- Trending Categories
- Data Structure
- Operating System
- C Programming
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
What is Cyber Security and Cyber Crimes?
Cybercrime is any type of illegal activity that takes place via digital means. Data theft is, of course, one of the most common types of cybercrime, but cybercrime also includes a wide range of malicious activity as well, such as cyberbullying or planting worms or viruses.
Cybercrimes are divided into two different categories as follows −
Those that cause intentional damage
Those that can cause unintentional damage.
A cybercrime is a criminal act in which someone targets a computer or a network of devices in order to gain illegal rights, steal data from them, frauds etc.
This type of crime is carried out using technology which primarily takes place online.
Some cybercrime even include the following −
Types of Cyber Crimes
The different types of cyber crimes are as follows −
It is a type of cyber-crime in which a person tries to identify and exploit weakness in a computer system or a computer network for his own benefits.
Some types of hacking are as follows −
Social Engineering & Phishing
Virus dissemination is a process in which malicious software attaches itself to other software (which can be a trojan horse, time bomb, virus, worm etc) which has the ability to destroy the victim computer/system.
Cyber terrorism is a type of attack in which a person uses the Internet to establish violent acts which may result in loss of a life, harm to a person or threaten to life. The main object of this is to gain political advantages by the use of threat.
Computer Vandalism is a type of process in which a program has the ability to perform malicious tasks such as getting someone’s passwords or important data. This can even include the removal of user data or deleting one's hard drive.
Cyber security is a technique of protecting computers, networks, programs and data from unauthorized access or attacks that are aimed for exploitation and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
For example − There is a marked increase in phishing attacks. Phishing is of two types--one which is targeted at selected individuals, called spear phishing, who may be of high net worth, while the other is done at a mass scale.
Advantages of cyber security
The advantages of cyber security are as follows −
Minimizes computer freezing and crashes.
Protection against data from theft.
Protects the computer from being hacked.
Protects systems against viruses, worms, spyware and other unwanted programs.
Disadvantages of cyber security
The disadvantages of cyber security are as follows −
It will be costly for average users.
Firewalls can be difficult to configure correctly.
Need to keep updating the new software in order to keep security up to date. Make the system slower than before.
Difficult to work with for non-technical users.
Types of cyber security
The types of Cyber Security are as follows −
It involves security of physical systems used with cyberspace. It includes an electricity grid, etc. These types of resources are made vulnerable when they are connected to the internet. It requires a contingency plan and resilience plan for the infrastructure.
It involves protection of applications in the system. There are software/hardware methods used to handle threats related to external and internal security of the applications. There are different ways to ensure security here such as firewalls, antivirus, encryption programs, etc.
It is used to protect the network and its resources as well as nodes in it. It is implemented by the use of different passwords, extra logins, firewalls, monitoring, etc. Machine learning is also used for traffic management and other threat alerts in the network in the real time.
As more and more data is migrated to the cloud, its security is also important. There are new tools and implementations. When data is stored on the cloud, half control of data is given to the cloud provider. It is important to include security considerations in the terms and conditions document. The access to the cloud should also be given to a few trustworthy people.
IoT security deals with security of sensors, printers, routers, cameras, etc. The IoT market is in use in embedded systems as well. It is important that vendors keep updating their knowledge about threats related to IoT and other challenges.
- What is Scavenging in Cyber Security?
- What is Cyber Crime and Mobile Security Threat?
- What is the difference between Software Security and Cyber Security?
- What is Cyber Security and what are its types?
- What is Intrusion Detection in Cyber Security?
- What is the difference between Cryptography and Cyber Security?
- Difference between Cyber Security and Information Security
- What is Angler Exploit Kit in Cyber Security?
- What is Cyber Resilience?
- What Are Logic Bombs in Cyber Security?
- What is Cyber Risk Management?
- What is Cloud Infrastructure Entitlements Management (CIEM) in Cyber Security?
- What is the importance of Pen Testing in Cyber Security?
- What are the Automation Trends in Cyber Security?
- What are the Challenges in Establishing Cyber Security?