logo

Importance of Cyber Security in Protecting Against Cyber Attacks

   

Added on  2023-01-12

26 Pages8270 Words85 Views
It is a very important to assure that nobody is trying to steal any type of data or else money
from any of the business activities that are moving online. For securing from these type of
threats it is very important to implement cyber security. Any type of unauthorised access or
any type of destruction that may happen to any of computer related equipment or networks,
cyber security acts in these purpose for protecting these systems. Cyber-attack can be of
different type that include theft as well as any type of unauthorised access to the computers or
to any such other devices. It also includes any type of remote attack which may happen on
various computer systems or else it can be on various websites and even it can be a third
party attack as on cloud devices. On a strike of cyber-attack it cause financial loss, the
recovery cost an even the replacement cost can be very high (Rid and Buchanan 2015). Even
the reputation of the company can go down and can also cause damage to any other
companies those are related to that company.
There are four types of attacks that generally occurs.
Denial of Service: This type of attacks creates damage generally to the computer networks or
else to the applications or to any systems and exhaust all the resources. Once this attack
happens to the systems, the hackers asks for an amount of money that is termed as ransom,
after which the access is given to the user.
Malware, Worms and Trojan horses: This type of attack happens on various websites those
are non-malicious, but after the attack the websites become malicious. This type of harmful
viruses are spread through emails, through various malicious websites or else through instant
message.
Botnets and zombies: In this case in the central controller which creates a robot network into
which a number of computers are connected. This type of computers are called zombies
botnets, these are made for stealing of data and it is also very difficult for detecting.
Importance of Cyber Security in Protecting Against Cyber Attacks_1
Scareware: These are the fake warning of security. This attacks are highly profitable for the
cyber criminals as because many of the users think these warnings to be real and thus follow
certain steps that are instructed regarding this threats.
This is an important factor for various companies in protecting themselves from any type of
scam threats, thief of data or else any type of other vulnerabilities. Planning is the only
solution from preventing this type of practises. In this planning it may include to know which
the information assets that are very critical and then to study that what will be exposed due to
this type of risks. The legal requirements and the compliance requirements are to be detected.
Implementing is another important factor that is to be noticed, such as what type of security
controls that is to be taken specifically for specific IT systems and all other outsource staffs
should know their responsibilities. After that also if any type of attack happens further, what
are the steps that is to be followed to protect their business from the attack.
Finally reviewing is an important factor that is always to be done. It is very important to test
the effectiveness of of the controls. Right after completion of monitoring any required actions
should be done regarding the problems monitored. Knowledge regarding the latest threats
should be kept into account. Thus by following all the above three process it will be easier to
counter any type of cyber-attacks.
In todays world computer is a part of human’s life. It is almost impossible to remove
computer from the life of people. The high rising technology made life much easier and helps
in connecting remotely through interconnected networks. There are certains ways through
which people are connected among themselves such as via smart devices etc. In these various
type of gadgets various important informations are stored, even they are used for booking
tickets, banking online, play games or can be used for shopping online. It also helps in
connecting of friends through Social Medias. Today’s network system made the
Importance of Cyber Security in Protecting Against Cyber Attacks_2
communication more simpler and thus various type of opportunities are provided depending
upon this. Numerous number of challenges and even threats are there regarding to these
usage of networks. These type of threats are known as cybercrime.
Any type of illegal activity that is done through the internet is termed as cybercrime. In this
case it includes identity theft which may cause steal of email id’s and the passwords as well,
after that the particular account may be used as fake and thus may use for any type of
criminal activities. Then there are various other type of threats available through the internet
which include any type of internet fraud, may order various goods on fake name and they can
also extract contacts. Even they can imitate currency, objects and documents of unknown
people for various bad intentions and may also harass the person.
Generally cybercrimes are divided into three different categories:
Crime can be done on a single person
Property crime
An organisation or a society may also get affected by any crime
1. Crime done on a single person: In this case of offence a single or a particular person
gets affected. This type of crimes are committed in the following forms:
a. Email spoofing: Spoofing is meant by misleading. In this case of crime a message is
received by the receiver and the receiver gets to believe on that message. In actual
which is not true. This is a fake message message. When the user opens the particular
link that is attached with that message, the following system gets affected by virus.
b. Cyber Stalking: In this case harassment is done on the victim by the attacker through
various means of communications, including emails, blogs etc. It can be a known
Importance of Cyber Security in Protecting Against Cyber Attacks_3
person of the victim or it can be an unknown person aswell. There are various acts
the attacker performs in cyber stalking:
i. By posting various type of false information about the victim in the internet.
ii. Online activities of a particular person is monitored.
iii. Many types of virus are send in the victim’s system to damage his/her system.
iv. Giving different threats to victims or to the victim’s family.
v. Many type of cheap magazines are subscribed and even the attackers order different
items to humiliate the victims, and even they send these items to their home or into
their workplace.
Fact that is to be known: In case cyber trafficking, there happens various type of
crimes such as selling of drugs, various type of weapons and it can also be selling of
human beings. Various type of encrypted messages are delivered between the
attackers to perform their work and any type of such criminal activities. There are
certain criminals who builds various websites to perform such type of criminal
activities.
c. Cyber Bullying: Harassment or else harming through IT intentionally is known by the
term. This crime includes various type of spreading of rumours or even any type of
remarks those are insulting through emails or through any type of social media. This
acts arte done generally upon nationality, race, religion and gender as well.
i. Know more: Defamation is termed as a type of communication which is
intended to harm or to damage reputation of a particular person, or the
business, or else product, nation, government and religion as well.
2. Cybercrime that is done against property: Someone’s property stealing is a very
common practise in real life. In the world of internet also there are certain people who
intends to steal something valuable or to rob something. In general bank details of
Importance of Cyber Security in Protecting Against Cyber Attacks_4
various person are stolen thus illegally they withdraws money through internet. Even
this results in illegal practise of using other people’s credit cards or damage any
system by various harmful software.
a. Identity theft: In this case it is defined as if someone’s information is stolen or
being misused. All of those people who usually uses the internet for different bank
services, shops online and even transact cashes through online. In the informations
that are stolen, it includes the account number of a person, maybe the name of that
person, debit card or any type of such card’s number and even it can be the date of
birth of any people. After the informations are stolen, this information’s are used
for various UN lawful tasks such as illegally withdraw of money or any type of
such illegal works. This types of hacking are generally done by hacking the
network of the victim or by imposing a harmful software into the victims system.
i. Fact that is to be known: One type of program known as key logger which
is generally used for checking the keystroke and any type of other personal
information of the user.
b. In this type of attacks many types of military websites or any other government
websites get effected. Phishing: In this act any type of fraud email are send to the
user and make the user to believe on that email that it is from any trusted
organisation or from any trusted person. In the process the user is instructed to
visit a particular website where from it is instructed to give the user’s personal
details or update them. After this the attackers use this details for performing any
type of crimes.
i. Fact that is to be known: Vishing is a type of criminal practise which is
done in the telephone system by using social social influence. This type of
acts are done generally with the help of VoIP, and used to access on the
Importance of Cyber Security in Protecting Against Cyber Attacks_5
personal information of various people that includes accessing of debit
card details etc. This act is termed as a combination of phishing and voice.
c. Pharming: In this case a small code is installed in the victims system that redirect
the system to various malicious websites without any type of notification to the
victim. Thus this leads to get various type of personal information of the victim,
such as passwords, etc.
i. Let’s know more: In this case the victim is manipulated to perform various
unlawful tasks. This is termed as Social Engineering.
3. Organisations under cybercrimes: This type of attacks are highly planned and this acts
may cause huge amount of effect into the computer networks. Huge number of
civilians gets effected due this type of tasks.
a. Transmitting Virus: Computer virus is defined as a type of computer program or
else a number of computer programs that creates effect on a normal functioning
computer. This type of viruses generally effects or destroys the data. A type of
virus which is known as biological virus that enters to any of the computer system
without giving any type of notice to the user. Virus is illustrated as “Vital
Information Resources Under Seize”. Due to the spread of virus it affects the
processing speed of the computer system, hamper the programs, effect on data,
etc. The programs present in virus a self-replicating that expands automatically
and spread throughout the infected network and infects the data of the system,
files present in the system and all other types of effect. Making of the program of
the virus and implementing it into the network is a type of cybercrime. All of t6he
virus are to be executed. That when any virus is present in a computer system, it
will not affect the system until and unless the program is opened in the system.
Importance of Cyber Security in Protecting Against Cyber Attacks_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computer Security: Fundamentals, Examples, and Countermeasures
|15
|5240
|98

Computer Security: Elements, Issues, and Frameworks
|15
|5037
|1

Cyber Attacks: Types, Recent Incidents, Motivations, and Ransomware
|5
|1791
|347

Cyber Security Assignment PDF
|9
|2867
|2114

Network Security: Protecting the Integrity and Usability of Networking Services and Data
|25
|1420
|50

The Assignment on Information Security
|12
|832
|36