Cyber Security is the process of protecting electronic devices, networks from malicious attacks. These cyber attacks are performed to exploit the systems, to get sensitive information or to get full access. We are in the digital world, but there is a threat as well because there’s an increase in digital products and a lot of people save their confidential information in those products. To get this information many attackers try to enter into your device to get access to your sensitive data. Main elements of cyber attacks are: Network Security
Information Security
Application Security
Disaster Recovery Network Security
Network security is the process of protecting the network with the help of penetration testing tools to exploit their own network to find the vulnerabilities and rectify so they won’t be affected by the attackers.
Information is the backbone for any kind of organization, so this Information Security is designed to protect the data from the attackers. Main job of Information Security is to protected the data from the unauthorized access, modification, destroying the information etc. Confidentiality, Integrity and Availability plays a major role in Information Security. Application Security: Application Security is used to know the security of the application by finding and fixing the vulnerabilities at different stages of the application life-cycle like design, development, deployment and maintenance. There are many different ways to find the application vulnerabilities like Blackbox testing,Whitebox testing.
Disaster Recovery is a list of policies which will help the organization , if there is any serious abnormal activities occurred like cyber attacks, server failures. With this the organization can restore the hardware and data swiftly for their business continuity. Types of Cyber attacks: Phishing: Phishing is the process of sending fraudulent mails to the victims it looks as if it came from the trusted individual, but it’s from the attacker. It is one of the top cyber attacks. With this kind of attack the attacker tries to get all the sensitive information like credit card details, password etc. Malwares: Malwares are kind of small software programs designed to infect the system and destroy the data in the devices .There are different kinds of malwares like Virus, Worms, Trojans, Adware, Hijackers etc. SQL Injection: SQL Injection is also known as “SQLI”, this is one of the best hacking technique. The malicious code is sent into the websites using the input forms in a website. This can corrupt entire database which is using SQL as a database. Keyloggers: A keylogger is a software program that is used to record and monitor the key strokes of the particular keyboard. Keyloggers are type of virus, trojans. This keyloggers are designed to get the sensitive information like bank details, email and password etc which gives some fruits to the attacker.
There are 2 types of keyloggers ,they are hardware based and software based. Denial of Service(DoS): Denial of Service is a kind of attack ,where a attacker sends more traffic to a particular website .With that a particular website’s server breaks down and the legitimate users also can’t see the information. There are 2 types of DoS attacks, they are : Crash Services Flood Services Eavesdropping: It is a process of intercepting the communication between the 2 points, like user and server.