What is the meaning of the word CYBER ?
What is the need of Cyber Security ?
What are the security problems in Cyber
How to implement and maintain Security of
a Cyber field around us ?
The term cyber security is used to refer to the security
offered through on-line services to protect your online
Cyber security or information technology security is
the protection of computer systems from theft or damage
to their hardware, software or electronic data, as well as
from disruption or misdirection of the services they
4. With an increasing amount of people getting connected
to Internet, the security threats that cause massive harm
are increasing also.
A Virus is a “program that is loaded onto your
computer without your knowledge and runs against
Install a security suite that protects the computer
against threats such as viruses .
In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
A white hat hacker is a computer security specialist
who breaks into protected systems and networks to test
and asses their security.
White hat hackers use their skills to improve security
by exposing vulnerabilities(weaknesses) before
malicious hackers (known as black hat hackers) can
detect and exploit them.
The term "grey hat", alternatively spelled as greyhat or
"gray hat", refers to a computer hacker or computer
security expert who may sometimes violate laws(illegal)
or typical ethical standards, but does not have the
malicious intent typical of a black hat hacker.
Black hat refers to a hacker who breaks into a
computer system or network with malicious intent.
A black hat hacker may exploit security vulnerabilities
for monetary gain; to steal or destroy private data , or to
alter, disrupt or shut down websites and networks.
It may be impossible to prevent(stop) computer
hacking, however effective security controls including
strong passwords, and the use of firewalls can helps.
The word "malware" comes from the term "MALicious
Malware is any software that infects and damages a
computer system without the owner's knowledge or
Download an anti-malware program that also helps
Activate Network Threat Protection, Firewall,
Keep you private information private
Trojan horses are email viruses that can duplicate
themselves, steal information, or harm the computer
system. These viruses are the most serious threats to