CYBERSECURITY

CYBERSECURITY

Cyber Security is a process that’s designed to protect networks and devices from external threats. Businesses typically employ Cyber Security professionals to protect their confidential information, maintain employee productivity, and enhance customer confidence in products and services.

The world of Cyber Security revolves around the industry standard of confidentiality, integrity, and availability,?or CIA. Privacy means data can be accessed only by authorized parties; integrity means information can be added, altered, or removed only by authorized users; and availability means systems, functions, and data must be available on-demand according to agreed-upon parameters.

The main element of Cyber Security is the use of authentication mechanisms. For example, a user name identifies an account that a user wants to access, while a password is a mechanism that proves the user is who he claims to be.


Types of Cyber Crimes

Cybercrime is any unauthorized activity involving a computer, device, or network. The three types are computer-assisted crimes, crimes where the computer itself is a target, and crimes where the computer is incidental to the crime rather than directly related to it.

Cybercriminals usually try to profit off of their crimes using a variety of tactics, including:

  • Denial of Service, or DOSWhere a hacker consumes all of a server’s resources, so there’s nothing for legitimate users to access
  • Malware?Where victims are hit with a worm or virus that renders their devices useless
  • Man in the Middle?Where a hacker puts himself between a victim’s machine and a router to sniff data packets
  • Phishing?Where a hacker sends a seemingly legitimate-looking email asking users to disclose personal information

Other types of cyberattacks include cross-site scripting attacks, password attacks, eavesdropping attacks (which can also be physical), SQL-injection attacks, and birthday attacks based on algorithm functions.

What Motivates Cyber Criminals?

The main motive behind the cybercrime is to disrupt regular business activity and critical infrastructure. Cybercriminals also commonly manipulate stolen data to benefit financially, cause financial loss, damage a reputation, achieve military objectives, and propagate religious or political beliefs. Some don’t even need a motive and might hack for fun or simply to showcase their skills.

So who are these cybercriminals? Here’s a breakdown of the most common types:

  • Black-Hat Hackers?Black-hat hackers use fake identities to conduct malicious activities for a profit
  • Gray-Hat Hackers?They work both with malicious intent and as legitimate security analysts
  • White-Hat HackersWhite-hat hackers work as security analysts to detect and fix flaws and protect against malicious hackers
  • Suicide Hackers?They aim to openly bring down the critical infrastructure for a social cause
  • Script Kiddies?They are unskilled hackers who run scripts and software created by more experienced hackers
  • Cyber TerroristsThey create fear by disrupting large-scale computer networks; motivated by religious or political beliefs
  • State-Sponsored Hackers?They penetrate government networks, gain top-secret information, and damage information systems; paid by a hostile government
  • Hacktivists?Promote political agendas by secretly defacing and disabling websites


要查看或添加评论,请登录

DINESH C的更多文章

  • DATA MINING

    DATA MINING

    What is Data Mining? Typically, when someone talks about “mining,” it involves people wearing helmets with lamps…

  • DATA MINING

    DATA MINING

    What is Data Mining? Typically, when someone talks about “mining,” it involves people wearing helmets with lamps…

  • 2D materials for future heterogeneous electronics

    2D materials for future heterogeneous electronics

    Graphene and two-dimensional materials (2DM) remain an active field of research in science and engineering over 15…

  • Pathway to Creative Design

    Pathway to Creative Design

    Designers seem to find new ways to confuse people about the work we do! Different companies might list widely different…

  • Visual effects (VFX)

    Visual effects (VFX)

    Define visual effects and VFX meaning VFX stands for visual effects, which can be shortened to visual FX. The use of…

  • What is Digital Art?

    What is Digital Art?

    Placed under the larger category of new media art, digital art is defined as any creative practice that uses digital…

  • Christmas celeberation in snsce

    Christmas celeberation in snsce

    Christmas, celebrated on December 25th every year, is a time when the world comes alive with festive lights…

  • UI/UX

    UI/UX

    UX design is all about solving user problems and creating relevant, easy, enjoyable and accessible experiences. It’s a…

  • LEATCODE

    LEATCODE

    leetCode is an online platform for coding interview preparation. The service provides coding and algorithmic problems…

  • Photonic Integrated Circuit Market Analysis

    Photonic Integrated Circuit Market Analysis

    Photonic Integrated Circuit Market Analysis The Photonic Integrated Circuit (IC) Market size is estimated at USD 13.43…

社区洞察

其他会员也浏览了