Cyber security standards are the security guidelines enabling the firms to practice safe security techniques to minimize the cyber attacks. Cyber security is the implementation of processes and controls to protect computer systems, our networks, devices and data from cyber attacks. It is the security offered to protect our computer system from leakage of information. Cyber security attempts to lessen the amount of risk of cyber attacks of unauthorized access to the system. It is necessary in order to protect our data from theft and misuse of information. Cyber security also provides security from viruses.
Cyber security has its increasing relevance in today’s world of reliance on technology for everything with increased usage of smart gadgets like smart phones, wifi connected houses used in the house as lights, locks that are internet with things, security is important. All the individual devices connected via the internet provide an access point to the hackers. Hackers who gain the access to the wifi enabled home gets all the access to the data of the user.
These three important components are people, process and Technology:
People – People play an important role in cyber security, no matter how many rules have been made but if these are not followed then you are at risk. Human errors make huge mistakes so people need to be cautious.
Processes – Proper process is set up to identify threats to protect important information. Referring to a proper document can save a company’s time to protect important information.
Technology – The technology on which data is stored needs protection, like computers, gadgets, networks. So these all instruments should be protected in a secured way through Application security, Internet of things security, network security.
Consequent threats in the cyber world and its resolution has its importance in today’s era due to growing dependence on technology such as wifi, Bluetooth, growing use of smart systems, smart phones, and televisions.
Cyber security threat refers to unlawfully access to user data through malicious software. Cyber Security threats can be of the following kind:-
This is unwanted software which provides unwanted damage to the computer. This activates by clicking on the attachment file. It transmits information to the other party through web Browsing. Malware types are Trojan, spyware, Adware, Virus, Worms.
It uses social tricks to reveal access to secured information. By gaining access to the right password, the attacker gets important information. Sometimes the user gets an email like “You have won a prize” and important information is revealed by the user.
This is one of the other ways employed by the hackers to steal personal information from you. This is done by sending email to the user and then by clicking on the link it takes users to the fake website imitating mail to be a useful one and if any information is disclosed there then that turns out to be a theft.
SQL injection is a technique used by attackers which results in inserting malicious code in the server using SQL code. The technique of SQL injection can be different but aims at a single vulnerability in the application.
Emotet is spread through spam emails.Infection comes through malicious scripts. It is through mimicking the same kind of email formatting of known companies to convince the end user.
As the name suggests the denial of service is the type of attack where an application or computer system cannot serve the request. Under this type of cyber attack, the attacker floods the computer or network so it cannot respond to authentic requests. The severe version of DOS is DDOS (distributed DOS), where attack is facilitated by using multiple computers. The attacker can use a variety of tools and techniques to carry out the attack. BOTS are one of those forms, which overwhelm target processing speed.
This type of attack occurs when communication is carried out in unsecured networks. The hacker hides himself in the middle of a two party communication and can modify and steal the data in the process.
a) DNS Filtering: it is the process of blocking certain sites which may be a potential threat.
b) Malware & Antivirus Protection: Usage of updated software on end points for Malware and antivirus attacks.
c) Firewalls: It is a device which is usually attached at the terminating point of the network. It monitors the network traffic and blocks certain requests on the basis of policy set in the system.
d) Email Security Solutions: usage of policies and procedures for Data encryption, antivirus control, filtering spam on the basis of predefined rules and controlling the images and other types of data.
Safe systems are those which are switched off and unplugged, so in this smart world of gadgets, one has to pay attention to everything and act smartly. Cyber security has its importance to protect the data from Attackers. In case security is not used then our networks and systems are hacked by the hackers and they use our confidential information. Continuous education should be provided to the students regarding how they can use the security system.