What is Cyber-Security
To protect the digital Computer, networks, software from digital attacks is known as cyber security. The aim of cyber attack is to accessing, or destroying the sensitive information, or interrupt the normal business, demand for money (Crypto Currency). A successful cybersecurity has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe.
Types of Cyber Threats
Malware is a software containing malicious code that is send to the victim’s system for trying to taking access over their system.
There are various types of malware for different purposes.
It is used to monitor the victim’s system and trying to stolen their sensitive information without acknowledgement to the victim.
Trojan is like a legitimate software, when the victim download it, and execute that software. Then it gives the target system access to the attacker.
In the Ransomware attack, attacker encrypts the victim’s system sensitive information and demand for money to decrypt that information.
RATs are known as remote access Trojans, that are installed and run on the backdoor at victims system and provide remote control access to the attacker so that the attacker can see all the activity that are running by the victim.
Phishing is done by sending malicious email or messages to the victims that are same as legitimate emails. When the victims click on the malicious link then it redirect into some malicious downloading page or it will ask for some sensitive information like credit card details or other thing.
Virus is a malicious code that is installed on the victims system without their knowledge. And it can run on all the devices that will connect from that system. It is hard to detect the viruses because it travel from one system to another.
It works like as virus, but it doesn’t need to connect the system physically. It can travel from one system to another through emails or messages that the victims sends. And effect all the system that the victim wants to communicate virtually. It is also a malicious code like as Virus.
DOS & DDOS
DOS is known as denial of services and DDOS is known as distributive denial of services. It is used to send a lot of traffic on the victims system or the browser, so that it can intrupt the handshake and the victim is not able to get response by legitimate request.
It is known as man-in-the-middle attack. The attacker intercept two party communication and put itself into the middle. When first party send any query then the attacker change it and send any other query to the second party. It is a method to get some sensitive information.
It is used to affect a millions of internet-connected devices. And it is difficult to detect even when the botnet is running.
It is known as Structured Query Language (SQL). In this type of attack the attacker tries to detect some query language in the target website for getting it’s database directory. If it execute then the attacker can edit all the database of the target website.
It is latest type of the attack. When the exploitation method of any vulnerability goes viral on the internet before the patching of that vulnerability. This type of attack is rising on day to day by 2021.
Advance Persistent Threats (APT)
When an attacker detect any loop whole in any system or website and they do not inform the victims, capture everything on the daily basis for a long time without victim knowledge. Then it is known as APT.
It is known as Domain Name System Attack. An attacker make a website same as target website, then the visitors confuse on the website and some time they try to open malicious code containing website. This is known as DNS Attack.
Brute Force Attack
If the user is generally using a simple username and password then the attacker can brute force on it. And able to get their name and password. Generally millions of username and password are given in the open source internet, and attacker detect by using these list.
Important Notice for college students
If you’re a college student and have skills in programming languages, Want to earn through blogging? Mail us at email@example.com