Skip to main content

Cyber Security And Computer Security


Introduction of Cybersecurity.

Cybersecurity is the security of Internet-connected frameworks, counting equipment, computer program, and information from cyber assaults. It is made up of two words one is cyber and the other is security. Cyber is related to innovation which contains frameworks, arranges, and programs or information. While security is related to security which incorporates frameworks security, arranges security, and application and data security. It is the body of advances, forms, and hones planned to secure systems, gadgets, programs, and information from assault, robbery, harm, alteration or unauthorized get to. It may moreover be alluded to as data innovation security.

 Introduction of computer security.

computer security is the security of computer frameworks and data from hurt, robbery, and unauthorized utilize. The most reason clients get assaulted as often as possible is that they need satisfactory resistance to keep out interlopers, and cybercriminals are fast to misuse such shortcomings. Computer security guarantees the secrecy, astuteness, and accessibility of your computers, and they are put away information.

Main security concerns areas. 

1.     Confidentiality: Information and functions can be accessed only by authorized parties. Example Military secrets.

2.     Integrity: Information and functions can be added, altered, or removed only by authorized people and means. Example incorrect data entered by a user in the database.

3.     Availability: System, functions, and data must be available on-demand according to agreed-upon parameters based on levels of service.

Types of Attacks.                                     

01.Denial of service (DDoS).

This is often an assault utilized to limit the user’s get to the framework assets by flooding the server with futile activity. The botmaster commands all the bots to get to an asset at the same time so that the asset gets pitifully stuck up. At that point, on the off chance that an authentic client needs to get to that same asset, they will not be able to do so.

02.Malware attack.

 

This is a malicious program that disrupts or damages the computer. Keylogger, virus, worms, trojan horse are the main type of Malware attack.

  • Keylogger – A keylogger is an insidious form of spyware. When we enter our private data onto our keyboard, imagine no one watching this data. Keylogging software is hard at work logging everything that we type. For example, our account details (credit card number, PIN), personal data (webpages user visit), can find using this software. 
  • Virus - A computer virus is a malicious piece of computer code designed to spread from device to device. A subset of malware, these self-copying threats are usually designed to damage a device or steal data. Sometimes viruses damaging computer programs, deleting files, reformatting the hard drive, or flood a network with traffic, making it impossible to perform any internet activity.
  • Worm - A computer worm is a type of malware that spreads copies of itself from computer to computer. A worm can replicate itself without any human interaction, and it does not need to attach itself to a software program to cause damage.
  • Trojan horse - A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general, inflict some other harmful action on your data or network.

 

03. Man in the middle.

When we do an online money transaction. We have to connect with our bank account and enter our bank details (Account number and PIN). At this time the cyber attacker can spoof us, They monitor our transaction. When we enter the bank details, as soon as he accesses all information in our account

04.Phishing.

This attack same with the man in meddle. The attacker sends an email or message to you and tells you to link your bank account details and get some extra interest in your account or they spoof you to get your details.  

05.Evesdropping.

The attacker makes your system traffic and the work you are doing. 

06. SQL injection.

This type of attack happens only on websites. Example Hacker get the information of the Facebook website database.

How Do You Secure Your Computer by attacks?

1.    
Update Your Software - Update Operating Systems software, Web browsers, or connect your pc update automatically.

2.     Protect Your Personal Information - Social security number or Username, credit card number and bank account details should not share.

3.     Protect Your Passwords - Create strong password with capital simple letters, numbers and Special Characters.

4.     Consider Turning on Two-Factor Authentication - Connect your personal Information with your mobile phone, tab and PC.

5.     Give Personal Information Over Encrypted Websites Only - If you want to find website is encrypted, please look at the begging of the web address is in “https://”.

6.     Back Up Your Files - Copy you files or data to external hard drive or cloud storage, If your computer is attack and delete evert thing but you have this file in hard disk or cloud storage.

7.     Using virus grad software - Antivirus is a computer program used to prevent, detect, and remove malware.

8.     Using firewall prevent - Firewalls prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.

How it can be help for a developer.

According to the above topics, type of attack, how we can protect the attack, and security concerns, the developer can get an idea of how they can create their software or web application to protect from these attacks.

Conclusion

According to this project, I found an overview of computer security and cybersecurity, the Type of attacks that hackers can do for our computer, How we can protect from the attacker, and what are the main security concerns for a developer to develop their software or web page with protecting

Comments