0% found this document useful (0 votes)
23 views13 pages

Anglish T

Cyber security is increasingly critical due to the rise in sophisticated cyber threats affecting individuals and organizations. It encompasses the protection of networks, computers, and data, focusing on the principles of confidentiality, integrity, and availability. Understanding the types of cyber attacks and the motivations behind them is essential for developing effective defense strategies and response plans.

Uploaded by

amajda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views13 pages

Anglish T

Cyber security is increasingly critical due to the rise in sophisticated cyber threats affecting individuals and organizations. It encompasses the protection of networks, computers, and data, focusing on the principles of confidentiality, integrity, and availability. Understanding the types of cyber attacks and the motivations behind them is essential for developing effective defense strategies and response plans.

Uploaded by

amajda
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Luarasi University

Faculty of Information Technology and Innovation


Bussines Informstics

CYBER SECURITY

Assignment in the subject: English

Tiranë,2023-2024
Cyber Security Basics:
Cyber security is the most concerned matter as cyber threats and attacks are
overgrowing. Attackers are now using more sophisticated techniques to target
the systems. Individuals, small-scale businesses or large organization, are all
being impacted. So, all these firms whether IT or non-IT firms have understood
the importance of Cyber Security and focusing on adopting all possible
measures to deal with cyber threats.

What is cyber security?

"Cyber security is primarily about people, processes, and technologies working


together to encompass the full range of threat reduction, vulnerability reduction,
deterrence, international engagement, incident response, resiliency, and
recovery policies and activities, including computer network operations,
information assurance, law enforcement, etc."

OR

Cyber security is the body of technologies, processes, and practices designed to


protect networks, computers, programs and data from attack, damage or
unauthorized access.

 The term cyber security refers to techniques and practices designed to protect
digital data.

 The data that is stored, transmitted or used on an information system.

OR

Cyber security is the protection of Internet-connected systems, including


hardware, software, and data from cyber attacks. It is made up of two words one
is cyber and other is security.

 Cyber is related to the technology which contains systems, network and


programs or data.
 Whereas security related to the protection which includes systems security,
network security and application and information security.

Why is cyber security important?

Listed below are the reasons why cyber security is so important in what’s
become a predominant digital world:

 Cyber attacks can be extremely expensive for businesses to endure.

 In addition to financial damage suffered by the business, a data breach can


also inflict untold reputational damage.

 Cyber-attacks these days are becoming progressively destructive.


Cybercriminals are using more sophisticated ways to initiate cyber attacks.

 Regulations such as GDPR are forcing organizations into taking better care of
the personal data they hold.

Because of the above reasons, cyber security has become an important part of
the business and the focus now is on developing appropriate response plans that
minimize the damage in the event of a cyber attack.

But, an organization or an individual can develop a proper response plan only


when he has a good grip on cyber security fundamentals.

Cyber security Fundamentals

 Confidentiality

Confidentiality is about preventing the disclosure of data to unauthorized


parties. It also means trying to keep the identity of authorized parties involved
in sharing and holding data private and anonymous. Often confidentiality is
compromised by cracking poorly encrypted data, Man-in-the-middle (MITM)
attacks, disclosing sensitive data. Standard measures to establish confidentiality
include:
 Data encryption

 Two-factor authentication

 Biometric verification

 Security tokens

 Integrity

Integrity refers to protecting information from being modified by unauthorized


parties. Standard measures to guarantee integrity include:

 Cryptographic checksums

 Using file permissions

 Uninterrupted power supplies

 Data backups

 Availability

Availability is making sure that authorized parties are able to access the
information when needed.

Standard measures to guarantee availability include:

 Backing up data to external drives

 Implementing firewalls

 Having backup power supplies

 Data redundancy

Types of Cyber Attacks

A cyber-attack is an exploitation of computer systems and networks. It uses


malicious code to alter computer code, logic or data and lead to cybercrimes,
such as information and identity theft.
Cyber-attacks can be classified into the following categories:

1) Web-based attacks

2) System-based attacks

Web-based attacks

These are the attacks which occur on a website or web applications. Some of the
important web-based attacks are as follows:

1. Injection attacks

It is the attack in which some data will be injected into a web application to
manipulate the application and fetch the required information.

Example- SQL Injection, code Injection, log Injection, XML Injection etc.

2. DNS Spoofing

DNS Spoofing is a type of computer security hacking. Whereby a data is


introduced into a DNS resolver's cache causing the name server to return an
incorrect IP address, diverting traffic to the attackers computer or any other
computer. The DNS spoofing attacks can go on for a long period of time
without being detected and can cause serious security issues.

3. Session Hijacking

It is a security attack on a user session over a protected network. Web


applications create cookies to store the state and user sessions. By stealing
the cookies, an attacker can have access to all of the user data.

4. Phishing

Phishing is a type of attack which attempts to steal sensitive information like


user login credentials and credit card number. It occurs when an attacker is
masquerading as a trustworthy entity in electronic communication.
5. Brute force

It is a type of attack which uses a trial and error method. This attack
generates a large number of guesses and validates them to obtain actual data
like user password and personal identification number. This attack may be
used by criminals to crack encrypted data, or by security, analysts to test an
organization's network security.

6. Denial of Service

It is an attack which meant to make a server or network resource unavailable


to the users. It accomplishes this by flooding the target with traffic or
sending it information that triggers a crash. It uses the single system and
single internet connection to attack a server.

It can be classified into the following:

Volume-based attacks- Its goal is to saturate the bandwidth of the attacked


site, and is measured in bit per second.

Protocol attacks- It consumes actual server resources, and is measured in a


packet.

Application layer attacks- Its goal is to crash the web server and is
measured in request per second.

7. Dictionary attacks

This type of attack stored the list of a commonly used password and
validated them to get original password.

8. URL Interpretation

It is a type of attack where we can change the certain parts of a URL, and
one can make a web server to deliver web pages for which he is not
authorized to browse.
9. File Inclusion attacks

It is a type of attack that allows an attacker to access unauthorized or


essential files which is available on the web server or to execute malicious
files on the web server by making use of the include functionality.

10.Man in the middle attacks

It is a type of attack that allows an attacker to intercepts the connection


between client and server and acts as a bridge between them. Due to this, an
attacker will be able to read, insert and modify the data in the intercepted
connection.

System-based attacks

These are the attacks which are intended to compromise a computer or a


computer network.

Some of the important system-based attacks are as follows:

1. Virus

It is a type of malicious software program that spread throughout the


computer files without the knowledge of a user. It is a self-replicating
malicious computer program that replicates by inserting copies of itself into
other computer programs when executed. It can also execute instructions that
cause harm to the system.

2. Worm

It is a type of malware whose primary function is to replicate itself to spread


to uninfected computers. It works same as the computer virus. Worms often
originate from email attachments that appear to be from trusted senders.
3. Trojan horse

It is a malicious program that occurs unexpected changes to computer setting


and unusual activity, even when the computer should be idle. It misleads the
user of its true intent. It appears to be a normal application but when
opened/executed some malicious code will run in the background.

4. Backdoors

It is a method that bypasses the normal authentication process. A developer


may create a backdoor so that an application or operating system can be
accessed for troubleshooting or other purposes.

5. Bots

A bot (short for "robot") is an automated process that interacts with other
network services. Some bots program run automatically, while others only
execute commands when they receive specific input. Common examples of
bots program are the crawler, chatroom bots, and malicious bots.

Computer criminals

Computer criminals have access to enormous amounts of hardware,


software, and data; they have the potential to cripple much of effective
business and government throughout the world. In a sense, the purpose of
computer security is to prevent these criminals from doing damage.

We say computer crime is any crime involving a computer or aided by the


use of one. Although this definition is admittedly broad, it allows us to
consider ways to protect ourselves, our businesses, and our communities
against those who use computers maliciously.

One approach to prevention or moderation is to understand who commits


these crimes and why. Many studies have attempted to determine the
characteristics of computer criminals. By studying those who have already
used computers to commit crimes, we may be able in the future to spot likely
criminals and prevent the crimes from occurring.

CIA Triad

The CIA Triad is actually a security model that has been developed to help
people think about various parts of IT security.

CIA triad broken down:

Confidentiality

It's crucial in today's world for people to protect their sensitive, private
information from unauthorized access.

Protecting confidentiality is dependent on being able to define and enforce


certain access levels for information.

In some cases, doing this involves separating information into various


collections that are organized by who needs access to the information and
how sensitive that information actually is - i.e. the amount of damage
suffered if the confidentiality was breached. Some of the most common
means used to manage confidentiality include access control lists, volume
and file encryption, and Unix file permissions.

Integrity

Data integrity is what the "I" in CIA Triad stands for.

This is an essential component of the CIA Triad and designed to protect data
from deletion or modification from any unauthorized party, and it ensures
that when an authorized person makes a change that should not have been
made the damage can be reversed.

Assets and Threat


What is an Asset: An asset is any data, device or other component of an
organization’s systems that is valuable – often because it contains sensitive
data or can be used to access such information. For example: An employee’s
desktop computer, laptop or company phone would be considered an asset,
as would applications on those devices. Likewise, critical infrastructure, such
as servers and support systems, are assets. An organization’s most common
assets are information assets. These are things such as databases and physical
files – i.e. the sensitive data that you store.

What is a threat: A threat is any incident that could negatively affect an


asset – for example, if it’s lost, knocked offline or accessed by an
unauthorized party. Threats can be categorized as circumstances that
compromise the confidentiality, integrity or availability of an asset, and can
either be intentional or accidental. Intentional threats include things such as
criminal hacking or a malicious insider stealing information, whereas
accidental threats generally involve employee error, a technical malfunction
or an event that causes physical damage, such as a fire or natural disaster.

Motive of Attackers

The categories of cyber-attackers enable us to better understand the attackers'


motivations and the actions they take. As shown in Figure, operational cyber
security risks arise from three types of actions: i) inadvertent actions
(generally by insiders) that are taken without malicious or harmful intent; ii)
deliberate actions (by insiders or outsiders) that are taken intentionally and
are meant to do harm; and iii) inaction (generally by insiders), such as a
failure to act in a given situation, either because of a lack of appropriate
skills, knowledge, guidance, or availability of the correct person to take
action Of primary concern here are deliberate actions, of which there are
three categories of motivation.
1. Political motivations: examples include destroying, disrupting, or taking
control of targets; espionage; and making political statements, protests, or
retaliatory actions.

2. Economic motivations: examples include theft of intellectual property or


other economically valuable assets (e.g., funds, credit card information);
fraud; industrial espionage and sabotage; and blackmail.

3. Socio-cultural motivations: examples include attacks with philosophical,


theological, political, and even humanitarian goals. Socio-cultural
motivations also include fun, curiosity, and a desire for publicity or ego
gratification.

Summary

Cyber security has emerged as a critical concern in today's digital landscape due
to the escalating threat of cyber attacks. These attacks, which are growing in
complexity, pose risks to individuals, businesses, and organizations of all sizes.
Cyber security entails protecting networks, computers, programs, and data from
unauthorized access, damage, or manipulation.
Businesses face significant financial losses and reputational damage as a result
of cyber attacks. Regulatory mandates like GDPR compel organizations to
enhance the protection of personal data. Consequently, there's a growing
emphasis on developing robust response plans to mitigate the impact of cyber
incidents.
At its core, cyber security revolves around three fundamental principles:
confidentiality, integrity, and availability. Confidentiality involves preventing
unauthorized access to data, integrity ensures data remains unaltered and
trustworthy, and availability ensures data is accessible to authorized parties
when needed.
Cyber attacks come in various forms, including web-based attacks targeting
websites or applications, and system-based attacks aimed at compromising
computers or networks. Understanding the motivations and characteristics of
cyber criminals is crucial for preventing cyber crimes.
The CIA Triad—Confidentiality, Integrity, and Availability—serves as the
cornerstone of cyber security, guiding the implementation of measures such as
encryption, access control, and data backups.
Assets, encompassing data, devices, and system components, are vulnerable to
threats that can compromise their confidentiality, integrity, or availability.
These threats, whether intentional or accidental, underscore the importance of
robust cyber security measures.
Ultimately, cyber attackers may have various motives, including political,
economic, or socio-cultural agendas. Their actions range from disrupting targets
to theft of intellectual property, necessitating proactive measures to safeguard
against cyber threats and mitigate their impact.

Fjale te reja

1. Encompass-Përfshi

2. Deterrence-Parandalimi

3. Predominant-Mbizotërues
4. Fundamentals-Bazat

5. Disclosure-Zbulimi

6. Cryptographic checksums-Shumat

kontrolluese kriptografike

7. Exploitation-Shfrytëzimi

8. Malicious code-Kod me qëllim të keq

9. Spoofing-Mashtrimi

10.Masquerading-Maskarimi

11.Validates-Vlereson

12.Bandwidth-Gjerësia e brezit

13.Troubleshooting-Zgjidhja e problemeve

14.Crawler-Zvarritës

15.Breached-E thyer

16.Inadvertent-Pa dashje

17.Espionage-Spiunazhi

18.Fraud-Mashtrimi

19.Blackmail-Shantazhi

20.Gratification-Kënaqësi

You might also like