Cyber Security


Katpresentation

Uploaded on May 16, 2018

Category Technology

Introduction about cyber security.

Category Technology

Comments

                     

Cyber Security

Cyber Security Cyber security or it security would be the techniques of protecting computers, systems, programs and knowledge from unauthorized access or attacks which are aimed for exploitation. Description: Major areas covered in cyber security are: 1) Application Security 2) Information Security 3) Disaster recovery 4) Network Security Information security protects information from unauthorized use of avoid id theft and also to safeguard privacy. Major techniques accustomed to cover this are: a) Identification, authentication & authorization of user, b) Cryptography. Disaster recovery planning is really a procedure that includes performing risk assessment, creating priorities, developing recovery strategies in situation of the disaster. Any company must have a concrete arrange for disaster recovery to resume normal business operations as rapidly as you possibly can following a disaster. Network security includes activities to safeguard the usability, reliability, integrity and safety from the network. Effective network security targets a number of threats and stops them from entering or distributing around the network. Network security components include: a) Anti-virus and anti-spy ware, b) Firewall, to bar unauthorized use of your network, c) Invasion prevention systems (IPS), to recognize fast-distributing threats, for example zero-day or zero-hour attacks, and d) Virtual Private Systems (VPNs), to supply secure remote access. Hacking Hacking is definitely an make an effort to exploit a pc system or perhaps a private network in the computer. To put it simply, it's the unauthorised use of or control of network system home security systems for many illicit purpose. Description: To higher describe hacking, one should first understand online hackers. It's possible to easily assume these to be intelligent and highly trained in computers. Secure Sockets Layer (ssl) Secure Sockets Layer (SSL) is really a protocol produced by Netscape for creating an encrypted outcomes of an internet server along with a browser. SSL is definitely an industry standard which transmits personal information safely on the internet by encrypting it. It's used by lots of websites to safeguard the internet transactions of the customers. Cipher text Cipher is definitely an formula that is put on plain text to obtain ciphertext. It's the unreadable creation of an file encryption formula. The word "cipher" may also be used as a substitute term for ciphertext. Ciphertext isn't understandable until it's been changed into plain text utilizing a key. Computer Earthworm A pc earthworm is really a malicious, self- replicating computer software (popularly referred to as 'malware') which affects the functions of hardware and software programs. Description: They fit the outline of the trojan in lots of ways. For instance, it may also self- replicate itself and spread across systems. That's the reason worms are frequently known as infections also. Trojan A trojan is really a malware program loaded onto a user’s computer with no user’s understanding and performs malicious actions. Description: The word 'computer virus' was initially formally based on Fred Cohen in 1983. Computer infections never occur naturally. They're always caused by individuals. Once produced and released, however, their diffusion isn't directly under human control. Denial-of-service Attack Denial-Of-Service (DoS) is definitely an attack directed at depriving legitimate users online services. To control your emotions by flooding the network or server with useless and invalid authentication demands which eventually brings the entire network lower, leading to no connectivity. Because of this, users are avoided by using something. Memory Corruption Memory corruption can be defined as the vulnerability that could exist in a pc system when its memory is altered with no explicit assignment. The items in a memory location are modified because of programming errors which enable attackers to complete a random code. Description: Memory corruption bugs mostly exist in low-level programming languages like C or C. THANKS