by

Nikita

06 Oct 2014, 07:39 pm

about the author

An electronics and communication engineer, Nikita has extensive flair towards writing and has written for a number of print and online publications. At TechCult, she provides a deeper insight to social media marketing, web design and development and social stuff! She is a self- defined geek and a staunch gadget lover!

About Nikita

Everything That You Needed To Know About Cyber Security

Cyber Security

We are living in the internet world and we do lot of transaction on the internet. But how safe is our data and transaction? Today we find cyber crimes increasing and hence need to make sure our cyber security. What is cyber crime?

 

It is a crime involving computers and the networks. Cyber crimes include attack against hardware and software, financial crimes like online fraud, credit card fraud, and abuse like sexploitation. There are three main cyber security goals.

Confidentiality

It means the computer related assets are accessed only by the authorized parties.

Also Read: Top 10 Utilities To Secure Data On Your Computer From An Attack

Integrity

It refers that the computer related assets are modified only by the authorized parties in authorized ways.

Availability

The computer assets must be available to the authorized people at the appropriate time.

There are several attacks and threats that breach the cyber security of the computers and networks. Some of them are cited below:

Cyber Security Measures

VIRUS – Vital Information Resource Under Siege:

Viruses are programs that can copy themselves and infect the computer without the knowledge or permission of the owner.

Example Melissa virus and I Love you virus

Both the viruses are email viruses i.e. spread through e-mail. Melissa is one of the fastest spreading viruses which sent e-mail messages to the first 50 people in the address book. The latter virus was sent as a piece of code sent in the attachment which when double clicked was triggered and sent to everyone in the victim’s address book.

WORM:

A piece of software which uses computer flaws and holes to replicate itself is called a worm. The difference between a virus and the worm is that the virus does not have a propagation vector and hence infect only a single host. Worm propagates and infects other computers as well

Eg: Code Red

This worm made huge headlines in 2001 by posing a great threat to cyber security.

It slowed down the internet traffic when it started replicating.

Trojan horse 

Trojan horses are programs which claim to do something innocuous (and usually do), but which also hide malicious behavior. It has a potential even to erase our hard disk.

Eg : Nimbus and Zeus

Logic Bomb 

These are malicious code hiding in the software present in the computer. It waits for certain trigger to execute its payload.

 

Back doors 

It is a set of instructions designed to bypass the normal authentication mechanism and allow access to the system to anyone who knows that the back door exist. This could be a great threat to cyber security.

Salami attack 

A salami attack consists of many smaller, often considered inconsequential attacks.

Eg: Credit card thieves make vary small charges to many cards.

Root kits

It is a method to gain unauthorized root or administrative privileges to a machine.

Interface illusion

We expect our computer to behave in certain ways when we interact with standard user interface elements. But often, malicious code can make non standard user interface elements in order to trick.

Phishing

It is a good example of interface illusion. It looks like you are revisiting the Paypal’s website, but you are really not. And then you enter the password and yes, you just gave it to an attacker.

Latest cyber attacks

Not only the individual but also big organization and companies fall prey to hacking. Ebay was embarrassed to inform that hackers stole personal records of 233 million users this year. Even the most secured passwords were compromised. Ebay asked their users to change their passwords and asked them to assure that their financial information was not stolen.

Cyber Security Importance

Waterhole attack

It is the hacker’s favorite tool today. Many high profile companies like Facebook, Microsoft and Twitter are victims to this attack.  These hackers poison the website frequented by the users. Either the hackers modify the entire website code or install other malware

Cyber Security against these attacks

1. Get the latest AntiVirus Software.

2. Make sure you have the latest security patches and hot fixes using Windows Update.

3. Use a host-based Firewall.

4. BACKUP your Important Files

5. Never click links in email – go to the site and log on directly.

6. Do not give personal information over the phone or email.

7. Security passwords must not be shared even to the close relatives and friends.

8. Watch out for the links sent via email or text.

9. Change your passwords frequently.

10. Check the legitimacy of the provider while downloading apps in smart phones or software in your system.

Today not only the computers but our smart phones are also victims for hacking. Every cyber security measures can be breached by smart hackers. Even when the security is breached immediate action to prevent further damage must be taken.

by

Nikita

06 Oct 2014, 07:39 pm

about the author

An electronics and communication engineer, Nikita has extensive flair towards writing and has written for a number of print and online publications. At TechCult, she provides a deeper insight to social media marketing, web design and development and social stuff! She is a self- defined geek and a staunch gadget lover!

About Nikita
Comment with Facebook

trending

Featured Posts

Editors Choice

Reviews