With so much benefits and advantages coming from the internet through technology, it can be disheartening to think that behind every device or even platform, there are threats lurking around. And just like the saying ââto every action, there is equal or opposite reactionâ, the presence of these threats has brought about Cyber security in and around our world.
For the purpose of todayâs article, we will be looking at what cyber security is and the different threats that we come across on a daily basis.
What is Cyber Security?
Cyber security refers to a body of technologies, processes and practices designed to prevent an attack, damage or unauthorized access to networks, devices, programs and data by vile actors such as hackers or spammers. Cyber Security is also defined as the practice of protecting systems, networks and programs from digital attacks according to âCisco Systemsâ.
Cyber threats on the other hand is an unauthorized invasion by a third party into a network access which can result in data loss or data manipulation. It is an attack or intrusion by means of a computer network for the purpose of spying. The person who carries out such attack is known as a HACKER.
Some common list of cyber threats incudes:
Malware Attacks: A malware attack is a cyber attack where malware performs unauthorized actions on a userâs system. This form of cyber threat is usually spread by malicious websites downloads, spam emails or connecting to infected computers. It is the second most significant hazard to businesses. The victims of this attack are usually small businesses. Malware covers a wide range of cyber threats including Trojans and viruses. So if youâre a small business owner you might want to lookout for this.
Insider Threats: Also rampant in small businesses. As the name implies, it is carried out by an individual within the organization. These acts are stirred up because of greed, malice or carelessness.
Botnet Attacks: This attack involves large scale cyber attacks conducted by remotely controlled malware infected devices. Once a hacker has control of a group of infected devices, they can remotely command every device to simultaneously carry out coordinated activities including malicious activities like DDoS attack, Spam attacks, monitoring and many more.
SQL Injection: This particular attack is carried out by injecting a malicious code into a vulnerable website search box which later on causes the server to reveal crucial information.
Phishing Attacks: phishing attack is the most dangerous attack to businesses. This threat attempts to steal sensitive information typically in the form of usernames, passwords, or even credit cards in order to sell or utilize stolen information.
Man-in-the-middle-attack: This attack is also known as an eavesdropping attack. This attack happens when an attacker comes in between two party communications, steals and manipulates data.
In conclusion, the presence of these threats does not give absence to precautionary measures. We only talked about the threats because it is our focus for today. Join me tomorrow in my next article where Iâll be writing on the precautionary measures against these intruders also known as hackers.