7. Malware protection:
To analyze attack codes malware protection
program is established.
Internet gateway and firewalls:
It watch out all the network entrance. All the
malicious software trying to enter to secure
network are drained to block and detect the
malware activities web filtering, firewall
policies and content checking are used.
Secure configuration: Hardware devices,
operating system are designed with low
security
Patch management: In software program it is
the latest version to prevent infected software
programs.
User access control: Normal user’s privileges
are limited by providing access control policy.
Techniques
used in
Cyber
security
8. Malicious attacks:
This is used by cyber criminals to delete, modify and alter a secure
data which is known as malwares. E.g. of malwares are:
Spyware:
Overall computer control are taken down in which personal
information are collected without users knowledge.
Viruses:
Files or computer information are corrupted or modified. By a single
software program the virus enter to the system. From one computer
to the other the virus spread by attacking the files in the computer.
Password attacks:
On cracking user’s password the attacks are focused. By following
alphanumeric procedure the user must protect the password.
10. Types of cyber Attack
• Cyber war: Cyber wars are carried out by nation for the
purpose of disturbing and hacking data’s of
neighbouring countries. Advanced persistent threats are
used for extracting the countries data.
• Cybercrime: Group of members or individuals are
attempt cyber crime with an attitude to extract money.
In place of credit & debit card hacking or the crack
online password cyber crime occurs.
• Cyber threats: For illegal activities criminals, spies and
terrorists use cyber based technology as to manipulate
the data, to deny the distributed services or attack a
systems security.
11. 9 D’s Concepts in Cyber
Security
• Cyber security projects use 9D’s concept to avoid
DDoS attack problems. 9D’s are
• Deter attacks,
• Detect attacks,
• Drive up difficulty,
• Differentiate protections,
• Dig beneath the threat,
• Diffuse protection throughout the payload,
• Distract with decoys,
• Divert attackers to other targets,
• Depth of defence.