Cyber Security: Attacks, Threats, and Mitigation Strategies

Verified

Added on  2022/07/28

|1
|274
|55
Homework Assignment
AI Summary
This assignment delves into the realm of cyber security, focusing on the various threats, attacks, and mitigation strategies employed to safeguard digital systems. It begins by defining cyber security and highlighting its importance in protecting against hacking and data breaches. The assignment then explores different types of cyber attacks, including Denial of Service (DoS) attacks, hacking, malware, phishing, spoofing, ransomware, and spamming. It also discusses the role of SSL certificates in establishing secure connections. Furthermore, the assignment introduces several tools and techniques used to enhance cyber security, such as IBMQ RadarAdvisor, Watson (AI-based security), and Wireshark (network analyzer), along with Cryptostoppper, a tool used to stop ransom ware and malware. The content provides a comprehensive overview of the current cyber security landscape, offering insights into both the threats and the defenses used to protect valuable data and systems. This assignment provides a good foundation for understanding key concepts and challenges in the field of cyber security.
Document Page
The process of mitigating risks associated with data theft and hacking from the smart devices of
the current era and protecting them is termed as Cyber Security.
The term Cyber security clearly specifies enhanced security measures against hacking that is
offered to the systems, which are accessible by users through internet or intranet. Several tools
and techniques are available for implementing Cyber Security. It is a continuous process adapted
by the system administrators to conduct security audits and keep the risks low.
Types of Cyber Security
Different tools and techniques to prevent malicious codes and viruses from the technological system
are:
IBMQ RadarAdvisor and Watson –
One of the best security tools of this generation and preferred by various organizations, the system of
Watson, uses artificial intelligence (AI), to automatically learn and evolve.
Wireshark –
It is one of the most widely used network analyzer protocol. It assesses the vulnerable sections on the
network upon which the user is working.
Cryptostopper –
One of the best tools available online and is used to stop ransom ware and malware significantly.
Types of Cyber Attacks
Denial of Service Attack (DoS)
Hacking
Malware
Phishing
Spoofing
Ransomware
Spamming
SSL Certificate
To establish a secure connection, the browser
and the server need an SSL certificate,
sometimes also called a digital certificate. This
certificate is installed on the web server and
serves two functions:
Authenticating the identity of the website
meaning, provides guarantee to the visitor that
the website is not fake.
Encrytption of transmitted data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
[object Object]