What is CyberSecurity | Introduction to Advance Cyber Security - CodeTextPro

What is CyberSecurity | Introduction to Advance Cyber Security:

Cyber Security:

Cyber security is the protection of internet connected system including hardware, software & program or data from cyber attacks.

Need of Cyber Security:

To protect private data
To protect intellectual data
To protect banking & financial data
To protect sensitive data

Types of Security

cyber security

CIA Triad

The purpose of cybersecurity is to help prevent cyberattacks, data breaches and identity theft and aid in risk management.

Ethical Hacking:

Ethical hacking is the authorised & legal process of finding out
vulnerabilities, threats and exploits in a system or computer
network through penetration testing.

Types of Hackers:

 Black Hat Hackers
 White Hat Hackers
 Gray Hat Hackers

Penetration Testing:

Penetration testing is an attempt to exploit the vulnerabilities to determine whether unauthorised access or other malicious activity is possible.

Types of Penetration Testing:

 Network Services
 Web Application
 Wireless
 Social Engineering

Popular Penetration Testing Tools:

 Nessus, Nmap, Metasploit, OpenSSL, Wireshark, Burp
Suite, etc.

Types of Cyber Attacks:

Malware - malicious software. Piece of software written with the intent of damaging devices, stealing data. Viruses, Spyware and Ransomware are among the different kinds of malware.

Phishing - Phishing attacks are the practice of sending fraudulent communications that appear to come
from a reputable source. It is usually done through email.

Honeytrap - Honey trapping is an investigative practice involving the use of romantic relationships for interpersonal, political or monetary purpose.

SQL Injection - It is a code injection technique that might destroy your database. SQL injection is one of the most common web hacking techniques.

Man-In-The-Middle - A man-inthe- middle (MiTM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties.

Denial-of-Service - A denial-ofservice (DoS) attack floods a server with traffic, making a website or resource

The Internet

Internet Protocol (IP) Address:

 Internet Protocol (IP) address is an identifying number that is
associated with a specific computer or computer network. When
connected to the internet, the IP address allows the computers to
send and receive information.
 IP address serves two principal functions: host or network interface identification and location addressing.

IPv4 and IPv6:

 IPv4 was the first version of IP. It was deployed for production in the ARPANET in 1983. Today it is most widely used IP version.
 IPv6 is the most recent version of the Internet Protocol. Internet Engineer Taskforce initiated it in early 1994.

Private IP and Public IP:

 Private IP address is used with a local network and public IP address is used outside the network.
 Private IP address assigned by Network Administrator and Public IP address is assigned by Internet Service Provider (ISP)/ IANA.
 Private IP address is unique only in LAN and Public IP address unique globally.

Static IP and Dynamic IP:

 Static IP Address and Dynamic IP Address both are used to identify a computer on a network or on internet.
 Static IP address never change and Dynamic IP address periodically change.
 Dynamic IP address assigned IP address dynamically to the computer by ISP. Each time computer is rebooted, ISP dynamically assigns an IP address to the device using DHCP (Dynamic Host Configuration Protocol).
 Dynamic IP address is more secure than Static IP address.

Parts of an Email:

Phishing Email:

Identity Theft:

How to Protect:

Regularly update software & backup data
Use antivirus and firewall application
Use complex &careful with password
Never click on malicious link
Build awareness about various phishing scams
Always verify sender information
Never share the sensitive data online.

Post a Comment