Monday, January 18, 2021

Cyber Security- An understanding

Understanding Cyber Security - An emerging technology..

Cyber Security can be defined as it a the bundle of technologies, processes, controls effectively established to protect systems, networks, devices and applications from cyber attack and threats. 

This is a vast subject and have multiple domains as mentioned;

  • Web Application Security
  • Software application Security
  • Information Security
  • Network Security
  • Server Security
  • Workstation Security
  • Operational Security
  • Data privacy and Protection
  • End user awareness and education
Cyber Attack or Cyber Incidents

There are various reasons for which an attack or an incident occurs, while the hackers are from below reasons;
  • Own employees who are unaware
  • Insider threats
  • Hacktivists
  • Criminals
  • Nation states
  • Regional, political war
  • Competition
  • For Fun
  • Targeted attack

Types of Cyber attacks/ Cyber threats 
  1. Email Phishing
  2. Web/domain Phishing
  3. Dictionary Attack
  4. Data Breach
  5. Virus attack
  6. Malware Attack
  7. Ransomware Attack
  8. Trojan Horse
  9. Daniel of Service (DoS) 
  10. Behavioral DoS (BDos)
  11. Distributed Daniel of Service (DDoS)
  12. Drive by attack
  13. Man in the Middle Attack
  14. SQL Injection
  15. XSS (Cross Site Scripting)
  16. Eavesdropping 
  17. Bruteforce attack
  18. Password stolen/hack
  19. Zero-Day Attack
  20. Social Engineering
  21. AI Powered attack
  22. Key logger based attack

Cyber Skills

Similarly multiple skill set and certifications are required in the cyber security domain to gain the knowledge. Sometimes you may need scripting and C/C++, Python and other programming knowledge to work best in this domain.

The name of certifications in brief as;


CISSP, CISA, CISM, CEH, ECSA, ENCRYPTION SPECIALIST, CSA, GRC, SOX, DIGITAL FORENSIC, ISO 27001, OSCP, OSEE, OSWP, OSCE, CCSP, COMPTIA Security+, COBIT, CIPP/A, CIPP/E, CIPT, SANS-GIAC Certifications, etc.

-DR

No comments:

Post a Comment

Network Scanning Tools

Network Scanning through Nmap and Nessus Network scanning is a process used to troubleshoot active devices on a network for vulnerabilities....