Cyber Security

Cyber security or information technology security are the techniques of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation.

What does Cyber Security mean-

Cyber security deals with protecting anything connected across the network. This includes:

  • Hardware like desktops, laptops, servers and mobiles
  • Software like communication and work applications
  • Data in transit and at rest.

What do i need to know-

The most important thing is understanding that everyone is at risk of cyber-attack. Business is increasingly being done over network connected devices. And each one presents a tempting target.

The motive is usually profit, though espionage and activism can also play a role. The rewards of cyber-crime are so great, threats have dramatically increased. Cyber criminals have become highly professional, often drawing on the resources of organised crime or rogue states.

Mobile security is the next big weakness-

Many businesses leave their mobile phones and tablets unprotected. Hackers are now starting to exploit this loophole. If you’re serious about security, make sure you have security apps on your mobile devices.

What are the common threats-

1.Virus- A virus is malicious software that replicates itself when activated so it can spread to other computers and files. The aim varies – deleting data, stealing passwords, making documents unusable, spamming contacts and more.

2.Trojans- Named after the Trojan horse of antiquity, Trojans are malicious programs in disguise. They don’t replicate but they do create a backdoor that gives hackers control of your computer.

3.Spyware- Spyware tracks what you’re doing. It collects information like passwords, credit card numbers, web browsing and email addresses and uses it for malicious purposes.

4.Phishing-

5.Rootkit- A rootkit is a program that allows hackers to hide other malware like spyware and viruses on your computer.

Leave a Comment

Your email address will not be published. Required fields are marked *