Cyber Security 1.1

Satish Kumar
3 min readJul 29, 2023

--

Introduction:

Cybersecurity is the most common in everywhere to protect and secure sensitive information & information systems (Internet-connected systems such as hardware, software and data) from unauthorized use, access, disruption, destruction, modification, disclosure from the uninvited Guests.

1.1

Who are the real threats ????

  • Insiders
  • Cyber Criminals
  • Hackers
  • Organized group of criminals

Most Targeted sectors

  • Financial sectors
  • Healthcare
  • Nuclear Facilities
  • Corporate
  • ATM Networks
  • Enterprise sectors

How are organisations/sectors breached ??

  • Insider threats
  • Misconfigurations
  • Software / Applications / OS Vulnerabilities
  • Phishing
  • Weak passwords / Credentials
  • Irresponsibility

Top important Cyber security fields:

  • Cloud Secutity
    AWS, GCP, Azure, AliBaba, Digital Ocean, Salesforce, Dell, IBM, Oracle
  • Network Security
  • Infrastructure Security
  • Application Security
  • IOT Security
  • Android / IOS security
  • Mobile Security
  • Security Operations Centre [ SOC ]

1.2

Cyber Security roles in demand

Security Operations, Cloud Security Engineer, Information Security Analyst, Identity & Access Management Analyst, Governance, Risk & Compliance, Application Security, Network Security, Data Privacy, Incident Response Management, Data Security, Cloud Security, Digital Forensics, Mobile Security, Cryptography, Security Architect

1.3

Cyber Security Nomenclatura

Backdooring:
Installing malicious software’s for future and continued exploitation.

Data Exfiltration:
Collect and gather critical information from the target network.

Privlege Escalation:
Controlling all the devices in the environment by possessing User accounts or Application which are with highest privileges.

Reconnaissance:
Attackers research and identify valuable information about their target through openly available information.

Unauthorized Access:
Access that violates the stated security policy.

Exploit:
Attackers leverages such vulnerabilities to get control of the resource.

Vulnerability:
Mis-configuration or outdated versions in any software, application (web or mobile), Operating System, hardware etc.

Final point for this chapter is watch “Mr.Robot” Series ;) ;) ;) and please continue reading my articles and if this is helpful kindly give a clap / comment !!!

--

--