Cybersecurity is also known as information technology security or electronic information security.
Cyber security can be defined as the practice of protecting computers, servers, mobile devices, electronic systems, networks and data from malicious purposes. Considering that we live in the digital age and the internet is a part of our daily lives, cyber security is very important for all users and institutions.
If we look at the concept of cyber security in terms of institutions or companies, the first thing we encounter is the concept of information security. Because "data / information" is one of the most important assets that institutions have. Institutions process their data, sell it or use it to produce a product. Therefore, protecting this data is of great importance. Otherwise, cyber attackers or malicious hackers may access this data and cause great material and moral damage to institutions.
When we look at cyber security from the perspective of governments, we can say that citizens, public institutions, critical infrastructures such as communication, finance and energy, whose infrastructure is information systems, must be protected against malicious hackers or other states.
These definitions actually differ from each other with important differences, but their overall purposes are similar. Cyber security; It aims to ensure that individuals, institutions or governments can maintain their information technology systems securely and to protect them against cyber attacks and unauthorized access.
What are the Types of Cyber Threats?
1. Cyber Crime: It is the type that targets systems for financial gain or disruption of business.
2. Cyber Attack: It usually involves collecting information for political reasons.
3. Cyber Terror: It is designed to undermine electronic systems in a way that causes panic or fear.
So, how do those who threaten cybersecurity gain control of computer systems? Common methods used for this are as follows:
Malware
It is one of the most common cyber threats. It is software created by a cybercriminal to disrupt or damage a user's computer. Often spread via an email attachment or legitimate-looking download, malware can be used by cybercriminals to make money or in politically motivated cyberattacks.
SQL Grafting
It is a type of cyber attack used to control and steal data from a database. Cybercriminals exploit vulnerabilities in applications to inject malicious code into a database via a malicious SQL statement.
Phishing
Phishing attacks often aim to trick users into transferring credit card data and other personal information. Criminals target victims using emails that request sensitive information and appear to be from a legitimate company.
Interfering with Transactions
It is a type of attack in which cybercriminals prevent communication between two people. On an unsecured WiFi network, data passing from the user's device and across the network may be intercepted.
Blocking the Service
It is when cybercriminals prevent a computer system from fulfilling legitimate requests by overwhelming networks and servers with traffic. A cyber attack is carried out by rendering the system unusable.
0 responses on this post
Be the first one to comment on this article