Posts

SIGNS AND PUNISHMENTS OF CYBER ATTACK

Image
Red Flags of a Potential Cyber Attack 1.      Standard programs and files that will not open or work. 2.     Files have been deleted, or contents have changed without your involvement. 3.     You find that passwords have unexpectedly changed. 4.     Unknown software appears or suddenly begins installing. 5.     The computer is connecting to the internet frequently when you are not using it. 6.     Your internet searches are being redirected. 7.     Extra browser windows may appear or turn off without your involvement. 8.     Unrecognized anti-virus software scans randomly appear. 9.     Additional toolbars are added to your internet browser. 10.   Frequent pop-ups load when you access the internet. 11.    Your mouse/pointer moves on your screen intelligently on its own. 12.   Your task manager, reg...

STEPS TO BE TAKEN BY A CYBER ATTACK VICTIM

Image
Steps to be taken by Cyber-attack Victim 1.     Contain the Breach The very first step you should take after a breach is to determine which servers have been compromised and to contain them as quickly as possible to ensure that other servers or devices won't also be infected. Here are a few immediate things you can do to attempt to contain a data breach: a. Disconnect your internet b.   Disable remote access c.    Maintain your firewall settings d. Install any pending security updates or patches e.    Change passwords f.     You should change all affected or vulnerable passwords immediately. Create new, strong passwords for each account, and refrain from reusing the same passwords on multiple accounts. It's also important to strengthen your security by taking precautions like turning on two-factor authentication. 2.   Assess the Breach   Whether you are part of a broader attack or ...

CYBER PROTECTION METHODS

Image
CYBER PROTECTION METHODS Avoid Identity Theft There are some things to be avoided when dealing with personally identifiable data: Never share your Aadhar/PAN number (In India) with anyone whom you do not know/trust. Never share your SSN (In US) with anyone whom you do not know/trust. Do not post sensitive data on social networking sites. Do not make all the personal information on your social media accounts public. Please never share an Aadhar OTP received on your phone with someone over a call. Make sure that you do not receive unnecessary OTP SMS about Aadhar (if you do, your Aadhar number is already in the wrong hands) Do not fill personal data on the website that claim to offer benefits in return . Conduct cyber security risk assessments A structured risk assessment can help identify and address significant security gaps that may be putting your data, digital assets, a...

TYPES OF CYBER THREATS AND CYBER ATTACKS

Image
Types of Cyber threats - Malwares 1.    Rootkit - is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software . 2.    Spyware - is a software that aims to gather information about a person or organization, without their knowledge, and send such information to another entity without the consumer's consent. 3.    Trojan - is any malware which misleads users of its true intent . 4.    Virus - is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code . 5. worm- is a standalone malware computer program that replicates itself in order to spread to other computers . 6. ADWARE - is software that generates revenue for its developer by automatically generating online advertisements in t...

INTRODUCTION

Image
                                  INTRODUCTION The 21st century is characterized by the use of the Internet for a personal and professional daily life. We rely on this vast array of networks to communicate, socialize, network, travel, automate our homes, run the world economy, and provide many government programs and services. What is cybersecurity all about? Cyber security is made up of two words one is cyber and other is security. Cyber is related to the technology which contains systems and networks. Whereas security related to the protection which includes systems security, network security and application and information security. It may also be referred to as information technology security the practice of ensuring the integrity, confidentiality, and availability (ICA) of information. Cybersecurity is comprised of an evolving set of tools, and risk management approaches. Cy...