Posts

Types Of Cyber Attackers

Image
  Types Of Cyber Attackers From the previous tutorials, we got knowledge about the internet and the attacks happening in cyberspace, also about cybercrimes. Now we are discussing the different kinds of people who are behind these cyber-attacks and cybercrimes. We call them Cyber Attackers or Cyber Criminals.  We can define them as an entity which may be a person or a group of persons or even an organization who are doing some malicious job to attack a system or network with the aim of stealing information, gaining access, or even destroying that network or system.  As we know the internet is growing so fast and more and more people are coming to this cyber world and spending more time and their activities here. Attackers are using different methods and tools which are readily available in the deep web or dark web for doing such criminal activities. In broadly we can divide the cyber attackers are of four types, Cyber Criminals Hackers State-sponsored attackers Inside attackers CYBERCRI

Introduction to cyber crimes

Image
  Introduction to cyber crimes The Internet began to use in 1960. In the beginning time, it was not an issue to deal with cyber crimes as it is not accessible to the public. Only the defense systems of a country and the top officials of a country uses the privilege of the internet and the scenario was smooth and good.  In the late 1990s, the internet was more developed and it was the beginning that the public was given access to the internet and the internet started to spread its wings in the public. In every good, there will be a hidden bad thing inside it. The Internet was not different from that as the criminals started using the internet to steal others' personal and sensitive data and even destroy a system in a network. It varies from simple adware to complex viruses that are able to destroy a system and steal all its data.  At the beginning of the 2000’s the cybercrime rate increased and every country‘s law enforcement started to deal with cybercriminals. Packet tracing and p

Types of Cyber Attacks

Image
  Types of Cyber Attacks We know we are living in a digital world where almost all our daily activities depend on the internet and electronic devices such as e-shopping, mobile devices, social media, online banking, and many more. This dependency can lead to illegal hackers and cybercriminals opening a way to steal your information and identity. Now, these illegal activities have grown into a fearful crime world.  A cyber-attack can be defined as an illegal attack or accessing of a computer or a network and stealing the data from it or trying to destroy that system or network with the help of a computer worm or malware. This kind of attack leads to loss of information or identity or even money can be referred to as cybercrime and the person who is behind a cybercrime is called  cyber-criminals . Broadly the cyberattacks can be divided into two types which are based on the impact of the attack that are Web-based attacks System based attacks WEB-BASED ATTACKS As the name suggests, web-ba

Ethical Hacking and Cyber Security

Image
     Ethical Hacking and Cyber Security Cyber security and Ethical hacking are two names that make much confusion for a beginner. Both of them are aiming for a common goal that is to protect the systems and networks of an organization from cyber-attacks and cybercriminals. Both cyber security and ethical hacking are working for increasing the security of the organization, there is some difference between them. Cyber security is a huge area that has different subsets or sub-areas to specialize and ethical hacking is one of those subsets or sub-area of cyber security. Let us check in detail how they are different even they have a common purpose. What is cyber security? Cyber security can be defined as a stream of technology that deals with methods and tools that are for maintaining the security of systems, network devices, and networks from illegal access, stealing or modification of sensitive data and even destruction of the system or a device or network that caused by the cybercriminal

Fundamentals of Computer network

Image
                             Fundamentals of Computer network What is a computer network? A computer network can be defined as two or more computers are connected together (called  Hosts ) for the purpose of exchanging communication, or sharing resources either by wired connection like a LAN cable or by wireless like Wifi.  A network not only includes the host but also many other devices to transmit data and information are called Network devices like switches, routers, or hubs. A network can be only for a specific geographic location like an organization or an office which are connected through physical cable is called LAN (Local Area Network) connection. We cannot able to access this network from outside the LAN network. Opposite to the LAN network, we can connect the computer over the world with and without the help of a cable, which we call as internet or WAN (Wide Area Network) network. There are a lot of protocols and rules for transmitting data through the network. What is Inter

INTRO TO CYBER SECURITY

Image
                                      INTRO TO CYBER SECURITY I n our modern world, most people are using cyberspace for many things like shopping, social media, playing games, watching movies, even paying today's bills, which has many potential traps. What is Cyber Security? Security means protecting something from unauthorized or malicious attacks. Here also in the same definition, the term cyber security means protecting the systems such as computers, mobile, or any other devices or the data that is connected to the internet or inside the internet from malicious attacks. What is the need for cyber security? Now we think about why I should be concerned about such types of threats and security, which is related to the internet? it is only for someone who is a software professional or someone who is working in cyberspace.  The answer is no. Every one of us is using the internet and the services that use the internet in all our day-to-day activities like social media, online transac

CYBER SECURITY TRAINING

Image
                  CYBER SECURITY TRAINING INTRODUCTION FUNDAMENTALS OF COMPUTER NETWORKS CYBER SECURITY & ETHICAL HACKING TYPES OF CYBER ATTACK CYBER CRIMES TYPES OF CYBER ATTACKERS CYBER SECURITY PRINCIPLES TYPES OF CYBER SECURITY DATA SECURITY OSI LAYERS & PROTOCOLS SECURITY TECHNIQUES CYBER SECURITY POLICIES CYBER SECURITY STANDARDS CYBER SECURITY TOOLS COMMERCE IN CYBER SECURITY TOP CHALLENGES IN CYBER SECURITY