logo

Introduction to Cyber Security

14 Pages3209 Words388 Views
   

Added on  2022-10-17

About This Document

CYBERSECURITY 9 CYBER SECURITY Introduction 2 Cybersecurity attacks 2 Common forms of cyber security attacks 2 DOS and DDOS attack 3 Main in the middle attack 3 Phishing attack 4 Drive-by attack 4 Password attack 4 Malware attack 4 Recommendation 4 Conclusion 4 Annotated bibliography 4 References 4 References 4 Introduction The term cyber security is the body of processes, and technologies which is mainly intended to secure and protect the data or deices from the criminals. In this generation, the use

Introduction to Cyber Security

   Added on 2022-10-17

ShareRelated Documents
CYBER SECURITY 0
Cyber Security
Introduction to Cyber Security_1
CYBERSECURITY 1
Table of Contents
Introduction................................................................................................................ 2
Cybersecurity attacks................................................................................................. 2
Common forms of cyber security attacks................................................................2
DOS and DDOS attack.......................................................................................... 3
Main in the middle attack..................................................................................... 3
Phishing attack..................................................................................................... 4
Drive-by attack..................................................................................................... 4
Password attack................................................................................................... 4
Malware attack..................................................................................................... 4
Recommendation....................................................................................................... 4
Conclusion.................................................................................................................. 4
Annotated bibliography.............................................................................................. 4
References................................................................................................................. 4
Introduction to Cyber Security_2
CYBERSECURITY 2
Introduction
The term cyber security is the body of processes, and technologies which is
mainly intended to secure and protect data or deices from the criminals. It
is a part of information technology security that provides a way where
consumers can protect their private details from unauthentic access. The
determination of this investigation is to identify the cyber security attacks
and analyze their impacts on sensitive data (Bendovschi, 2015). It is
identified that security attacks occur in the information technology impacts
on the computing devices, networks and data of companies and hackers
attack on the servers used by the consumers. There are several kinds of
cyber security attacks will be discussed in this paper including, malware,
DDOS attack, phishing and many more. At the end of this research, a
recommendation section will be included for addressing cyber security
attacks and improving the security of the data and devices.
Cybersecurity attacks
Cybersecurity is an approach that helps consumers for protecting their
computing devices, systems and data from hackers and unauthorized
access. In this generation, the use of computing devices and information
technologies are growing rapidly which also increase the rate of cyber-
crimes and hacking because IT systems connect personal devices and data
which help criminals for obtaining their data files (Abomhara, 2015). This
section analyzes the highlight common forms of cyber security attacks and
also identifies the key factors which increase such kinds of issues in the
companies.
Common forms of cyber security attacks
It is identified that there are various kinds of cyber security attacks
occurred in the information technologies and computing devices which are
described below:
Introduction to Cyber Security_3
CYBERSECURITY 3
DOS and DDOS attacks
MITM
Phishing attack
Drive-by attack
Password attack
Malware attack
DOS and DDOS attack
It is defined as the denial of service attack that reduces the performance of
computing networks and the security of private data. The DDOS is a part of
this attack which is mainly used by the hackers for large numbers of host
machines that are related with the user’s networks. Such kinds of cyber
security attacks are very common and many companies like Amazon, Uber
and Facebook suffered from these issues in the last few years (Conteh, and
Schmick, 2016). In DOS, attack hackers use the concept of malicious tool
and botnet to produce unauthentic access and traffic signals. The developed
unwanted signals transferred to the IT systems by the hackers and block the
communication channels linked with the computing devices.
With the help of a DOS attack, criminals can hack the personal details of
consumers without taking their permissions. A recent study argued that
DDOS is a simple form of cyber attack that has the potential to block the
security of a computing device and hack all private details of companies.
Mirai is the best example of this attack that produced by the hackers in the
year 2017 and hacked the data of thousands of users that connected their
networks with the IoT enabled devices. It is observed that there are several
kinds of DOS and DDOS attacks occurred in the cyber security, for example,
TCP SYN, Smurf attack, Teardrop and so on.
Main in the middle attack
MITM is a simple form of a cyber-attack that occurs because of the
unauthentic access of networks and hackers uses the third party servers for
Introduction to Cyber Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Cyber security Attacks | Assessment 1
|7
|1374
|30

Methods to Address Cybersecurity Issues in JL Organization
|13
|2416
|109

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Cyber Security Assignment PDF
|9
|2867
|2114

Cyber Security Assignment 2022
|12
|2845
|22