Skip to main content

WHAT IS THE CYBER SECURITY !!!!?


 

 

Cyber security is the mode of defending computers, servers, mobile devices, electronic systems, networks, and data from hacker attacks. (What is Cyber Security?, 2020)

we can be divided the cyber security into a few common categories:

1) Network security.

2)Application security.

3)Information security.

4)Operational security.

5)Disaster recovery and business continuity.

6)End-user education. (What is Cyber Security?, 2020)

 

An essential job in cyber security is protecting kinds of technology devices and Sensitive data from hacker attacks. (Taylor, H. 2020) These attacks impact on a different variety of users, whether if they are governments, individuals, institutions, banks, universities, Etc

The methods of hacker attacks consist of many technical tools, these technical are developing rapidly to stay invisible and penetrate through the protective technical walls to harm or steal the personal data. (Taylor, H. 2020)

The following types show the popular methods using by the hacker for attacking in the cyber space and :

 

1-Malware. Software that performs a malicious task on a target device or network, e.g. corrupting data or taking over a system.

2-Phishing. An email-borne attack that involves tricking the email recipient into disclosing confidential information or downloading malware by clicking on a hyperlink in the message.

3-Spear Phishing. A more sophisticated form of phishing where the attacker learns about the victim and impersonates someone he or she knows and trusts.

4-"Man in the Middle" (MitM) attack. Where an attacker establishes a position between the sender and recipient of electronic messages and intercepts them, perhaps changing them in transit, the sender and recipient believe they are communicating directly with one another. A MitM attack might be used in the military to confuse an enemy.

5-Trojans. Named after the Trojan Horse of ancient Greek history, the Trojan is a type of malware that enters a target system looking like one thing, e.g. a standard piece of software, but then lets out the malicious code once inside the host system.

6-Ransomware. An attack that involves encrypting data on the target system and demanding a ransom in exchange for letting the user have access to the data again. These attacks range from low-level nuisances to severe incidents like the locking down of the entire city of Atlanta's municipal government data in 2018.

7-Denial of Service attack or Distributed Denial of Service Attack (DDoS). Where an attacker takes over many (perhaps thousands) of devices and uses them to invoke the functions of a target system, e.g. a website, causing it to crash from an overload of demand.

8-Attacks on IoT Devices. IoT devices like industrial sensors are vulnerable to multiple types of cyber threats. These include hackers taking over the device to make it part of a DDoS attack and unauthorized access to data being collected by the device. Given their numbers, geographic distribution and frequently out-of-date operating systems, IoT devices are a prime target for malicious actors.

9-Data Breaches. A data breach is a theft of data by a malicious actor. Motives for data breaches include crime (i.e. identity theft), a desire to embarrass an institution (e.g. Edward Snowden or the DNC hack) and espionage.

10-Malware on Mobile Apps. Mobile devices are vulnerable to malware attacks, just like other computing hardware. Attackers may embed malware in app downloads, mobile websites or phishing emails and text messages. Once compromised, a mobile device can give the malicious actor access to personal information and location data. (Taylor,H. 2020)

 

In the other hand, many antivirus applications are developed by programming experts to protect and save variety devices against hacker attacks.  (Leaf. 2020)

There are some instructions to avoid or reduce the impact of hacker threats:

 

1-Train your staff.

2-Keep your software and systems fully up to date.

3-Ensure Endpoint Protection

4-Install a Firewall.

5-Backup your data

6-Control access to your systems

7-Wifi Security

8-Employee personal accounts

9-Access Management

10-Change Passwords continuously. (Leaf. 2020) .

 

References

Leaf. 2020. 10 Ways To Prevent Cyber Attacks - Leaf. [online] Available at: <https://leaf-it.com/10-ways-prevent-cyber-attacks/> [Accessed 25 October 2020].

Taylor, H., 2020. What Are Cyber Threats And What To Do About Them - The Missing Report. [online] The Missing Report. Available at: <https://preyproject.com/blog/en/what-are-cyber-threats-how-they-affect-you-what-to-do-about-them/> [Accessed 25 October 2020].

www.kaspersky.co.uk. 2020. What Is Cyber Security?. [online] Available at: <https://www.kaspersky.co.uk/resource-center/definitions/what-is-cyber-security> [Accessed 24 October 2020].

Academy.avast.com. 2020. [online] Available at: <https://academy.avast.com/hubfs/New_Avast_Academy/Hackers/Hacker-Hero.jpg> [Accessed 25 October 2020].

Axis.com. 2020. [online] Available at: <https://www.axis.com/blog/secure-insights/wp-content/uploads/sites/11/2018/03/cybersecurity_network_cameras_ip.jpg> [Accessed 25 October 2020].

Leapit.co.uk. 2020. [online] Available at: <https://www.leapit.co.uk/wp-content/uploads/2019/11/Cyber-Security-Importance-1080x675.jpeg> [Accessed 25 October 2020].

 

Comments

  1. Very good Abdullah, However you have only used references at the end of your text, can you include them inside the text.

    ReplyDelete
  2. Hello Adbullah! Overall, it is very good, however I think you should add some references in your text as well.

    ReplyDelete

Post a Comment

Popular posts from this blog

SOFTWARE FUNCTIONALITIES EXPLAINED(CISCO PACKET TRACER)

Menu Bar: This bar shows  File ,  Edit ,  Options ,  View ,  Tools ,  Extensions , and  Help  menus. commands such as  Open ,  Save ,  Save as Pkz, Print , and  Preferences  in these menus.  Main toolbar: This bar shows  icons to the  File  and  Edit  menu commands, buttons for  Copy ,  Paste ,  Undo ,  Redo ,  Zoom , Drawing Palette ,  Custom Devices Dialog . On the right,  there the  Network Information. Real-time/simulation Bar: here you can choose between real-time mode or simulation mode. User Created Packet Window: This window shows the packets you place in the network during the simulation process. Network component box:  This bar contains all of the network and end devices available with Packet Tracer. Workspace: This is the area where the project is created, and simulations are displayed.

SECURE SPEECH SOLUTIONS -DIGITAL ENCRYPTION

Secure speech is defined as a method to protect the voice data from any interruption or eavesdropping operations which may occur during the call. Radio communication is being faced with many technical threats which may affect on the destination of the signal, especially with some devices which used an old generation of encryption system. The digital encryption is used as one of various types of s peech   encryption.  (Voice Crypto, 2020)  ''The  Speech is first digitized using an Analog-to-Digital Converter (ADC) or a Vocoder  The resulting digital data stream is then mixed using an XOR-operation with a data stream from a pseudo-random number generator (PRNG) This principle is also known as the Vernam Cipher. The resulting encrypted data stream that is then converted back to the analogue domain (modem), so that it can be transmitted.''  (Voice Crypto, 2020) The next simplified diagram is shown the process of digital encryption.   (Voice Crypto, 2020) References: Cryptom