Posts

Showing posts from June, 2023

All about ROOTKITS in Cyber Security !!

Rootkit is a software program, typically malicious, that provides privileged, root level access to a computer while concealing its presence on that machine. Rootkit tools (popular ones) ·        Purple Fox ·        MoonBounce ·        TDSS Rootkit types ·        Hypervisor rootkit: It takes advantage of the hardware virtualization and is installed between the hardware and the kernel acting as the real hardware. ·        Kernel rootkit: Kernel Rootkits are specifically designed to attack the core of your operating system and change its functioning. ·        Bootloader rootkit: The bootloader rootkit attacks the legit bootloader and replaces it with the hacked one so that attackers could control the system boot. ·        Application rootkit: Application Rootkits re...

Social Engineering And Attacks !

Image
Social engineering is the tactic of manipulating, influencing, or deceiving a victim in order to gain control over a computer system, or to steal personal and financial information. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information . Types of social Engineering attacks ·        Baiting: Attack where a scammer uses a false promise to lure a victim into trap ·        Scareware: Technique that aims to scare the victim into believing that they have a virus on their device ·        Pretexting: Technique that manipulates victim into divulging information ·        Phishing: Technique to trick users into doing something dangerous      Phishing is the most common type of Social Engineering Attacks Concepts of social engineering Social engineering heavily relies on the 5 principles established...

Cyber terms that You should Be Aware of !!

Image
Spyware Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. It is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties, Virus A virus is a type of malicious software, or malware, that spreads between computers and causes damage to data and software. Trojan Horse A Trojan Horse is a type of malware that downloads onto a computer disguised as a legitimate program. VPN Most of you might be aware of it, but do not know the correct use of it. Let me explain- VPN (Virtual Private Network), a VPN is a method of connecting a series of computers and devices in a private encrypted network, with each users IP address being replaced by the VPN’s IP address. Users get Internet anonymity, making it difficult for hackers to attack. Ransomware Ransomware is type of malware from crypto virology that threatens to publis...

Network Security

Image
  Network security ·        Network security is a set of technologies that protects the usability and integrity of a company’s infrastructure by preventing the entry or proliferation within a network of a wide variety of potential threats. ·        Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Types of network security 1.       Network access control (NAC) 2.      Application security 3.      Antivirus and anti-malware software 4.      E-mail security 5.      Wireless security Why do we need it? Network security is important because it keeps sensitive data safe from cyber attacks and ensures the network is usable and trustworthy. Ex...

What is Cybercrime?

Image
  What is cyber-crime? ·        Cyber Crime is criminal activity that either targets or uses a computer, a computer network or a networked device. ·        Most cyber-crime is committed by cybercriminals or hackers who want to make money. ·        CYBER-CRIME IN IT ACT 2000 – The Act gives legal validity to electronics contracts, recognition of electronic signatures. Punishment for cybercrime Only authorized person has the right to access to protected system. Penalties: punishment: the imprisonment which may extend to ten years and fine. Who investigate cyber-crime in india? ·        National cyber-crime threat analytics Unit (TAU) ·        National Cybercrime Reporting ·        Platform for Joint Cybercrime Investigation ·        National Cybercrime Foren...