','

' ); } ?>

    

 

Cyber security is the practice of defending computers,networks, mobile devices, servers, electronic systems, and data from malwares. It is also known as information technology security or electronic information security (EIS).

This term applies in a variety of contexts, from business to mobile computing and can be divided into some common categories. Which are  

                                                                1] Network security 

                                                                2] Application security

                                                                3] Information security

                                                                4] Operation security 

                                                                5] Disaster recovery and business continuity

                                                               6] End user education

1] Network security:

 Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware. 

2] Application security:

 This focuses on keeping software and devices free of threats.

3] Information security: 

This projects the integrity and privacy of data, both in storage and in transit.

4] Operational security:

  It includes the processes and decision per handing and protecting data 

5] Disaster recovery and business continuity:

 It defines how an organization responds to a cyber security incident or any other event that causes loss of data or operation. Disaster restores its operations and business continuity is the plan organization falls back on while typing to operate without certain resources.

6] End user education: It addresses the most unpredictable cyber security factor people.

 

 

Type of cyber threats

The threats countered by cyber security are three factors.

1] Cyber crime

                          It includes single actor or group targeting systems for financial gain or to cause disruption.

2] Cyber-attack

                          Cyber-attack often involves politically motivated information gathering.

3] Cyber terrorism 

                         It planned to undermine electronic systems to cause panic or fear, so how do malicious actors gain control of computer systems? Here are some common method used to threat Cyber-security 

  1. Malware: Malware means malicious software. One of the most common cyber threats. Malware is software that a cybercriminal or hacker has created to damage or disrupt a legitimate user computer.

There are a number of different types of malware including virus, Trojans, spyware, Ransomware and Bothness. 

          a) SQL Injection: An SQL (structured language query) injection is a type of cyber-attack used to take control of and steal data from databases.

               Cyber criminals exploit vulnerabilities in data-driven applications to insert malicious SQL statements.

         b) Phishing: Phishing attacks are often used to dupe people into handing over some personal information and credit card data.

         c) Man-in-the middle attack: A man-in-the middle attack is a type of cyber threat where cyber criminal intercepts communication between two individuals in order to steal data.

        d) Denial-of-service attack:  Is where cyber criminals prevent a computer system from fulfilling legitimate and servers with traffic.

  • Some Latest Cyber Threats

Here are some of the most recent cyber threats. That the U.S, U.K, and Australian government have the reported on.

  • Dridex Malware:

Dridex Malware is a financial Trojan with a multiple range of faculty that has been affecting victims since 2014, it infects computers though phishing emails or existing Malware.

  • Romance Scams:

 In February 2020, FBI warned U.S citizens to be aware of confidence fraud that cybercriminals commit using rooms, dating sites and apps.

  • Emotet Malware:

Emotet is a sophisticated Trojan that can steal data and also an unsophisticated password that creates a secure password to guard against cyber threats.

  • End User Protection 

This End User protection or endpoint security is crucial aspect of cyber security, after this, it is often individual (the end user) who accidentally uploads malware or another form of cyber thread to their mobile device laptop or desktop. Solution for that. Cyber security relies an cryptographic protocol to encrypt emails, critical data and other files. This not only protect information in transit but also guard against loss or theft.

  • Why is cyber security important?

Cyber security is most important because it encompasses everything that pertains to protecting our personally identifiable information (PII), personal information, our sensitive data, information and government and industry information systems from damage attempted and theft.

  • Cyber safety tips – protect yourself against cyber-attacks

How can individuals guard and business against cyber threats? Here are some top cyber safety tips:

    1. Update your software and operating system: this means you get benefits from the latest security patches.
    2. Use anti-virus software: For security best solution like Kaspersky total security will detect and remove threats. Always keep your software updated for the best level of protection.
    3. Use a strong password: Ensure that your password is not easily guessable.
    4. Do not open mail attachments from unknown senders: These could be infected ṣwith the malware.
  • Resist clicking on unknown links in your email : This is a common way of how malware’s spreads.
  • Avoid using unsecured WiFi networks in public places: For insecure networks leave you vulnerable to man-in-the-middle attacks. 

 

 

 Read More: shopping markets in Amravati