CYBER SECURITY-ALL ABOUT IT THAT YOU SHOULD KNOW

Posted by Vartika Goyal on June 12th, 2019

Cyber security is the technique of protecting internet-connected systems,softwares,hardwares,data etc. from unauthorised access or attacks.

Cyber attacks are increasing day by day so to protect the system and the data form this attacks some cyber security measures are taken. The need of cyber security was felt when cyber attacks were increasing and people were getting problems from it.Cyber security needs dedication. The multinational companies and industries are having a great amount of possessive data, so there protection is important as well as. The details of clients and there contracts are very sensitive so that every company needs cyber security. When the data is protected by means of technical security we can say it  cyber security.

The most common cyber security threats are-                                      

SQL Injection-When an attacker inserts a complicated SQL statement in order to get the information from a particular website ,it is known as SQL injection.

Malwares-When malware software are used to get the information related to someone’s company then it is called as malware attack.

Social Engineering- It is the way of getting user name,password,card numbers etc.for impersonating a contractor or customer.

Password attacks are another type of cyber security hacks .Generally password attacks happens in getting sensitive information of credit cards.

The illegal attackers generally attack retail shops online, as there websites are outdated and can be hacked easily.Hence one should know all the security threats for protecting their website.The precautions of cyber security are-

Pre-evaluation-In this the security system is checked in advance before any attack.

Strategic planning- A planning in advance should be planned in order to protect the data of our system.

Implementation-There are stages for this process-

·        Commitment of the employees

·        Commitment of management

·        Commitment with organizational members

Post evaluation-Here the success of the process is determined from Pre-evaluation to implementation.

The systems which are at major risks by cyber crime are goverment ,large corporation,consumer devices,financial systems etc.

  •  Government -The government and military systems and sites are generally attacked by an authorised member or foreign powers in order to get information about a country’s security information and to get information about it’s people.

  • Large corporation-Commonly large corporations are targeted for financial gain of the hacker. It can be done by any person or Foreign power.

  • Consumer devices-The consumer devices are targeted by means of getting basic information, Card numbers,sensitive health information etc.

  • Financial systems-The financial systems of the world are targeted for getting financial gain. The investment banks, Swiss bank are the main targets of hackers.

The motive of attackers can be different in every case. Some are criminals which are willing for financial gain, some are willing for someone’s basic information for their use. The military security is also targeted by the foreigners some time. The military security and banks are targeted mostly by hackers.

Security measures-There are some security measures which can be taken to protect data, information etc of a company or a personal computer.

·   Firewall is the common step that is taken nowadays for protecting the system for external agents.

·     User access account controls can protect the data and information of a system.

·    Intrusion Detection System is designed particularly for detecting any cyber attack in advance.

The conclusion depicts that a large corporation, government sites, military systems and personal systems must be secured in order to protect the information and data related to a customer, military operation and basic information.



Regards

Technology moon

Like it? Share it!


Vartika Goyal

About the Author

Vartika Goyal
Joined: June 12th, 2019
Articles Posted: 3

More by this author