Cyber
security is a global concern as society becomes increasingly reliant on
technology. Government, businesses and citizens will become much more
vulnerable to cyber-attacks unless robust mechanisms are put in place to
protect against the threats.
The
term cyber security was coined in 1988. Cyber security became much more
sophisticated and dangerous over the year
Government,
Business and citizens will become more vulnerable to Cyber Attacks.
Internet
has grown very fast and security has lagged behind.
India
is now world’s third largest internet user after US and China.
Viruses
Viruses
are those things which slow down your computer and affect software or hardware
very badly
Other
than that there is a spying software called Trojan
Trojan
has ability to steal data when it is installed in victim’s computer by not
touching them physically.
Trojan
can be attached with any kind of file such as movies, images, documents etc...
Trojan
can drop viruses and worms, take screenshots, can stream your webcam and record
keystrokes and much more annoying things on victim’s computer.
In
that Keystrokes are very dangerous, keystrokes are also known as key logger
Key
Loggers
Key
loggers records any information you type at any time using your keyboard
Key
loggers are classified in to two types
1 . Hardware key logger
2 . Software Key logger
Hardware
key logger
Hardware
key logger is look like usb or other peripheral device
It
is attached in between keyboard and computer
Physical
access to the target system is necessary and Record only keystrokes and store
in memory
Software
Key logger
Software
key logger is also used for keystroke capturing and record it and store a log
file in to your system and afterwards send it to specified receiver
Physical
access to the target system is not required and it is
As
like Trojan, key logger can be attached with any kind of file such as movies,
images, documents etc...
So
that victim can never doubt there is a key logger
Phishing
Phishing
is a method to obtain user name, passwords, credit card information
Phishing
may be of many types in that the widely used are Fake login pages
In
this method a hacker create a fake page of any websites such as Facebook,
Gmail, Yahoo and etc. Similar to the original page and ask the victim to login
through that page
Once
the victim login through that page the Email id and passwords will be send to
the hacker who made that page
Example of phishing Email
Social
Engineering Attack
Social
engineering is one of the most effective routes to stealing confidential data
The
purpose of social engineering is usually to secretly install spyware or other
malicious program or to trick person into handing over their passwords or other
financial or personal information
Social
engineering can be done by
1. Human interaction
2. Phone call
3. E-mail
-Human
This
attack is not as common or successful because people have become more conscious
of this type of attacks
-E-mail
Another
common online attacks is to send an email to the victim to pretend to be a head
of the department and send out emails which request user name and password
-Phone
The
most common practice of social engineering
A
hacker will call someone up and imitate a person of authority and slowly
retrieve information from them
No comments:
Post a Comment