Cyber Security 1.1
Introduction:
Cybersecurity is the most common in everywhere to protect and secure sensitive information & information systems (Internet-connected systems such as hardware, software and data) from unauthorized use, access, disruption, destruction, modification, disclosure from the uninvited Guests.
1.1
Who are the real threats ????
- Insiders
- Cyber Criminals
- Hackers
- Organized group of criminals
Most Targeted sectors
- Financial sectors
- Healthcare
- Nuclear Facilities
- Corporate
- ATM Networks
- Enterprise sectors
How are organisations/sectors breached ??
- Insider threats
- Misconfigurations
- Software / Applications / OS Vulnerabilities
- Phishing
- Weak passwords / Credentials
- Irresponsibility
Top important Cyber security fields:
- Cloud Secutity
AWS, GCP, Azure, AliBaba, Digital Ocean, Salesforce, Dell, IBM, Oracle - Network Security
- Infrastructure Security
- Application Security
- IOT Security
- Android / IOS security
- Mobile Security
- Security Operations Centre [ SOC ]
1.2
Cyber Security roles in demand
Security Operations, Cloud Security Engineer, Information Security Analyst, Identity & Access Management Analyst, Governance, Risk & Compliance, Application Security, Network Security, Data Privacy, Incident Response Management, Data Security, Cloud Security, Digital Forensics, Mobile Security, Cryptography, Security Architect
1.3
Cyber Security Nomenclatura
Backdooring:
Installing malicious software’s for future and continued exploitation.
Data Exfiltration:
Collect and gather critical information from the target network.
Privlege Escalation:
Controlling all the devices in the environment by possessing User accounts or Application which are with highest privileges.
Reconnaissance:
Attackers research and identify valuable information about their target through openly available information.
Unauthorized Access:
Access that violates the stated security policy.
Exploit:
Attackers leverages such vulnerabilities to get control of the resource.
Vulnerability:
Mis-configuration or outdated versions in any software, application (web or mobile), Operating System, hardware etc.
Final point for this chapter is watch “Mr.Robot” Series ;) ;) ;) and please continue reading my articles and if this is helpful kindly give a clap / comment !!!