Cyber security
Cyber security basically means protecting our important information, Data , network and our other information from unauthorized an unattended access , cyber security is important because it helps to secure our information as well our system from virus attack Its basically the application of an technology which process and even control to protect the system from various virus The another main aim is also to reduce the risk of cyber attack sand help them by protecting it from unauthorized exploitation system network and technology. Cyber security is to defend our server, computer, mobile phone, technology system our data from attack. There are mostly 08 types of cyber attack.
Malware – Malware include the various kinds of attacks like spyware, worms and other various types of viruses.
Phishing – phishing is an social engineering attack which is mostly used to steal others data.
Man – In – The – Middle (MITM) Attack- This attack is like eavesdropping , In this attacker interrupt the conversation most likely transfer the data.
DOS Attack- Denial attack basically used to shut down the server, machine, networks these doesn’t allow the user to access there machine , network or server.
SQL Injection- In these it generally allow the attacker to view the data which normally they can’t retrieve.
Zero day exploit- The term exploit is referred to exploiting the particular network to prevent this kind of attack it always require the constantly monitoring , the protective detection.
Password attack- password attack is the common attack in which the attacker assume the password of the user, also this is an quick method if the attacker know the user. The whole data even the whole monitor can get hacked in this method.
Rootkits – Rootkits are usually installed inside the software where they can easily assess the data from the system.
Internet of things (LOT) - While internet connectivity across almost every imaginable device creates convenience and ease for individuals, it also presents a growing—almost unlimited—number of access points for attackers to exploit and wreak havoc. There is such a great risk for an individual for there personal information and financial transactions. These can also be used for there personal gain such as blackmailing and for fraudulent transactions, accessing there bank account details as we It is very important for an individual organizations and others to be alert. India rank higher for cases like malware and ransomware attacks if it is compared to global peers globally. Even Yahoo acknowledged that there are three billion email accounts were breach in 2013.
In India –The Reliance Jio, IRCTC, Yes Bank etc. All these platforms faces the large number of cyber crime McAfee Labs researcher had searched 244 new cyber threats in India every minutes.The increasing use of the all Internet platform and social media platform has made cyber security even more important. we even need more advanced security system to reduce the cases of the cyber attack, threat. On the Regular update of antivirus is the genuine product only. Which is More awaring among the people, users should be aware about the security of the particular data. Thus it is a need to implement better cyber security laws by the government for safety example National Cyber Security Policy 2013 the Latest was SC Directives to Govt. For data privacy.The easy way we can do is to increase our security of our technology or any password data software , server etc and rest at night knowing that our data is safe and no one change our passwords.The user should use a password which manage the tool like LastPass, Dashlane or Sticky Password to keep the track of everything which is happening. All these applications help us to create a unique password , secure the passwords for each site, while All this application can keep a track for you.
The another easy way for the attacker is to gain the access to our data, network is to use the old credential which have fallen long the way. So deleting the unused account would be helpful to keep a tarck on it.
To enable the two-factor of authentication which also add some extra security for our login credentials. The additional layout of security that makes it look harder to the attacker to get into the account which the attacker is trying to get access Always Keeping the software up to date would also be beneficial and helpful for the user.Due to high number of internet penetration today, the cyber security is one of the biggest
needs in the world because the cyber security threats are really very dangerous for the of the country. The amount of loss it can happen if an hacker can get access to it is unpredictable because they could easily hack bank account or any valuable data which is important for a person . Cyber security is a must security as well an important subject.
">
Cyber security
Cyber security basically means protecting our important information, Data , network and our other information from unauthorized an unattended access , cyber security is important because it helps to secure our information as well our system from virus attack Its basically the application of an technology which process and even control to protect the system from various virus The another main aim is also to reduce the risk of cyber attack sand help them by protecting it from unauthorized exploitation system network and technology. Cyber security is to defend our server, computer, mobile phone, technology system our data from attack. There are mostly 08 types of cyber attack.
Malware – Malware include the various kinds of attacks like spyware, worms and other various types of viruses.
Phishing – phishing is an social engineering attack which is mostly used to steal others data.
Man – In – The – Middle (MITM) Attack- This attack is like eavesdropping , In this attacker interrupt the conversation most likely transfer the data.
DOS Attack- Denial attack basically used to shut down the server, machine, networks these doesn’t allow the user to access there machine , network or server.
SQL Injection- In these it generally allow the attacker to view the data which normally they can’t retrieve.
Zero day exploit- The term exploit is referred to exploiting the particular network to prevent this kind of attack it always require the constantly monitoring , the protective detection.
Password attack- password attack is the common attack in which the attacker assume the password of the user, also this is an quick method if the attacker know the user. The whole data even the whole monitor can get hacked in this method.
Rootkits – Rootkits are usually installed inside the software where they can easily assess the data from the system.
Internet of things (LOT) - While internet connectivity across almost every imaginable device creates convenience and ease for individuals, it also presents a growing—almost unlimited—number of access points for attackers to exploit and wreak havoc. There is such a great risk for an individual for there personal information and financial transactions. These can also be used for there personal gain such as blackmailing and for fraudulent transactions, accessing there bank account details as we It is very important for an individual organizations and others to be alert. India rank higher for cases like malware and ransomware attacks if it is compared to global peers globally. Even Yahoo acknowledged that there are three billion email accounts were breach in 2013.
In India –The Reliance Jio, IRCTC, Yes Bank etc. All these platforms faces the large number of cyber crime McAfee Labs researcher had searched 244 new cyber threats in India every minutes.The increasing use of the all Internet platform and social media platform has made cyber security even more important. we even need more advanced security system to reduce the cases of the cyber attack, threat. On the Regular update of antivirus is the genuine product only. Which is More awaring among the people, users should be aware about the security of the particular data. Thus it is a need to implement better cyber security laws by the government for safety example National Cyber Security Policy 2013 the Latest was SC Directives to Govt. For data privacy.The easy way we can do is to increase our security of our technology or any password data software , server etc and rest at night knowing that our data is safe and no one change our passwords.The user should use a password which manage the tool like LastPass, Dashlane or Sticky Password to keep the track of everything which is happening. All these applications help us to create a unique password , secure the passwords for each site, while All this application can keep a track for you.
The another easy way for the attacker is to gain the access to our data, network is to use the old credential which have fallen long the way. So deleting the unused account would be helpful to keep a tarck on it.
To enable the two-factor of authentication which also add some extra security for our login credentials. The additional layout of security that makes it look harder to the attacker to get into the account which the attacker is trying to get access Always Keeping the software up to date would also be beneficial and helpful for the user.Due to high number of internet penetration today, the cyber security is one of the biggest
needs in the world because the cyber security threats are really very dangerous for the of the country. The amount of loss it can happen if an hacker can get access to it is unpredictable because they could easily hack bank account or any valuable data which is important for a person . Cyber security is a must security as well an important subject.