WHAT IS CYBER SECURITY THREATS ?
Cyber security threats is the danger of a malicious attacks by an individual or an oraganization seeking to gain entry to a networks, corrupt data or steal sensitive or confeidential information.
"A CYBER OR CYBERSECURITY THREAT IS A MALICIOUS ACT THAT SEEKS TO DAMAGE DATA, STEAL DATA, OR DISTRUPT DIGITAL LIFE IN GENERAL."
sOME Common Cyber Security Threats
- MALWARE
- RANSOMEWARE
- DISTRIBUTED DENIAL OF SERVICES (DDoS) ATTACKS
- SPAM AND PHISING
- SQL INJECTION
MALWARE
Malware is also known as malicious code or malicious software. Malware is a program inserted into a system to compromise the confidentiality, integrity, or avaliability
of data. It is specially designed to distrupt , damage or gain authorized access to a computer system.
- Keep your computer or software updated.
- Use a non-administrator account whenever possible.
- Think twice before clicking links or downloading anything.
- Be careful about opening email attachments or images.
- Don't trust pop-up windows that ask you to downloads software.
- Limit your file-sharing.
- Use Antivirus Software.
RANSOMEWARE
Ransomeware is aform of malware that locks the user out of their files or their device, then demands a payment(often in cryptocurrency) to restore access.
- Backup your important data(files, documents,photos, videos, etc.)
- Patch and update your Software.
- Creating strong passwords.
- Install security software.
DISTRIBUTED DENIAL OF SERVICES (DDoS) ATTACKS
A Distrubuted Denial of service(DDoS) attack is a malicious attempt to distrupt the normal traffic of atargeted server, service or network by overwhelming the target or its surronding infrastructure
with a flood of internet traffic.
- Know your network's traffic.
- Scale up your bandwidth.
- Monitor you network for odd traffic(monitor for unusual activity).
- Know the symptoms of an attack(website shut down, suddenly getting lot of spam).
SPAM AND PHISHING
Any information steal by internet is called as PHISHING. Phishing is a type of social engineering that riminals use to steal data infect computers and infiltrate company networks.
- Know what a phishing scam look like.
- Rotate passwords regularly.
- Avoid spam Mails.
- Install Firewalls.
- Don't be tempted by those pop-ups.
- update your softwares.
SQL INJECTION
An SQL (structure query language) injection is an type of cyber attack used to take control and steal data from a Database.
"SQL INJECTION IS A CODE INJECTION TECHNIQUE THAT MIGHT DESTROY YOUR DATABASE."
- VALIDATE INPUT
(Train and maintain awareness.)
- PREPARE A QUERY
(Don't trust any user input.)
- CREATE PREPARED STATEMENT
(Use whitelists, not blacklists.)
- BIND THE PARAMETERS
(Adopt the latest technologies.)
- EXECUTE QUERY
(Employ verified mechanisms.)
- FETCH RESULT
(Scan regularly.)