Cyber Security
Cyber Security
Cyber Security
Chosen topic:
“Data Security”
Data Security
Data Security or Information Security
involves protecting information from
unauthorized access, use, disruption,
modification or destruction, regardless of
whether the information is stored
electronically or physically.
Cyber Security
Cyber Security is subset of the larger
area of Information Security.
Cyber Security is the use of various
technologies and processes to protect
networks, computers, programs and data
from attack, damage or unauthorized
access. Since all computer systems rely on
operating systems and networks to
function, those areas are often targeted
for attack and are the main sources of
many security vulnerabilities.
. . . Computer security, also known as cyber
security or IT security, is the protection of
computer systems from the theft or damage to the
hardware, software or the information on them, as
well as from disruption or misdirection of the
services they provide.
Privilege escalation
Privilege escalation describes a
situation where an attacker with some
level of restricted access is able
to, without authorization, elevate
their privileges or access level. So
for example a standard computer user
may be able to fool the system into
giving them access to restricted
data; or even to "become root" and
have full unrestricted access to a
system.
Phishing
Phishing is the attempt to acquire sensitive information such
as usernames, passwords, and credit card details directly
from users. Phishing is typically carried out by email
spoofing or instant messaging, and it often directs users to
enter details at a fake website whose look and feel are
almost identical to the legitimate one. Preying on a victim's
trust, phishing can be classified as a form of social
engineering.
Clickjacking
Clickjacking, also known as "UI redress attack" or "User Interface
redress attack", is a malicious technique in which an attacker
tricks a user into clicking on a button or link on another webpage
while the user intended to click on the top level page. This is
done using multiple transparent or opaque layers. The attacker is
basically "hijacking" theclicks meant for the top level page and
routing them to some other irrelevant page, most likely owned by
someone else.
A similar technique can be used
to hijack keystrokes.
Carefully drafting a combination
of stylesheets, iframes, buttons
and text boxes, a user can be
led into believing that they are
typing the password or other
information on some authentic
webpage while it is being
channeled into an invisible
frame controlled by the
attacker.
Social engineering
Social engineering aims to convince a user to disclose secrets
such as passwords, card numbers, etc. by, for example,
impersonating a bank, a contractor, or a customer. A common
scam involves fake CEO emails sent to accounting and finance
departments. In early 2016, the FBI reported that the scam has
cost US businesses more than $2bn in about two years.
Attacker motivation
As with physical security, the motivations for breaches of
computer security vary between attackers. Some are thrill-
seekers or vandals, others are activists or criminals looking
for financial gain. State-sponsored attackers are now common
and well resourced, but started with amateurs such as Markus
Hess who hacked for the KGB, as recounted by Clifford Stoll,
in The Cuckoo's Egg.
A standard part of threat modelling for any particular system
is to identify what might motivate an attack on that system,
and who might be motivated to breach it. The level and detail
of precautions will vary depending on the system to be
secured. A home personal computer, bank, and classified
military network face very different threats, even when the
underlying technologies in use are similar.
Advices to be secure
40 4 NOT FOUND
NO SYSTEM IS SAFE
...
…
Update your OS and other software frequently, if not
automatically.
Download up-to-date security programs, including antivirus
and anti-malware software, anti-spyware, and a firewall.
Destroy all traces of your personal info on hardware you plan
on selling.
Do not use open wifi.
Password protect all of your devices.
Create difficult passwords and change them frequently.
Come up with creative answers for your security questions.
Practice smart surfing and emailing.
Don’t link accounts.
Keep sensitive data off the cloud.
Think before you click .