Title: Cyber Security
1CYBER SECURITY
- ALL ABOUT IT THAT ONE SHOULD KNOW
2INTRODUCTION
- Cyber attacks are increasing day by day so to
protect the system and the data form this attacks
some cyber security measures are taken. The need
of cyber security was felt when cyber attacks
were increasing and people were getting problems
from it.Cyber security needs dedication. The
multinational companies and industries are having
a great amount of possessive data, so there
protection is important as well as. The details
of clients and there contracts are very sensitive
so that every company needs cyber security. When
the data is protected by means of technical
security we can say it cyber security.
3THREATS OF CYBER SECURITY
- SQL Injection-When an attacker inserts a
complicated SQL statement in order to get the
information from a particular website ,it is
known as SQL injection. - Malwares-When malware software are used to get
the information related to someones company then
it is called as malware attack. - Social Engineering- It is the way of getting user
name,password,card numbers etc.for impersonating
a contractor or customer. - Password attacks are another type of cyber
security hacks .Generally password attacks
happens in getting sensitive information of
credit cards.
4The illegal attackers generally attack retail
shops online, as there websites are outdated and
can be hacked easily.Hence one should know all
the security threats for protecting their website.
5PRECAUTIONS OF CYBER SECURITY
- Pre-evaluation-In this the security system is
checked in advance before any attack. - Strategic planning- A planning in advance should
be planned in order to protect the data of our
system. - Implementation-There are stages for this process-
- Commitment of the employees
- Commitment of management
- Commitment with organizational members
- Post evaluation-Here the success of the process
is determined from Pre-evaluation to
implementation.
6SYSTEM WHICH ARE AT MAJOR RISKS
- The systems which are at major risks by cyber
crime are goverment ,large corporation,consumer
devices,financial systems etc. - Government -The government and military systems
and sites are generally attacked by an authorised
member or foreign powers in order to get
information about a countrys security
information and to get information about its
people. - Large corporation-Commonly large corporations are
targeted for financial gain of the hacker. It can
be done by any person or Foreign power. - Consumer devices-The consumer devices are
targeted by means of getting basic information,
Card numbers,sensitive health information etc.
7MOTIVE OF ATTACKERS
- The motive of attackers can be different in every
case. Some are criminals which are willing for
financial gain, some are willing for someones
basic information for their use. The military
security is also targeted by the foreigners some
time. The military security and banks are
targeted mostly by hackers.
8SECURITY MEASURES
- There are some security measures which can be
taken to protect data, information etc of a
company or a personal computer. - Firewall is the common step that is taken
nowadays for protecting the system for external
agents. - User access account controls can protect the
data and information of a system. - Intrusion Detection System is designed
particularly for detecting any cyber attack in
advance.
9MAJOR CYBER ATTACKS
- The South Korean nightmare
- Alteryx data leak
- Marriott Hotels privacy of customers
compromised - Adult Friend Finder Exposed
- Panic at Sony
10The conclusion depicts that a large corporation,
government sites, military systems and personal
systems must be secured in order to protect the
information and data related to a customer,
military operation and basic information. For
more information visit Technology moon