Computing is playing a vital role in each aspect of life. With the internet taking over the world as of today and it being such an important commodity as a large bunch of people, depend on the Internet for various reasons may it be in the field of banking, cloud, data analysis, simulations, data interpretations and the likes which help day to day living lean towards a progressive upwards curve and meanwhile also making life easier.
There are various ways the internet can be
misused to various extents like stealing money using one’s information by
hacking, data theft etc. Moreover, to put an end to such ongoing activities,
there is a strong need for cyber security.
Thus, it is important to understand the cyber
security and how cyber security works.
Cyber security is an important aspect
of the cyber, which we cannot ignore because protecting the data online and the
network infrastructure is very vital for function or different organisations
and governments. Breach or damage of data or information may cause
serious effects on the day-to-day business and may lead to financial losses.
What do you mean by Cyber?
Cyber means your online presence on the
Internet like [Facebook, Twitter, WhatsApp, Gmail, Email, YouTube, Pinterest,
Instagram] etc. and security is about securing your CODE.
How does Cyber Security help?
We as a whole live in a world that
is networked together, from web banking to government foundation, where
information is put away on PCs and different gadgets. A bit of that information
can be sensitive data, regardless of whether that be intellectual property,
money related information, individual data, or different sorts of information
for which unapproved access or exposure could have negative results.
Cyber security helps to protect not
only the individual but business, inspire customer confidence, stop one’s
website from crashing, protection of data of customers and clients.
In general, cyber security is the technology and process that is designed to protect networks and devices from attack, damage or unauthorized access. It comprises advances, procedures and controls intended to ensure frameworks, networks, programs, gadgets and information from cyber threats or attacks.
Elements of Security
There are three types of elements. Namely physical, system and
process elements
Physical
Elements |
System
Elements |
Process
Elements |
|
|
|
The pertinent question is why cyber security? It comprises CIA i.e. Confidentiality, Integrity and Availability.
Confidentiality: Only data is accessed by authorized parties,
data is not compromised by any other person.
Integrity: Data should not be modified by anybody who is a
non-authorized user, modification can be done at bit, byte or data level.
Availability: System functions and data must be available
on-demand according to agreed parameters to authorized users.
Types of Web
- Surface Web
- Deep Web
- Dark Web
- Marina Web [appears to get its name from the deepest part of the ocean, Mariana’s Trench]
Cyber Attacks
Cyber-attacks are presently a worldwide concern and has
given numerous worries that hacks and other security assaults could imperil the
worldwide economy.
The threat of cyber-attacks is very real and ever- growing. The danger of cyber-attacks could vary from a small fraud to compromising an entire nation’s security installation and its economy. As technology is evolving every day, so are these hackers finding new ways to target people
HACKER
H – Hide IP
A – Aim Victim
C – Crack Encrypt
K – Kill Firewall
E- Enter into Database
R – Return Anonymous
Types of Hackers
Black Hat: Malicious Hacker [penetrate systems without permission
to exploit]
White Hat: Ethical Hacker [penetrate system with the owner’s
permission and mitigate cyberattacks]
Grey Hat: Not malicious but not always ethical [Draw attention to
vulnerabilities and offer a solution to patch them by charging fees]
Green Hat: New, unskilled Hacker [Newbie hackers who are learning
to hack]
Blue Hat: Vengeful Hacker [Hackers who seek to take personal
revenge]
Red Hat: Vigilant Hacker [Hackers who use cyberattacks to attack
black hat hackers]
Other types of hackers
Suicide hacker [Individuals who aim to bring down critical infrastructure for a cause
and are not worried
about facing jail or any other
punishment
by law are known as
suicide hackers]
Script Kiddie [An unskilled
hacker who compromises systems by running scripts, tools
and software developed by real hackers.
Cyber Terrorist [Individuals with a wide range of skills motivated by religious or political beliefs to create fear
by large scale disruption of computer networks.
Most of the cybercrimes
are carried
out
to generate money for the cyber
criminals. They are carried out against computers or devises
directly to damage or disable them, spread malware and steal secret
information.
Computer as a target crimes Criminal activities focused on systems, servers,
networks and data stored
in the system. India
stands 1t 19th position in cybercrime.
History of Cyber Crime
- Pentagon & IBM data were hacked
- Cybercriminals launched attacks against eBay, Yahoo, CNN, Amazon, and others
- 758 million malicious attacks occurred according to Kaspersky
Types of Cyber Crime
- Email Hacking
- Fake Profile on social media
- Data Theft
- Phishing
- Credit Card Fraud
- Software piracy
- Copyright infringement, trademark violations
- Threatening or defamatory emails (Demanding ransom or damaging reputation of the target)
- Pornography
- Homography attack
- Identity theft (using someone’s identity for transactions)
A bit of caution
If a company you have an
account with
has suffered a data breach it is possible your email may have been pwned, which
means your email and password for that site's account has
been exposed to cybercriminals.
haveibeenpwned.com is a website that checks if an account
has been compromised.
What to do
- Never read an unknown message
- Never respond to an unknown message
- When a text message is APK bine then it extracts and installs your information which in turn you compromise with your security
- Doubly secured your email and Phone
- Never share OTP with anyone
- Do not click on any website
Mobile Hacking
There are two ways to hack a mobile phone.
- Manual Installation
- SMS Installation
With your permission application can be installed manually and then they can access your entire phone.
Installation by sending SMS, Generally APK file is installed through which hackers can see your entire phone.
Difference of Passive versus Active Attackers
Passive |
Active
Attacker |
Read the
message sent by X to Y they observe and do not modify |
They are
opposite to Passive attackers. They
try to corrupt data, documents, systems. |
Purpose
is spying |
Purpose
is crime |
Threat
to confidentiality |
Threat
to all |
Does not
affect the system |
Affect
the system |
Remember
Plain text/original text, which is understandable, the readable
format is sent by Mr X to Mr Y if it is not encrypted then there are chances of
active attacks by an intruder who can capture the control of your data system.
Most common attack in Cyber Security
- Malware attack
- Password attack
- Phishing
- Man in the middle
- Birthday attack
- Cross-site scripting attack
It is important to note that there are cyber security experts who
look after the data and find ways how to safeguard it.
Who is a Cyber Security Expert?
A cyber security expert is an individual employed by an
organization to protect their data, they do with the help of techniques like
finding weaknesses, monitoring systems, network breaches. After finding the weakness they repair and
then strengthen the areas where an attack may have occurred.
Domains in
Cyber Security
- Asset Security
- Security architecture & engineering
- Communication & Network Security
- Identity and access management
- Security Operations
- Software development security
- Security Assessment & Testing
- Security & Risk Management
What is the solution?
The solution is to Prioritize, Authorize and Educate.
Prioritize |
Authorize |
Educate |
Secure
Password |
Way
Authentication |
Make
sure to educate your family
members for safe usage of social media and the internet |
Anti-Virus
& Regular Updates |
Security
DNS (Domain Name
System) |
Do not
share your computer or mobile with any strangers |
Installing
Firewall in a system |
Encryption |
|
Conclusion
Nowadays there are numerous Business firms, industries and
organizations which are completely dependent on the information systems to
manage their operations and carry out their daily activities, stay connected
and communicate with the customers and suppliers and to gather all the required
information and get the idea of the day-to-day market.
Whilst the scale of Internet-connected systems has increased
considerably, these systems are being exposed to cyber-attacks more than ever.
The complexity and dynamics of cyber-attacks require protecting mechanisms to
be responsive, adaptive, and scalable.
Given the persistent nature of the threat,
there is a need to establish a strong digital frontier to tackle this dangerous
menace.
No comments:
Post a Comment