Cybersecurity Is The Practice of Protecting Systems
Cybersecurity Is The Practice of Protecting Systems
What is a botnet?
A botnet is a network of devices that has been infected with
malicious software, such as a virus. Attackers can control a botnet
as a group without the owner’s knowledge with the goal of
increasing the magnitude of their attacks. Often, a botnet is used to
overwhelm systems in a distributed-denial-of-service attack
(DDoS) attack.
Phishing
Phishing is the practice of sending fraudulent communications that
appear to come from a reputable source, usually through email. The
goal is to steal sensitive data like credit card and login information
or to install malware on the victim’s machine. Phishing is an
increasingly common cyberthreat.
What Is Phishing?
Man-in-the-middle attack
Man-in-the-middle (MitM) attacks, also known as eavesdropping
attacks, occur when attackers insert themselves into a two-party
transaction. Once the attackers interrupt the traffic, they can filter
and steal data.
Denial-of-service attack
A denial-of-service attack floods systems, servers, or networks with
traffic to exhaust resources and bandwidth. As a result, the system
is unable to fulfill legitimate requests. Attackers can also use
multiple compromised devices to launch this attack. This is known
as a distributed-denial-of-service (DDoS) attack.
SQL injection
A Structured Query Language (SQL) injection occurs when an
attacker inserts malicious code into a server that uses SQL and
forces the server to reveal information it normally would not. An
attacker could carry out a SQL injection simply by submitting
malicious code into a vulnerable website search box.
Zero-day exploit
A zero-day exploit hits after a network vulnerability is announced
but before a patch or solution is implemented. Attackers target the
disclosed vulnerability during this window of time. Zero-day
vulnerability threat detectionrequires constant awareness.
What is cybersecurity all about?
A successful cybersecurity approach has multiple layers of
protection spread across the computers, networks, programs, or
data that one intends to keep safe. In an organization, the people,
processes, and technology must all complement one another to
create an effective defense from cyber attacks.
People
Users must understand and comply with basic data security
principles like choosing strong passwords, being wary of
attachments in email, and backing up data. Learn more about basic
cybersecurity principles.
Processes
Organizations must have a framework for how they deal with both
attempted and successful cyber attacks. One well-respected
framework can guide you. It explains how you can identify attacks,
protect systems, detect and respond to threats, and recover from
successful attacks. Watch a video explanation of the NIST
cybersecurity framework.
Technology
Technology is essential to giving organizations and individuals the
computer security tools needed to protect themselves from cyber
attacks. Three main entities must be protected: endpoint devices
like computers, smart devices, and routers; networks; and the cloud.
Common technology used to protect these entities include next-
generation firewalls, DNS filtering, malware protection, antivirus
software, and email security solutions.
Malware
Malware is a type of software designed to gain unauthorized access
or to cause damage to a computer.
Learn more about malware protection
Social engineering
Social engineering is a tactic that adversaries use to trick you into
revealing sensitive information. They can solicit a monetary
payment or gain access to your confidential data. Social engineering
can be combined with any of the threats listed above to make you
more likely to click on links, download malware, or trust a malicious
source.
Phishing
Phishing is the practice of sending fraudulent emails that resemble
emails from reputable sources. The aim is to steal sensitive data like
credit card numbers and login information. It’s the most common
type of cyber attack. You can help protect yourself through
education or a technology solution that filters malicious emails.
Learn how technology can help