Cyber Security

What is Cyber Security

Cybersecurity is the protection and defense of computer systems from malicious attacks, theft, damage, or unauthorized access.

Categories of Cyber Security

  • Network security focuses on securing and protecting a computer network from intruders.
  • Information security focuses on securing the privacy and integrity of data.
  • Application security is the practice of keeping software and devices safe from threats.
  • Disaster recovery and business continuity involve how an organization responds to cybersecurity threats, incidents, or events causing data loss.
  • End-user education includes practices users take to protect themselves from being hacked.

Types of Cyber Attacks

  • SQL injection
  • Phishing
  • Man-in-the-middle (MITM) attack
  • Denial of Service (DoS)
  • Distributed Denial of Service (DDoS)
  • Spoofing
  • Cross-site scripting (XSS) attack
  • Virus attack
  • Malware attack
  • Session hijacking
  • Password attack
  • Dictionary attack
  • IP spoofing
  • Brute-force attack, etc.

Cyber Safety Tips - Protect Yourself Against Cyberattacks

  • Always use good antivirus software.
  • Avoid connecting to unknown networks (Wi-Fi).
  • Do not visit suspicious websites or sites without SSL certificates.
  • Never click on unknown links.
  • Use strong passwords.
  • Regularly update devices.
  • Do not open email attachments from unknown senders.

What is a Hacker?

A hacker is someone who uses computer skills to achieve a certain goal, such as accessing computer networks or security.

Types of Hackers

  • Black hat hacker
  • White hat hacker / Ethical hacker
  • Grey hat hacker

Famous Hackers

  • Kevin Mitnick
  • Jonathan James
  • Ian Murphy
  • Gary McKinnon
  • Mark Abene
  • Johan Helsingus

Common Types of Hacking

  • Network hacking
  • Website hacking
  • Computer hacking
  • Password hacking
  • Email hacking
  • Ethical hacking

Viruses

Viruses are small programs designed to sneak into a host computer to perform tasks, which can be either destructive or harmless, before spreading to other computers.

Image placeholder Author

Disclaimer

This content has been uploaded by a guest (third party). Please note that their views and opinions expressed herein are their own and do not necessarily reflect the views of the hosting platform or its administrators.