Cyber Security
Cyber security is a global concern as society becomes increasingly reliant on technology. Government, businesses and citizens will become much more vulnerable to cyber-attacks unless robust mechanisms are put in place to protect against the threats.
The term cyber security was coined in 1988. Cyber security became much more sophisticated and dangerous over the year
Government, Business and citizens will become more vulnerable to Cyber Attacks.
Internet has grown very fast and security has lagged behind.
India is now world’s third largest internet user after US and China.
Viruses
Viruses are those things which slow down your computer and affect software or hardware very badly
Other than that there is a spying software called Trojan
Trojan has ability to steal data when it is installed in victim’s computer by not touching them physically.
Trojan can be attached with any kind of file such as movies, images, documents etc...
Trojan can drop viruses and worms, take screenshots, can stream your webcam and record keystrokes and much more annoying things on victim’s computer.
In that Keystrokes are very dangerous, keystrokes are also known as key logger
Key Loggers
Key loggers records any information you type at any time using your keyboard
Key loggers are classified in to two types
1 . Hardware key logger
2 . Software Key logger
Hardware key logger
Hardware key logger is look like usb or other peripheral device
It is attached in between keyboard and computer
Physical access to the target system is necessary and Record only keystrokes and store in memory
Software Key logger
Software key logger is also used for keystroke capturing and record it and store a log file in to your system and afterwards send it to specified receiver
Physical access to the target system is not required and it is
As like Trojan, key logger can be attached with any kind of file such as movies, images, documents etc...
So that victim can never doubt there is a key logger
Phishing
Phishing is a method to obtain user name, passwords, credit card information
Phishing may be of many types in that the widely used are Fake login pages
In this method a hacker create a fake page of any websites such as Facebook, Gmail, Yahoo and etc. Similar to the original page and ask the victim to login through that page
Once the victim login through that page the Email id and passwords will be send to the hacker who made that page
Example of phishing Email
Social Engineering Attack
Social engineering is one of the most effective routes to stealing confidential data
The purpose of social engineering is usually to secretly install spyware or other malicious program or to trick person into handing over their passwords or other financial or personal information
Social engineering can be done by
1. Human interaction
2. Phone call
3. E-mail
-Human
This attack is not as common or successful because people have become more conscious of this type of attacks
-E-mail
Another common online attacks is to send an email to the victim to pretend to be a head of the department and send out emails which request user name and password
-Phone
The most common practice of social engineering
A hacker will call someone up and imitate a person of authority and slowly retrieve information from them
Cyber Security
Reviewed by Haxbaba Tech
on
21:44
Rating:
No comments: