Computer Security

computer security
cyber security

Computer security, cyber security or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Cyber security is the practice of protecting systems, networks, and programs from digital attacks and these cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.

Types of cyber security:

  1. Malware- Malware is malicious software such as spyware, ransomware, viruses and worms.
  2. Emotet.
  3. Denial of Service.
  4. Man in the Middle.
  5. Phishing.
  6. SQL Injection.
  7. Password Attacks.

Its importance:

Cyber security is important because it protects all categories of data from theft and damage. This includes sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems.

How do hackers attack?

Hackers use malware to steal data directly from victims’ computers using spyware, remote administration malware, brute forced passwords, planting malware on victims’ devices via infected websites and transmitting malicious attachments and links by email.

Where do cyber attacks come from?

A cyber attack can be employed by sovereign states, individuals, groups, society, or organizations, and it may originate from an anonymous source. A product that facilitates a cyber attack is sometimes called a cyber weapon.

Which types of hackers exist?

  • 1) White Hat Hackers.
  • 2) Black Hat Hackers.
  • 3) Gray Hat Hackers.
  • 4) Script Kiddies.
  • 5) Green Hat Hackers.
  • 6) Blue Hat Hackers.
  • 7) Red Hat Hackers.
  • 8) State/Nation Sponsored Hackers.

Why do we hack?

One of the most common reasons for hackers to hack is to steal or leak information. A lot of times, hackers also steal information in order to assume your personal identity and then use it for something else like transferring money, taking a loan, etc.

Why are hackers dangerous?

They put all businesses at risk by exposing the company network and causing data breaches. One of the main dangers of hacking is that bad actors will use a small amount of accurate information in an email to create a phishing campaign that tricks a single user into accessing a compromised resource.

Who is responsible for cyber attacks?

Department of Defense / Intelligence Community / NSA / Cyber Command – responsible for detection, prevention, and defense in foreign space, foreign cyber threat intelligence and attribution, security of national security and military systems; and, in extremis, defense of the homeland if the Nation comes under cyber.

What is the most common type of cyber threat?

Phishing attacks often arrive in the form of an email pretending to be from a legitimate organization, such as your bank, the tax department, or some other trusted entity. Phishing is probably the most common form of cyber-attack, largely because it is easy to carry-out, and surprisingly effective.

How do hackers access your computer?

Hackers can use your computer in a number of ways some of which are listed below: Install a key logger and capture every username and password typed on the keyboard. A hacker can then use your computer to log into your bank accounts, carry out transactions and basically steal your money.