What is Cyber Security? - Security Attacks and Hacking Explained




Cyber Security has now made all those things possible which could only be assumed before ...


We are living in a digital environment. Whether it be reserving a table in a restaurant, ordering some food, or even booking a transport. We are using the Internet and constantly generating data. Data is generally stored on the cloud which is a sort of a huge data server. Cloud is a kind of data center you can access anywhere in the world. Also, we use an array of devices to access this data. Now for hackers, it's a crucial era with a lot of access points, public IP addresses, traffic, and bunches of data to exploit. Cyber security experts are becoming more creative with their malware and bypassing viruses and firewalls scans.


What is Cyber Security?

This is not only that applies for us as individuals but also on large organizations. There have been multiple cyber breaches in cyber security records in the past that has compromised the privacy and confidentiality of a data. Even though they have a lot of security measures taken to protect the data that they contain. So it's not only that small individuals are targeted by hackers and other people but even bigger Organizations are constantly being targeted. 

So, in the light of all the possible cyber attacks and the breaches. We must be thinking that there must be some sort of mechanism and protocol to protect us from all these sorts of cyber attacks. Indeed they're in a way and this is called cyber security.


Cyber Security and Information security is designed to maintain the confidentiality, integrity, and availability of data in a subset of cyber security. The use of cyber security can help prevent against cyber attacks, data breaches, and Identity theft. Organizations have a strong concept of security breaching and an effective response plan. Which is a much needed thing prevent and mitigate these attacks.


Hackers in Cyber Security:

Hacking is considered to be an unethical act in cyber security. However, there are different kinds of hackers performing similar tasks with different methods. Following are the types of hackers in the field of cyber security.

Types of Hackers:

  1. White Hat Hacker
  2. Black Hat Hacker
  3. Red Hat Hacker
  4. Blue Hat Hacker
  5. Grey Hat Hacker



Cyber Attacks and Threats:

1. Malware: 

It is an all-encompassing term for a variety of cyber threats including Trojans viruses and bombs in cyber security. Malware is simply defined as code with malicious intent that typically steals data or destroy something on the computer.


2. Phishing:

Phishing attacks are sent via email and asked users to click on a link and enter the personal data. Fetching emails have gotten much more sophisticated in recent years. Which is making it difficult for some people to discern a legitimate request. Phishing emails often fall into the same category as Spam but a lot more harmful.


3. Password Attacks:

Password attack is exactly what it sounds like a third party trying to gain access to your system by cracking a user's password.


4. Distributed Denial of Service:

It focuses on disrupting the service of a network. Attackers sent high volumes of data or traffic through the network that is making a lot of connection requests until the network becomes overloaded and can no longer function next up we have man-in-the-middle attacks by impersonating the endpoint in an online information exchange.

5. Man in the Middle:

If you're banking online the man in the middle would communicate with you by impersonating your bank and
Communicate with the bank by impersonating. The man in the middle would then receive all the information transferred between both parties. which could include sensitive data such as bank accounts and personal information.

6. Drive-By Downloads:

A program is downloaded to a user system just by visiting the site. It doesn't require any type of action by the user to download it. Which creates a back door in the system and send malwares to the system.

7. MalAdvertising :

It is the way to compromise your computer with malicious code that is downloaded to your system when you click on an affected ad.

8. Rogue Softwares:

The malware that pretend as legitimate and necessary security software. That will keep your system safe.




Protection from Cyber Attacks:



This is the era that every person, using Internet, should know about cyber security and its attacks. It is recommended to place some means to detect any changes in data that might occur as a result of non human caused eventsSome data might include checksums even cryptographic checksums for a verification of integrity back up. Redundancies must be available to restores affected data to its correct state.

It's also important to keep current with all necessary system upgraded. Providing adequate communication bandwidth and preventing the occurrences of bottlenecks are equally important. Safeguards against data loss or interruption in connection must include unpredictable events such as natural disasters and file to prevent data loss. A backup copy must be stored in a geographically isolated location. You should also perform regular threat assessment to determine the best approaches to protecting a system against a specific threat.


Vulnerabilities in Cyber Security:

vulnerability is an important term in Cyber security. It refers to a known weakness of an asset that can be exploited by one or more. For Instance, when a team member resigns and you forgot to disable their access to external accounts. Change logins or remove their names from the company credit cards. This leaves your business open to both unintentional and intentional threats. However, most vulnerabilities are exploited by automated attackers and on a human typing on the other side of the network. Testing for vulnerabilities is critical to ensure the continuity of your systems by identifying weak points and developing a strategy to respond quickly.

Here are some questions that you ask when determining your security vulnerabilities.
So you have questions like is your data backed up and stored in a secure off-site location?

How exactly is your data being protected from cloud vulnerabilities?

What kind of security do you have to determine who can access modify or delete information from within your organization?

Next like you could ask questions like what kind of antivirus protection is in use?

What are the license currents are the license current? And is it running as often as needed?

Also, do you have a data recovery plan in the event of vulnerability being exploited?


Top 10 Viruses in Cyber Security:

  1. Brain Virus
  2. CryptoLocker Virus
  3. Stuxnet Virus
  4. Mydoom Virus
  5. Sasser & Netsky Virus
  6. Storm Worm Virus
  7. Morris Worm Virus
  8. Anna Kournikova Virus


Future of Cyber Security:

Industries are hiring cyber security experts for safeguarding data confidentiality that may involve special training including Security risks and data protection. Who are responsible for maintaining the consistency, accuracy, and trustworthiness of data over its entire life cycle.



According to experts, world war 3 will not be fought with weapons but with the help of cyber security. Cyber Security will not only harm your websites systems but it could harm us physically soon. As experts are trying to take control over devices and means of transportations. Cyber security will conquer the world very soon. This is the reason, why countries are preparing and strengthening their cyber security. Have a look over top 10 countries in cyber security today.

Top 10 Countries in Cyber Security:
  1. Israel
  2. United States of America
  3. Russia
  4. Canada
  5. China
  6. United Kingdom
  7. Malaysia
  8. France
  9. Romania
  10. Spain

Post a Comment

0 Comments