LIST OF COMMON CYBER SECURITY THREATS WHICH EVERYONE SHOULD BE AWARE OF<\/u><\/strong><\/p>\n In this era where every organisation like healthcare, financial, logistics and transportation, Construction ,government services ,real estate ,retail etc. are moving towards digitization and digitalization, also becoming prone to cyber threats.<\/p>\n While everyone is talking about new regulations and compliances like Data Privacy, Information Security, GDPR etc., organisations are still unable protect their network and data from cyber criminals. Personnel Data theft news is making headlines every other day.<\/p>\n What the Cyber Security threat is?<\/strong><\/p>\n In a layman term it is a malicious act which can damage data, steal data or disrupt digital life and ultimately impact organisation\u2019s business objectives. These threats Masters of disguise and manipulation, and contently evolve new ways to accomplish their task of stealing, harming and annoying organisations. Organisations shall adequately arm themselves with resources and information to safeguard against complex and growing computer security threats and stay safe online.<\/p>\n What a virus is?<\/strong>\u00a0A computer virus is a malicious piece of program that may disturb the normal functioning .Virus are often sent as an attachment with email ,with an intention to infect your computer system as well as all other computers in your network. Sometimes virus are hosted on websites, whosoever visits malicious website gets infected.<\/p>\n Examples of Computer Virus are:\u00a0<\/strong>Browser Hijacker, File Infector Virus, Boot Sector Virus, Web Scripting Virus, Polymorphic Virus etc<\/p>\n \u00a0<\/strong><\/p>\n What virus can do?<\/strong>\u00a0A computer virus can attach itself to email attachment, pdfs, doc files, USB, pen drives and hard drives .Any file which contains a virus is called infected file. If the infected file get copied to computer, virus also get copied<\/p>\n \u00a0<\/strong><\/p>\n What a malware is:<\/strong><\/p>\n A malware is a malicious program or software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.<\/p>\n What malware can do:<\/strong><\/p>\n \u00a0<\/strong><\/p>\n What a trojan is?<\/strong><\/p>\n A Trojan is malicious program that is disguised as, or embedded within, legitimate software. It is an executable file wrapped with some genuine program and software \u00a0that will install itself and run automatically once it\u2019s downloaded.<\/p>\n Example:Trojan- Banker, Trojan-GameThief , Trojan-Dropper, Trojan Ransom, Trojan-SMS, Trojan- Spy etc<\/p>\n What trojan can do?<\/strong><\/p>\n \u00a0<\/strong><\/p>\n What is a Ransomware ?<\/strong><\/p>\n Ransomware is a type of malicious software that block the access to your computer system or your files, usually by encrypting it and displays a message that demands payment in order for the restriction to be removed. In many cases it comes with deadlines, if the victim doesn\u2019t pay the ransom, the data is gone forever.<\/p>\n The two most common mode of spreading ransom ware are phishing emails that contain malicious attachments and website pop-up advertisements<\/p>\n Examples of ransom ware are: WannaCry, Crypto Locker, NonPetya, Bad Rabbitetc.<\/p>\n What Ransom ware can do?<\/strong><\/p>\n There are two common types of ransomware:<\/p>\n Ransom ware encrypts the computer or data files and display a ransom\/payment notification for regaining access. Once the ransom is paid, victim will receive the decryption key and may attempt to decrypt the files. Sometimes the victims never receives the keys.<\/p>\n \u00a0<\/strong><\/p>\n What are botnets?<\/strong>\u00a0Botnets -Botnet is a network of infected computers often known as zombies used for malicious purposes .This Botnet is combination of Robot and Network. So here the network of computer robots is used to perform cyber crime controlled by Cyber criminal known as bot masters.<\/p>\n Botnet is controlled by the originator and the infected computer might unaware of its being a zombie.<\/p>\n Example:<\/strong>IRC (Internet Relay Chat)\u00a0botnet<\/strong>, P2P (Peer-to-Peer)\u00a0botnet<\/strong>, HTTP (Hyper Text Transfer Protocol)\u00a0botnet<\/strong>\u00a0and the hybrid\u00a0botnet<\/strong><\/p>\n What Botnets can do?<\/strong><\/p>\n What is DDOS?<\/strong><\/p>\n This is an attack a network of zombie computers us used to sabotage specific website or server. These zombie computer are being controlled for performing specific task such as making the website and server unavailable .In DDOS the attacker use the vulnerability existing in user computer<\/p>\n \u00a0<\/strong><\/p>\n What DOS\/DDOS can do?<\/strong><\/p>\n The purpose of DOS\/ DDOS attack is to make essential services unavailable, which can sometimes leads to server crash.<\/p>\n What is Phishing?<\/strong><\/p>\n Phishing is a social engineering attack used by cyber criminals used for gathering personal information of including login credentials and credit card details using deceptive emails or website.<\/p>\n Attackers create fake emails, text messages and websites which look like they\u2019re from authentic companies. This is also known as \u201cspoofing\u201d<\/p>\n What Phishing can do?<\/strong><\/p>\n \uf0b7By phishing hackers\/cyber criminals trick you into giving them information by asking you to update, validate or confirm your account. It is often presented in a manner than seems official and intimidating, to encourage you to take action.<\/p>\n \uf0b7Phishing provides hackers\/cyber criminals with your username and passwords so that they can access your accounts (your online bank account, shopping accounts, etc.) and steal your credit card numbers<\/p>\n What is Hacking?<\/strong>\u00a0Hacking: Hacking is an attempt of unauthorised access to users computer by exploiting the existing vulnerabilities\u00a0 for performing fraudulent activities like personal data stealing , invasion in privacy, financial fraud etc.<\/p>\n What Hacking can do?<\/strong><\/p>\n Hackers find out weakness in your system and exploit it for different purpose<\/p>\n \u00a0<\/strong><\/p>\n Ways to prevent Cyber Security Threats<\/strong><\/p>\n Using common sense is the best protection .One shall never download free videos, files or songs from suspicious websites, never click on suspicious links .Never ever share your personal data online. Be aware of what is happening around.Cyber threats are effective if and only if you have weaknesses in your system. More vulnerabilities will expose the system to threats and hence more risky, however less loopholes means less risk.<\/p>\n Remember Precaution is better than Cure.<\/p>\nTHESE ARE COMMON CYBER SECURITY THREATS<\/h2>\n
1. VIRUS<\/strong><\/h3>\n
\n
2. MALWARE<\/strong><\/h3>\n
\n
\u00a03.\u00a0<\/strong>TROJAN<\/strong><\/h3>\n
\n
4. RANSOMWARE<\/strong><\/h3>\n
\n
5. BOTNETS<\/strong><\/h3>\n
\n
6. DDOS<\/strong><\/h3>\n
\n
7. PHISHING<\/strong><\/h3>\n
8.HACKING<\/strong><\/h3>\n
\n
\n