What is Cybersecurity and Why it is important in today's time?
You must be hearing about cybercrimes these days like online fraud, leaking personal details online and blackmailing, etc. These crimes are increasing rapidly. According to Indian Computer Emergency Response (CERT-In), the first two months of 2022 has reported more cybercrimes than the entire 2018. India reported 2,08,456 incidents in 2018 and 2,12,485 incidents in the first two months of 2022. Majorly, the cybercrime is increasing through Internet. Thus, it is important to know what is cybersecurity.
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Before moving further, lets know what are the types of cyber threats:
1. Cybercrime: Cybercrime is any criminal activity that involves a computer, networked device or a network. While most cybercrimes are carried out in order to generate profit for the cybercriminals, some cybercrimes are carried out against computers or devices directly to damage or disable them.
2.Cyber-attacks: A cyber-attack is an assault launched by cybercriminals using one or more computers against a single or multiple computers or networks. A cyber-attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.
3. Cyber terrorism: Cyberterrorism is defined by U.S. Federal Bureau of Investigation as a premeditated attack against a computer system, computer data, programs and other information with the sole aim of violence against clandestine agents and subnational groups. The main aim behind cyberterrorism is to cause harm and destruction.
4. Malware: Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.”
Examples of common malware includes viruses, worms, Trojan viruses, spyware, adware, and ransomware.
· Virus- A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.
After entering a computer, a virus attaches itself to another program in such a way that execution of the host program triggers the action of the virus simultaneously. It can self-replicate, inserting itself onto other programs or files, infecting them in the process.
- Trojan- Trojan or Trojan horse is the name given to a computer virus. It is a type of computer software that is camouflaged in the form of regular software such as utilities, games and sometimes even antivirus programs. Once it runs on the computer, it causes problems like killing background system processes, deleting hard drive data and corrupting file allocation systems.
- Spyware- Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware uses your internet connection to relay personal information such as your name, address, browsing habits, preferences, interests or downloads.
- Ransomware- Ransomware is a malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key, cyber-attackers place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files.
- Adware- Adware is any software application in which an advertising banner or other advertising material displays or downloads while program is running. The ads are delivered through pop-up windows or bars that appear on the program's user interface.
- Botnet- A botnet [short for bot network] is a network of hijacked computers and devices infected with bot malware and remotely controlled by a hacker, known as the “bot-herder.” Each individual machine under the control of the bot-herder is known as a bot.
- 5. SQL Injection: An SQL injection, sometimes abbreviated to SQLi, is a type of cyber-attack in which a hacker uses a piece of SQL (structured query language) code to manipulate a database and gain access to potentially valuable information. It’s one of the most prevalent and threatening types of attack because it can potentially be used against any web application or website that uses an SQL-based database (which is most of them).
6. Phishing: Phishing is a type of cybercrime in which victims are contacted by email, telephone, or text message by an attacker posing as a trustworthy entity in order to obtain sensitive information or data, such as login credentials, credit card details, or other personally identifiable information. Phishing attackers will typically ask for:
· Date of birth
· Social security number
· Phone number
· Credit card details
· Home address
· Password information
7. Man-in-the-middle attack: A man in the middle (MITM) attack is a general term for when a perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the parties, making it appear as if a normal exchange of information is underway.
The goal of an attack is to steal personal information, such as login credentials, account details and credit card numbers. Targets are typically the users of financial applications, SaaS businesses, e-commerce sites and other websites where logging in is required.
Information obtained during an attack could be used for many purposes, including identity theft, unapproved fund transfers or an illicit password change.
8.Denial-of-service attack: A denial-of-service (DoS) attack is a cyberattack on devices, information systems, or other network resources that prevents legitimate users from accessing expected services and resources. This is usually accomplished by flooding the targeted host or network with traffic until the target can't respond or crashes.
Cybersecurity related facts
1. There is a hacker attack every 39 seconds
2. 43% of cyber-attacks target small business
3. The global average cost of a data breach is $3.9 million across SMBs
4. Since COVID-19, the US FBI reported a 300% increase in reported cybercrimes
5. 9.7 Million Records healthcare records were compromised in September 2020 alone
Comments
Post a Comment