What is cyber security?
Because of the development of Technology, the use of the internet and computer is increasing day by day. These days all the work is done by the internet either it is government companies or Private companies. The payment is also done by the internet, so every moment any types of personal data have been exchanging with each other via the internet. Many smart devices like computer, Laptop, Tablet, Mobiles has connected with internet to used many technologies to do their work. Million of users use the internet and they are providing any type of their personal data on the internet. So the data which has provided by users need to be secure. Because people are facing Fraud, Hacking, Virus attack, or data theft problem in the cyber world. Provide security of users’ data is most important these days. So Cyber Security is used to safe people from cybercrime like Fraud, Hacking, Virus attack or data theft, etc. Cybersecurity can help people to secure their personal data on the internet.
Cybersecurity is one kind of Security for that system that has connected with the internet. It has made with two words “Cyber & Security”. The things connected with the Internet, Information, Technology, Computer, Network, Application, and Data are called cyber. And the things related to security like system security, Network security, Application security, and Information security are called Security. To provide strong security of the internet, the hardware and software data will make advance and secure.
Today Many companies working on providing strong security of users’ data to decrease cybercrime And defense against cyber attacks.
Types of Cyber Security Threats
- Trojan Horse
- Phishing Email
A computer virus is a malware program that affects a victim’s computers. The virus can enter a computer system and it starts to control and harmed that computer without the owner’s authority and can theft users’ data.
Adware is a group of malware that generate popup messages about the software that was made by hackers. When victim download that softer and install on his device, the hacker starts to control the device and start stole user information.
Trojan Horse is a malware program that presents itself as useful software. It can control our system and can install viruses on our devices. But it cannot copy its files like other viruses. A trojan can steal users’ passwords, lock the system, and can take user data.
Ransomware may be a sort of malware that encrypts a victim’s files. The attacker then demands a ransom from the victim to revive access to the info upon payment.
Users are shown instructions for a way to pay a fee to urge the decryption key. the prices can range from a couple of hundred dollars to thousands, payable to cybercriminals in Bitcoin.
Phishing might be such a social engineering attack that frequently wont to take client information, including login accreditations and MasterCard numbers. It happens when an attacker, taking on the appearance of a confided substance, hoodwinks a casualty into opening an email, text, or instant message. The beneficiary is then fooled into clicking a malignant connection, which may cause the establishment of malware, the freezing of the framework as a piece of a ransomware attack, or the noteworthy touchy data.
An attack can have destroyed results. For people, this incorporates unapproved buys, the taking of assets, or distinguish robbery.