Cyber Security

Cyber security comprises technologies, processes, and controls that are designed to protect systems, networks, and data from cyber attacks.

Security is based on the following issues:
  • Privacy:  The ability to keep things private/confidential
  • Trust: We trust data from an individual or a host
  • Authenticity: Are security credentials in order
  • Integrity:    Has the system been compromised/altered already
 Threats classified into one of the categories below:

Backdoors:

A backdoor in a computer system, a cryptosystem is any secret method of bypassing normal authentication or security controls. They may exist for a number of reasons, including by original design or from a poor configuration.

Direct-access attacks :

An unauthorized user gaining physical access to a computer is most likely able to directly download data from it.

Eavesdropping:

It is the act of surreptitiously listening to a private conversation, typically between hosts on a network.

Spoofing:

Spoofing of user identity describes a situation in which one person or program successfully masquerades as another by falsifying data.

Tampering:

It describes a malicious modification of products. So-called " Evil Maid" attacks and security services planting of surveillance capability into routers.

Phishing:

It is the attempt to acquire sensitive information such as usernames, passwords and credit card details directly from users.




No comments:

Post a Comment