Basic of CyberSecurity
Basic of CyberSecurity
Date – 21/03/2023
Attackers are now using more sophisticated techniques to target the systems. Individuals,
small-scale businesses or large organization, are all being impacted. So, all these firms
whether IT or non-IT firms have understood the importance of Cyber Security and focusing
"Cyber security is primarily about people, processes, and technologies working together to
encompass the full range of threat reduction, vulnerability reduction, deterrence, international
engagement, incident response, resiliency, and recovery policies and activities, including
Cyber security is the body of technologies, processes, and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access.
The term cyber security refers to techniques and practices designed to protect digital
Cyber is related to the technology which contains systems, network and programs or
data. Whereas security related to the protection which includes systems security, network
1
security and application and information security.
In addition to financial damage suffered by the business, a data breach can also inflict
untold reputational damage. Cyber-attacks these days are becoming progressively destructive.
alter computer code, logic or data and lead to cybercrimes, such as information and identity
theft.
1) Web-based attacks
2) System-based attacks
Web-based attacks
These are the attacks which occur on a website or web applications. Some of the important
1. Injection attacks
It is the attack in which some data will be injected into a web application to manipulate the
Example- SQL Injection, code Injection, log Injection, XML Injection etc.
2. DNS Spoofing
DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a
DNS resolver's cache causing the name server to return an incorrect IP address, diverting
traffic to the attackers computer or any other computer. The DNS spoofing attacks can go on
for a long period of time without being detected and can cause serious security issues.
3. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create
2
cookies to store the state and user sessions. By stealing the cookies, an attacker can have
4. Phishing
Phishing is a type of attack which attempts to steal sensitive information like user login
5. Brute force
It is a type of attack which uses a trial and error method. This attack generates a large number
of guesses and validates them to obtain actual data like user password and personal
identification number. This attack may be used by criminals to crack encrypted data, or by
Hardware Attacks:
aren’t limited to software and hardware, but they also affect embedded radio-
Backdoor creation; the presence of hidden methods for bypassing normal computer
authentication systems.
Counterfeiting product assets that can produce extraordinary operations and those
Security Policies:
Security policies are a formal set of rules which is issued by an organization to ensure that the
user who are authorized to access company technology and information assets comply with
A security policy also considered to be a "living document" which means that the document
employee changes.
We use security policies to manage our network security. Most types of security policies are
3
automatically created during the installation. We can also customize policies to suit our
specific environment.
1) It increases efficiency.
CYBER FORENSICS:
Computer forensics is the application of investigation and analysis techniques to gather and
preserve evidence. Forensic examiners typically analyse data from personal computers,
laptops, personal digital ,assistants, cell phones, servers, tapes, and any other type of media.
This process can involve anything from breaking encryption, to executing search warrants with a
law enforcement team, to recovering and analysing files from hard drives that will be critical
evidence in the most serious civil and criminal cases. The forensic examination of computers,
and data storage media, is a complicated and highly specialized process. The results of forensic
examinations are compiled and included in reports. In many cases, examiners testify to their
findings, where their skills and abilities are put to ultimate scrutiny.