What is Cybersecurity | Definitions, Types and Cyber Threats

person-hacking-cybersecurity-bytescheck.com

Let's understand the term Cybersecurity

Cybersecurity is a practice that helps protect digital devices, networks, and programs from unauthorized access, disclosure, and modification from malicious actors. It helps safeguard mobile devices, laptops, networks, etc. from cyber threats like phishing, Man in the Middle attacks, ransomware, viruses, etc.

Types of Cybersecurity

  • Critical Infrastructure Security
Critical Infrastructure Security is a practise that protects vital systems, network, digital data of the nation on which the whole society depends upon.

  • Network Security 

Network security safeguards data and IT systems within a network by defending against unauthorized access, cyberattacks (like malware, ransomware, phishing), and security breaches. It enforces access control measures to ensure only authorized users can access specific resources, maintaining the confidentiality, integrity, and availability (CIA triad) of the network. This ensures user privacy, protects sensitive data, and guarantees authorized users have reliable access to what they need.

  • Application Security

Application security plays a critical role in protecting those in-premise as well as cloud applications from unauthorized access, vulnerabilities, and cyber attacks, helping only authorized person to access the application. By implementing comprehensive application security, it can assist in identifying vulnerabilities in the application to prevent hackers from penetrating the network.

  • Endpoint Security

Endpoints like mobile devices, servers, laptops, etc. are the primary targets of cyber attacks. Endpoint security enables the protection of these devices and the network from cyber attacks.
  • Cloud Security
Cloud security plays a key role in safeguarding the organization's cloud services and assets, including data, services, development tools, servers, and more.
  • Information Security
Information security (InfoSec) safeguards an organization's vital information assets, including digital data, physical documents, and even spoken communication, from unauthorized access, use, disclosure, disruption, modification, or destruction.

Types of Cyberattacks

  • Malware
Malware is a type of software designed for gaining unauthorized access computers and other digital devices.
  • Dos and DDos Attack
DOS and DDoS attacks, prevent the computer from fulfilling requests because the network or server is overwhelmed with too many requests to handle.
  • Man in the Middle Attack
In an MITM attack, the attacker intercepts communication between two individuals over a network.
  • Phishing Attack
Phishing is a attack in which the attack sends an email that appears to be from a legitimate source asking for sensitive information.
  • SQL Injection
An SQL injection is a attack in which the attacker take controls over and steals data directly from the database.
  • DNS Spoofing
DNS (Domain Name System) Spoofing is a type of attack in which attack modifies the DNS records which redirects users to a fraudulent website. Those websites appear to be legitimate and request sensitive information from users.
  • Brute force Attack
The word brute-force attack got its name from 'brutish'. This attack involves the attacker trying to guess a user's credentials in order to access their accounts.
  • XSS Attack
An XSS, or cross-site scripting attack occurs when the attacker inserts malicious script into the web page that is viewed by other users.

Safety Tips: protect yourselves from cyber attacks

  • Stay Vigilant Against Phishing: Phishing scams are a prevalent tactic used by attackers. Exercise caution with suspicious emails or links, even if they seem to come from a trusted source. Verify the legitimacy of attachments or links before clicking on them.
  • Use Strong Passwords: Protect your accounts with complex and unique passwords. Avoid using easily guessable information and consider utilizing a password manager for secure storage and generation of strong passwords.
  • Keep Software Updated: Ensure your operating system, web browser, and applications are regularly updated to address security vulnerabilities and stay protected against potential attacks.
  • Secure Your Wi-Fi Connection: Public Wi-Fi networks are often unsecured, so be cautious when accessing confidential information. Use a Virtual Private Network (VPN) for added security when necessary.
  • Be Cautious with Downloads: Only download software from reputable sources to avoid malware risks. Exercise caution with free downloads that may seem enticing but could pose security threats.
  • Regularly Back Up Your Data: Protect against data loss from cyberattacks by regularly backing up important data to secure external drives or cloud storage.
  • Enable Two-Factor Authentication (2FA): Add an extra layer of security to your online accounts with 2FA, which requires a second verification step (such as a code sent to your phone) in addition to your password during login.

      Previous Post Next Post