Ebebe James Chibueze cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's also known as information technology security or electronic information security. A compromised application could provide access to the data it’s designed to protect. Cyber attacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money.
Top Skills Required for Cyber security Jobs
·
Problem-Solving Skills
·
Technical Aptitude
·
Knowledge of Security across
Various Platforms
·
Attention to Detail
·
Communication Skills
·
Fundamental Computer
Forensics Skills
·
A Desire to Learn
·
An Understanding of Hacking
Common types of cyber attacks
1) Malware
Ebebe
James Chibueze malware is a term used
to describe malicious software, including spyware, ransom ware, viruses, and
worms. Malware breaches a network through vulnerability, typically when a user
clicks a dangerous link or email attachment that then installs risky software.
Once inside the system, malware can do the following:
·
Blocks access to key
components of the network (ransom ware)
·
Installs malware or
additional harmful software
·
Covertly obtains
information by transmitting data from the hard drive (spyware)
·
Disrupts certain
components and renders the system inoperable
2) Phishing
Phishing is the practice of sending fraudulent
communications that appear to come from a reputable source, usually through
email. The goal is to steal sensitive data like credit card and login
information or to install malware on the victim’s machine. Phishing is an
increasingly common cyber threat.
3) Man-in-the-middle
Man-in-the-middle
(MitM) attacks, also known as eavesdropping attacks, occur when attackers
insert themselves into a two-party transaction. Ebebe
James Chibueze once the attackers interrupt the traffic, they can filter
and steal data. Two common points of entry for MitM attacks:
1. On
unsecure public Wi-Fi, attackers can insert themselves between a visitor’s
device and the network. Without knowing, the visitor passes all information
through the attacker.
2. Once malware has breached a device, an
attacker can install software to process all of the victim’s information.
3) Denial-of-service
attack
A denial-of-service attack floods
systems, servers, or networks with traffic to exhaust resources and bandwidth.
As a result, the system is unable to fulfill legitimate requests. Attackers can
also use multiple compromised devices to launch this attack. This is known as a distributed-denial-of-service (DDoS) attack.
4) SQL injection
Ebebe
James Chibueze a Structured Query Language (SQL)
injection occurs when an attacker inserts malicious code into a server that
uses SQL and forces the server to reveal information it normally would not. An
attacker could carry out a SQL injection simply by submitting malicious code
into a vulnerable website search box.
5) Zero-day exploit
A zero-day exploit hits after network
vulnerability is announced but before a patch or solution is implemented.
Attackers target the disclosed vulnerability during this window of time. Zero-day
vulnerability threat detection requires constant awareness.
6) DNS Tunneling
DNS tunneling utilizes the DNS protocol to communicate non-DNS
traffic over port 53. It sends HTTP and other protocol traffic over DNS. There
are various, legitimate reasons to utilize DNS tunneling. However, there are
also malicious reasons to use DNS Tunneling VPN services. They can be used to
disguise outbound traffic as DNS, concealing data that is typically shared through
an internet connection.