CYBER SECURITY

             


What is Cyber Security?

The technique of protecting internet-connected systems such as computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks is known as cybersecurity. We can divide cybersecurity into two parts one is cyber, and the other is security. Cyber refers to the technology that includes systems, networks, programs, and data. And security is concerned with the protection of systems, networks, applications, and information. In some cases, it is also called electronic information security or information technology security.

Some other definitions of cybersecurity are:

DATA BREACH

"Cyber Security is the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, theft, damage, modification or unauthorized access."

"Cyber Security is the set of principles and practices designed to protect our computing resources and online information against threats."


Why Is Cybersecurity Important?

One of the many advantages to living in a world where every device is connected is convenience. It’s incredibly easy to conduct work, manage your social calendar, shop and make appointments from your smartphone or device. That’s why it’s become second nature to many of us.

But, of course, the convenience of connected data also means threats from bad actors can do a lot of damage. Cybersecurity initiatives are essential to protecting our data and thus, our way of life.

BIGGEST CYBER ATTACKS IN HISTORY

Estonia jammed cyber attack in 2007


In April and May 2007, hackers unleashed a wave of cyber attacks that crippled dozens of government and corporate sites in Estonia, one of Europe's most wired countries. Estonian authorities traced the so-called denial of service attacks to Russia, and suggested they had been orchestrated by the Kremlin — a charge Moscow denied.

The online assault followed Estonia's decision to move a Soviet World War II memorial from downtown Tallinn on April 27, 2007, sparking furious protests from Russia's government and rioting among Estonia's ethnic Russian minority.

Experts said hundreds of thousands of computers were used in a coordinated attack against government agencies and banks.

Cyberattack on Critical Infrastructure: Russia and the Ukrainian Power Grid Attacks



Regional electricity distribution company Ukrainian Kyivoblenergo has a dubious distinction. It is the world’s first power grid provider to be taken down in a cyber attack. 

It all began when its Prykarpattyaoblenergo control center was the victim of a cyber intrusion on December 23, 2015. The company’s computer and SCADA systems were attacked, disconnecting 30 substations for three hours. As many as 230,000 customers lost power –  approximately  half of the homes in the Ivano-Frankivsk region in Ukraine (population about 1.4 million). The tool used was malware known as BlackEnergy

Ukrainian government officials came out rather quickly to claim the outages were caused by a cyber attack, squarely placing blame on Russian security services.

(1991) 21 DAY STUT DOWN CYBER CRIME NANA computer


The 1999 Nana Cyber Attacks, also known as the "Nana" virus or the "Bubble Boy" virus, were a series of coordinated cyberattacks that targeted Microsoft Windows systems around the world. The virus was named after the name "Nana" that appeared in the code.

 


Cyber Attacks on U.S. Companies Since November 2014 


It’s time for the statistics derived from the Cyber Attacks Timelines of November (Part I and Part II).

Let us begin with the Country Distribution chart that, easy predictable, shows the US on top of all categories. However, globally, even Italy, Canada and UK show up, respectively for Hacktivism (the first two countries) and Cyber Crime (the latter).

The Daily Trend of Attacks chart shows a moderate activity with a peak on the 10th, and a plateau between the 13th and 14th. Despite the 5th of November is a day felt by Hacktivists, no noticeable operations have been recorded this year.



Once again Cyber Crime leads the 
Motivations Behind Attacks chart with 55.8% substantially in line with the previous month (was around 60%). Hacktivism ranks at number two with 28.6%, a remarkable increase compared to 13.8% of October. Whereas Cyber Espionage remains quite high (13%, despite in decrease compared to the record value of 17.2% recorded in October.


                  

Cyber crime stories of 2012

Cyber crime has continued to become more professional in 2012, with the barriers to entry becoming ever lower with the emergence of increasingly powerful toolkits and exploits for sale o the past year, cyber criminals have used increasingly powerful and targeted attacks to steal information ranging from credit card details and other personal information to intellectual property

1999 CYBER CRIME Macro Viruses

Macro viruses involving infected Word and Excel files were a plague in the late 1990s. Yet, like grunge music, the genre fell into decline as techniques and technologies moved on. More recently macro viruses have staged something of a revival, thanks to social-engineering trickery.

Windows executable malware has dominated macro viruses written in VBA (Visual Basic for Applications) since the turn of the century.

Users opening an infected document were exposed to malicious code that infected Windows PCs. The macro virus would spread into a user's Office template files before sneaking copies of itself into any subsequently edited documents. Examples of macro-based malware include the fast-spreading Melissa email worm from 1999.

Security improvements in Microsoft Office products blocked many such attacks, propelling macro viruses towards extinction in the process

TOP 10 BIGGEST CYBER ATTACKS IN HISTORY 

VIDEO LINK  :   https://youtu.be/fUeJtM1bgGo


Types of Cybersecurity

Cybersecurity can be categorized into five distinct types:**8ZZz

 1  Critical infrastructure security

 2  Application security

 3  Network security

 4  Cloud security

 5  Internet of Things (IoT) security 

  To cover all of its bases, an organization should develop a comprehensive plan that includes not only these five types of cybersecurity, but also the three components that play active roles in a cybersecurity posture: people, processes and technology.                                                                                                                                                                  

Critical infrastructure security

Critical infrastructure security is the area of concern surrounding the protection of systems, networks and assets whose continuous operation is deemed necessary to ensure the security of a given nation, its economy, and the public’s health and/or safety.




Application security

Application security is the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification.



Network security

Network security is a set of technologies that protects the usability and integrity of a company's infrastructure by preventing the entry or proliferation within a network of a wide variety of potential threats.


Cloud security

Cloud security, also known as cloud computing security, is a collection of security measures designed to protect cloud-based infrastructure, applications, and data. These measures ensure user and device authentication, data and resource access control, and data privacy protection. They also support regulatory data compliance. Cloud security is employed in cloud environments to protect a company's data from distributed denial of service (DDoS) attacks, malware, hackers, and unauthorized user access or use.




Internet of things (iot) security

IOT Security is the act of securing Internet devices and the networks they're connected to from threats and breaches by protecting, identifying, and monitoring risks all while helping fix vulnerabilities from a range of devices that can pose security risks to your business.

Effects of CyberCrime

According to a 2018 report published by McAfee, the economic impact of cybercrimes is estimated to cost the global economy nearly $600 billion annually.

Financial loss is one of the obvious effects of cybercrimes, and it can be quite significant. But cyber crimes also have several other disastrous consequences for businesses such as:

1.Investor perception can become a huge problem after a security breach causing a drop in the value of businesses.

2. Businesses may also face increased costs for borrowing, and raising more capital can be challenging as well after a security breach.

3.Loss of sensitive customer data can result in penalties and fines for failing to protect customer data. Businesses may be sued over data breaches.

4.Due to loss of reputation and damaged brand identity after a cyberattack, customers’ trust in a business will decline. Businesses not only end up losing current customers but also find it difficult to gain new customers.

5. Direct costs may also be incurred such as the cost of hiring    cybersecurity companies for remediation, increased insurance    premium costs, public relations (PR), and other services related to the attack.


Cyber Security and CyberCrime

Cyber security is a domain that is designed to eliminate cybercrime. Cyber security can also be referred to as IT security.

Cyber security is the backbone of the network and information security. Cyber security applies various techniques to safeguard data from data breaches. As organizations move online, there is an increasing need for cyber security to protect data from malicious activities.

Cyber criminality is a kind of criminal behavior involving unauthorized access to computer systems. The number of attacks is increasing day by day. Hackers are becoming smarter in their activities. The importance of cyber security now is more than ever.

Cyber security gives in-depth knowledge about how to control or recover from cyberattacks.

Conclusion

India was the country with the highest number of cybercrimes in 2020, amounting to 4.5 million. Cybercrime refers to criminal behavior committed by using a computer or other electronic device connected to the internet. This blog provides information about cybercrime, the various risks it poses, and the strategies for prevention from the same.

Cybercrime is the criminal behavior of unauthorized access to computer systems. Cyber security provides a thorough understanding of how cyber attacks can be controlled or recovered. Online courses provide advice on how cyber crimes and cybercrime hazards can be prevented, protected, and recovered.

 


 

Comments