Cyber security is mainly based on the protecting informations, and threats from cyber mainly cyber terrorism, cyber warfare, and cyber espionage. Cyber threats mainly focused on secret, political, military, or infrastructural assets of a nation, or its people. Because of these reasons cyber security was a critical part for any government. Mainly Cyber security is based on body of technologies processes and practices that will create to saves networks, computers, programs and data and information from attacks, damage or unauthorized access.
When we talk more about cyber security it has efforts throughout the process and it can be divided into several sectors.
- Application security
- Information security
- Network security
- Disaster recovery / business continuity planning
- End-user education
Why is cyber Security is important
Mainly secret organizations, governments, military cooperation’s, businesses collect and store their secret data and information’s on their electronic devices and transmit that data across networks to other computers. When transmitting those data and information data is at a risk. So we have to protect them. For the protection of these data and information we use Cyber Security.
What are the risks?
When we talk about the risks there are many, some of risks like serpents because the attack you’re all data base and delete all of them. Someone breaking into your system and altering files, someone using your computer to attack others, or someone stealing your credit card information and making unauthorized purchases.
Cyber security risks
This is a type of malware which attacks your computer system and infects resulting complicated methods and targets, experts at McAfee Labs warned.
“We predict ransomware variants that manage to evade security software installed on a system will specifically target endpoints that subscribe to cloud-based storage solutions such as Dropbox, Google Drive, and OneDrive. Once the endpoint has been infected, the ransomware will attempt to exploit the logged-on user’s stored credentials to also infect backed-up cloud storage data,” McAfee’s report on 2015 cyber risks noted.
Ransomware encrypts data and McAfee thought attacks on mobile devices and cloud-backed data would increase.
Cyber espionage can be considered as the stealing of secret data and information stored in digital formats or on computers and IT networks. This Cyber espionage is mostly used to gain strategic, economic, political, or military advantage without any permission.
This can be named as a common security problem in present. Easy to passwords are huge risk because it can crack easily. Serving insecure login forms is especially dangerous because of the wide variety of attacks that can be used against them. Then you have to select case sensitive, long and can’t imagine passwords everytime.
Types of Malware
Cyber attacks can be attacks you in several ways, malware is a kind of that. This can be named as major threat for people, mainly cyber terrorist attacks remotely by using malwares, there are different kind of malwares, some are above,
This is a kind of small software that can damage to your system and this is a huge threat for people. Cyber terrorist mainly use this system for attacking, this file straightly targeted to the system files of your computer. this can be spread from one computer to another by attaching itself to another computer file.
From this attackers can stole and damage your all computer details with in short period of time. This is also a kind of software. Trojan is can’t identify quickly because acts in several ways.
This can be attacked by your system if your system become weak. This can be harmful to your network of your computer. worms didn’t require a programme and attach themevles.