Meritshot Tutorials
- Home
- »
- What is cybersecurity?
Cyber Security Tutorial
-
What is cybersecurity?What is cybersecurity?
-
Introduction to LinuxIntroduction to Linux
-
Text Processing using GREP, SED, and AWKText Processing using GREP, SED, and AWK
-
Introduction to Ethical HackingIntroduction to Ethical Hacking
-
Footprinting and ReconnaissanceFootprinting and Reconnaissance
-
Scanning NetworksScanning Networks
-
Enumeration in Cyber SecurityEnumeration in Cyber Security
What is cybersecurity?
Table of Contents
Definition and Scope Importance of cybersecurity
History and Evolution of Cybersecurity
Goals of Cybersecurity: The CIA Triad (Confidentiality, Integrity, and Availability) Types of Cyber Attacks
Most common Cyber Attacks Types of Cyber Attackers
Definition and Scope
Cyber security pertains to a practice initiated to protect networks, data and systems from all sorts of digital attacks. These attacks are often done with the goal of altering, destroying or stealing sensitive information, disrupting operations or extorting money. Key aspects of cyber security incorporate network security, application security and information security.
The field of cyber security is evolving rapidly and without any signs of stopping. It is driven by plenty of technological advancements, along with the ingenuity of cybercriminals. Top expanding technologies like artificial intelligence and the Internet of Things bring forth new vulnerabilities and problems. Consequently, these professionals have to update their skills and knowledge continually to stay alert and aware of potential threats.
Importance of cybersecurity
Getting hacked isn’t just a direct threat to the confidential data companies need. It can also ruin their relationships with customers and even place them in significant legal jeopardy. With new technology, from self-driving cars to internet-enabled home security systems, the dangers of cybercrime become even more serious.
So, it’s no wonder that international research and advisory firm Gartner predicts worldwide security spending will hit $210 billion in 2024. Gartner also predicts the market will reach $314 billion by 2028.
These days, the need to protect confidential information is a pressing concern at the highest levels of government and industry. State secrets can be stolen from the other side of the world.
Companies whose whole business models depend on control of customer data can find their databases compromised.
By prioritizing cybersecurity, organizations can mitigate the risk of data breaches, financial losses and reputational damage. Whether you’re an individual or an organization, understanding the importance of cybersecurity is fundamental to navigating the threat landscape safely and securely.
History and evolution of cybersecurity
The origins of cybersecurity can be traced back to the 1960s, a period when researchers at institutions like Bell Labs and MIT were laying the groundwork for early computers and networks. The concept of cybersecurity emerged alongside ARPANET, the forerunner of today’s internet. In 1971, ARPANET faced its first documented breach—a program called Creeper, designed to probe security weaknesses.
As personal computers gained popularity in the 1980s, malicious software and viruses began to surface more frequently. A pivotal moment came in 1988 with Robert Tappan Morris’s creation of the Morris Worm, which infected roughly 10% of the internet. This incident underscored the urgent need for stronger network defenses.
The 1990s saw the rapid rise of the World Wide Web, which brought with it a surge in cyber threats such as hacking, advanced viruses, and email fraud. Tools like firewalls and antivirus programs became essential safeguards during this time.
In the 2000s, cybercrime grew significantly, with numerous high-profile breaches affecting individuals, governments, and corporations. Notable incidents included the Stuxnet worm in 2010, which targeted Iranian nuclear facilities, and the 2007 cyberattacks on Estonia, a watershed moment in digital warfare.
Today, cybersecurity has evolved into a critical field, addressing threats like phishing, ransomware, and nation-state cyberattacks. Advances in technology have paved the way for innovative defense strategies, all aimed at shielding organizations from an ever-changing digital threat landscape.
There are only three steps to install R in Linux
Goals of Cybersecurity: The CIA triad (Confidentiality, Integrity, and Availability)
The CIA Triad is a foundational information security model that centers on three core principles: Confidentiality, Integrity, and Availability. This model serves as a guiding framework for organizations to develop robust security procedures and policies that address these critical areas. While broad in scope, the CIA Triad has proven effective in directing strategic planning efforts and identifying potential cybersecurity threats. By implementing appropriate security measures and risk mitigation strategies, organizations can effectively address and minimize these threats.
It’s important to note that the three elements of the CIA Triad, while essential, can sometimes be at odds with each other. For example, stringent security measures designed to protect confidentiality may inadvertently hinder data accessibility. Striking the right balance between these components is crucial, and organizations must carefully consider their unique requirements to achieve optimal security posture.
Furthermore, cybersecurity threats don’t solely originate from external sources like cyberattacks. Internal factors, such as accidental human error or malicious insider activity, can also pose significant risks. Consequently, CIA Triad controls for confidentiality must encompass both external cybercriminals and internal threats.
Confidentiality: Confidentiality involves safeguarding information from unauthorized access by establishing systems and processes that restrict information access, usage, and dissemination. To maintain the highest level of data protection and secure sensitive information, CIA Triad confidentiality implementations should adhere to the principle of least privilege. This entails granting users access to information only when absolutely necessary and for the shortest duration required.
Example: Requiring multi-factor authentication when a user accesses an account is an example of confidentiality. In this case, a user logs into a website and is prompted to input a code that has been sent to their mobile device. This can be followed up by answering a security question.
Integrity: Integrity safeguards data from unauthorized alteration or erasure. This aspect of the CIA Triad guarantees data reliability and completeness.
Example: Hashing, encryption, digital certificates, and digital signatures are examples of the integrity component of the CIA triad. These methods verify integrity and ensure that authenticity cannot be repudiated or denied.
Availability: Availability ensures timely and reliable access to data whenever required. This necessitates safeguarding systems from tampering. Availability, a crucial component of the CIA Triad, often serves as the early warning sign of a compromised system. Any disruption to system
availability is typically an indicator of underlying issues. Due to its critical nature, availability is frequently prioritized over confidentiality and integrity within the CIA Triad.
Example: Examples of availability disruptions that the CIA Triad aims to prevent and mitigate include Distributed Denial of Service (DDoS) attacks and ransomware. These, along with other availability-focused attack vectors, are the primary targets of security measures designed to ensure system availability. Even if data remains confidential and intact, it is rendered useless if it becomes inaccessible.
Types of Cyber attacks
- Web-based attacks
- System-based attacks
- Web-based attacks: Web-based attacks target vulnerabilities in web applications to compromise systems or steal sensitive data.
Example: Injection Attacks, Cross-site Scripting (XSS), Session hijacking, MiTM (Man-in-the- middle), DoS (Denial-of-Service) etc.
- System-based attacks: System-based attacks target vulnerabilities in operating systems, network devices, or individual
Example: Malware attacks, Phishing attacks, Brute force attacks, Password cracking, Backdoor attacks.
Most common Cyber attacks
A cyberattack is a malicious act targeting a computer or any component of a computerized information system with the intent to alter, destroy, or steal data, or to exploit or damage a network. As businesses increasingly embrace digitization, cyberattacks have become more prevalent.
While there are numerous types of cyberattacks, the following list highlights the 20 most common examples.
- DoS and DDoS attacks
- MITM attacks
- Phishing attacks
- Whale-phishing attacks
- Spear-phishing attacks
- Ransomware
- Password Attacks
- SQL injection attacks
- URL interpretation
- DNS Spoofing
- Session hijacking
- Brute force attacks
- Web attacks
- Insider threats
- Trojan horse
- Drive-by Attacks
- XSS attacks
- Eavesdropping attacks
- Birthday attack
- Malware attack
01. DoS and DDoS Attacks:
Overwhelming a system with traffic to render it inaccessible.
For instance, a website might become slow or unavailable due to a flood of requests from malicious sources.
02. MITM Attacks:
Intercepting communication between two parties to eavesdrop or manipulate data.
This can be likened to someone listening in on a phone conversation or tampering with a letter in transit.
03. Phishing Attacks:
Deceiving users into revealing sensitive information through fraudulent emails, SMS messages, or phone calls.
A common example is a fake email that appears to be from a bank, asking for login credentials.
04. Whale-phishing Attacks:
Targeting high-profile individuals within organizations for financial gain or sensitive information. A CEO might receive a targeted email with a malicious link or attachment.
05. Spear-phishing Attacks:
Targeted phishing attacks aimed at specific individuals or organizations.
A company might receive a phishing email tailored to their specific industry or recent events.
06. Ransomware:
Malware that encrypts files and demands a ransom for decryption.
A user might find their files inaccessible and a ransom note demanding payment.
07. Password Attacks:
Using techniques like brute force or dictionary attacks to crack passwords.
An attacker might try various password combinations to gain access to an account.
08. SQL Injection Attacks:
Exploiting vulnerabilities in web applications to manipulate databases.
An attacker could inject malicious code into a web form to steal sensitive data.
09. URL Interpretation:
Manipulating the way a web browser interprets URLs to redirect users to malicious websites. A user might click on a seemingly legitimate link but be redirected to a phishing site.
10. DNS Spoofing:
Redirecting internet traffic to malicious servers by altering DNS records.
A user’s browser might be tricked into connecting to a fake website instead of the intended one.
11. Session Hijacking:
Stealing a user’s session token to gain unauthorized access to their account.
An attacker could intercept a user’s session cookie and use it to log in to their account.
12. Brute Force Attacks:
Trying to guess passwords or other credentials by systematically trying different combinations. An attacker might use automated tools to try various password combinations.
13. Web Attacks:
Targeting vulnerabilities in web applications to compromise systems or steal data. This includes attacks like SQL injection, XSS, and CSRF.
14. Insider Threats:
Malicious actions by individuals within an organization.
A disgruntled employee might steal sensitive data or sabotage systems.
15. Trojan Horse:
Malicious software disguised as legitimate programs.
A user might download a seemingly harmless program that actually contains malware.
16. Drive-by Attacks:
Automatically downloading malware onto a victim’s device.
Visiting a malicious website can trigger the download of malware without the user’s knowledge.
17. XSS Attacks:
Injecting malicious scripts into web pages to steal user data or hijack sessions. An attacker could inject malicious code into a comment section or forum post.
18. Eavesdropping Attacks:
Listening to network traffic to intercept sensitive information.
An attacker might use Wi-Fi sniffing tools to capture unencrypted network traffic.
19. Birthday Attack:
Exploiting the probability of collisions in hash functions to crack cryptographic systems. This technique can be used to break certain cryptographic algorithms.
20. Malware Attack:
Any malicious software designed to harm computer systems or networks.
This includes viruses, worms, ransomware, and other types of malware.
Types of Cyber Attackers
Cybercriminals come in various forms, each with their own motivations and goals. Understanding these motivations is crucial for comprehending the reasons behind cyberattacks. Here are several categories of cybercriminals:
Cyber Criminals
These types of cyber attackers are the most common ones, and their aim is usually to target your system and get access to information and your system.
Some of the purposes behind these attacks usually is of the following nature:
- To gain access to private information and threaten to publicly release or destroy it beyond recovery unless the victim pays a ransom.
- Gain access to security credentials for the victim’s banking information and steal from them.
- Taking down sites and harming the business/working of an
- To spread malware to the
- To spread attacks to more systems using the captured
Hacktivists
These are usually a group of programmers that try to access unauthorized or sensitive information, but unlike our average cybercriminals, they don’t usually target normal law-abiding citizens. Their purpose behind these attacks is usually to expose information to help their agendas, including social causes such as fighting corrupt governments, exposing criminals, helping various political causes they believe in, etc.
State Sponsored attackers
These attackers are one of the most harmful ones in the magnitude of their effect. Countries usually sponsor these to gather sensitive information, often related to the national security of a rival nation. The resources and support behind them make them much more formidable than any normal group of attackers. The purpose behind these attacks is often to compromise national security by gaining insights on critical information such as defence plans, financial plans or sensitive information about various political figures.
Insider Attackers
Insider attackers are not necessarily programming experts all the time. They may just be regular employees or personnel (such as customers) who get access to information that they can leverage against the company/organization or make the information public that may harm the organization and their reputation.
The reasons behind these threats are broadly classified into these three categories given below.
- Negligence is one of the major reasons that can be easily prevented here. The employee might release important information related to the organization and cause harm to them by not following proper protocol. These are usually unintentional.
- Malicious reasons can be the guiding factor here because the employee may be getting monetary benefits from a rival They may also be guided by revenge against their current employer.
- Accidental reasons differ from negligence because it is wilful inaction or ignorance of pre-established protocols. However, for accidental causes, the employee might lose or corrupt some data beyond recovery that might have been very important.
Hobbyist or Amateurs
These attackers usually don’t have malicious intent but can often still cause harm. These attacks typically include pranks, people wanting to gain fame, learning or just for recreational purposes. These are usually not very harmful, and the attackers have limited experience and resources.