Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

SHAMU1

Download as pdf
Download as pdf
You are on page 1of 2
‘i2aian, 250 PM Loasing [<< Search more Sauins Answer Cyber Security Cyber Security is the most important part of our lives in the present decade and it may last for the more than 2 decades. Cyber Security is the platform which provides awareness against the cyber attacks going on the recent days. This awareness can be used to take precautions from these attacks and keep our identities safe from the attackers. This platform deals with the protection of the computer systems and the networks from the theft of the hardware, software and the electronic data and also from the disruption and misdirection of the services they provide. Cyber security is the practice of defending of the hardware, software and mobile devices form the malicious attacks. Its is also known as Information Technology Security or Electronic Information Security. Its is a state or process of protecting networks, devices and programs from any type of cyber-attacks. ic Cyber Attacks: DOS: DOS is commonly known as Denial of Service attacks. A Denial-of-Service attacks is a cyber attack in which the perpetrator seeks to make a machine or network unavailable to its intended user temporarily. It is basically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. Types of DOS attacks: 1. Distributed DOS 2. Application layer attacks. 3. Advanced persistent DOS. Precautions: Approaches included cloud-based applications which is based on applications layer analysis, indicating whether incoming traffic is legitimate and thus triggering elasticity decisions without the ‘economical implications of DOS attacks. hitpssereativeworks eistortoling-numbor-one-skl-improvel 12 ‘i2aian, 250 PM Loasing The most basic precaution used is Firewall, which has a simple rule added to deny all the incoming traffic from the attackers basing upon some protocols and ports of the originated traffic. Malware Attacks: Malicious software is most commonly known as the malware which causes a threat to the computer system as well as the organization networks. It is causes without the knowing of the user / Victim. This attack is done by installing the malware software in someone else’s device without their knowledge to gain unauthorized access to their personnel information, or to cause damage to the device or network, usually for financial gain, Types of malware attacks: 1. Exploit Kit. 2. Malicious websites and drive-by-downloads. Malvertising. 4, Man-in-the-middle attack. 5. Man-in-the-browser attack. 6. Social Engineering. Precautions: Keeping the software updated play a major role to be safe from these attacks Backing up the files also helps a lot; in case the files are stolen, Scanning executables before executing them to prevent from the malicious software. These are the most common attacks found in the cyber-attacks, and how to avoid being victims of these attacks. Likes: 0 hitpssereativeworks eistortoling-numbor-one-skl-improvel 22

You might also like