Cyber Security

Cyber security comprises technologies, processes, and controls that are designed to protect systems, networks, and data from cyber attacks.

Security is based on the following issues:
  • Privacy:  The ability to keep things private/confidential
  • Trust: We trust data from an individual or a host
  • Authenticity: Are security credentials in order
  • Integrity:    Has the system been compromised/altered already
 Threats classified into one of the categories below:


A backdoor in a computer system, a cryptosystem is any secret method of bypassing normal authentication or security controls. They may exist for a number of reasons, including by original design or from a poor configuration.

Direct-access attacks :

An unauthorized user gaining physical access to a computer is most likely able to directly download data from it.


It is the act of surreptitiously listening to a private conversation, typically between hosts on a network.


Spoofing of user identity describes a situation in which one person or program successfully masquerades as another by falsifying data.


It describes a malicious modification of products. So-called " Evil Maid" attacks and security services planting of surveillance capability into routers.


It is the attempt to acquire sensitive information such as usernames, passwords and credit card details directly from users.

No comments:

Post a Comment