Cyber Security

Page 1

Cyber Security, refers to the protection of computer systems and networks from information disclosure, theft or damage to the hardware, software, and electronic data, as well as from the problems or misdirection of the services provided. The field is outstandingly increasing due to the continuous expanding reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices, such as smartphones, televisions, and the wide range of devices that constitute the "Internet of things". Cyber security is also one of the significant challenges in the existing world, due to its complexity, both in terms of political usage and technology.

Since the arrival of internet with the digital transformation initiated in recent years, the concept of cyber security training has become a familiar subject in our professional as well as personal lives. Cyber security and cyber threats have been constant for the last 50 years of technological change. For example, in 2007, the United States and Israel started exploiting security flaws in the Microsoft Windows operating system to attack and damage equipments used in Iran to refine nuclear materials. Iran responded by heavily investing in their own cyberwarfare capability, which they started using against the United States.

Vulnerabilities and attacks A vulnerability is defined as weakness in design, implementation, operation, and internal control. Most of the vulnerabilities discovered are documented in the Common Vulnerabilities and Exposures database. An exploitable vulnerability is the one for which atleast one working attack or "exploit" exists. Vulnerabilities are often researched, reverse-engineered, hunted, or exploited using automated tools or customized scripts. To secure a computer system, it is important to understand that the attacks are made against it, and these threats can typically be classified into one of these categories below: • Backdoor • Denial-of-service attack • Direct-access attacks • Eavesdropping • Multi-vector or polymorphic attacks • Phishing • Privilege escalation • Reverse engineering • Side-channel attack • Social engineering • Spoofing • Tampering • Malware


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.