilities can be exploited. Some organizations award
prizes or bounties to white hat hackers when they inform them of a
vulnerability.
Gray Hat Hackers
These are individuals who commit crimes and do arguably unethical
things, but not for personal gain or to cause damage. An example would be
someone who compromises a network without permission and then discloses the
vulnerability publicly. Gray hat hackers may disclose a vulnerability to the
affected organization after having compromised their network. This allows the
organization to fix the problem.
Black Hat Hackers
These are unethical criminals who violate computer and network
security for personal gain, or for malicious reasons, such as attacking
networks. Black hat hackers exploit vulnerabilities to compromise computer and
network systems.
Cyber Criminal Motives
Cyber criminal profiles and motives have changed over the years. Hacking started in the ‘60s with phone freaking (or phreaking) which refers to using various audio frequencies to manipulate phone systems. In the mid-‘80s, criminals used computer dial-up modems to connect computers to networks and used password-cracking programs to gain access to data. Nowadays, criminals are going beyond just stealing information. Criminals can now use malware and viruses as high tech weapons. However, the greatest motivation for most cyber criminals is financial. Cybercrime has become more lucrative than the illegal drug trade.
Credits and References: Yash Bhoskar and Kushal Deulkar(Team Tech Tuesday)
14 Most Alarming Cyber Security Statistics in 2019 , The Best VPN, by Rob Mardisalu, April 2019[2]
11 Eye Opening Cyber Security Statistics for 2019 , CPOMagazine, by Matt Powell, June 2019
(https://www.cpomagazine.com/cyber-security/11-eye-opening-cyber-security-statistics-for-2019/)
NOTE : This blog is meant for Educational Purpose only .We do not own any Copyrights related to images and information , all the rights goes to their respective owners . The soul purpose of this blog is to Educate, Inspire, Empower and to create awareness in the viewers. The usage is non-commercial(Not For Profit) and we do not make any money from it.
Comments
Post a Comment