CYBER:
Cyber is the relation between internet and information. It can be related to all aspects of computing, including storing data, protecting data, accessing data, processing data, transforming data, linking data etc.
Cyber Attack:
A vulnerability is a weakness in design implementation, operation, or internal control. Most of the vulnerabilities that have been discovered are documented in the Common Vulnerabilities and Exposures database.
Backdoor: A Backdoor in a computer system, a cryptosystem or an algorithm, is any secret method of bypassing normal authentication or security controls. They may exist for many reasons, including by original design or from poor configuration. They may have been added by an authorized party to allow some legitimate access, or by an attacker for malicious reasons; but regardless of the motives for their existence, they create a vulnerability. Backdoors can be very hard to detect, and detection of backdoors are usually discovered by someone who has access to application source code or intimate knowledge of Operating System of the computer.
Denial of Service Attack: Denial of Service Attack(DoS) are designed to make a machine or network resource unavailable to its intended users. Attackers can deny service to individual victims, such as by deliberately entering a wrong password enough consecutive times to cause the victim’s account to be locked, or they may overload the capabilities of a machine or network and block all users at once. While a network attack from a single IP Address can be blocked by adding a new firewall rule, many forms of Distributive Denial of Service (DDoS) attacks are possible, where the attack comes from a large number of points – and defending is much more difficult.
Phishing: Phishing is a process to track sensitive information such as username, password and credit card detail directly from users by deceiving the users. Phishing attacks are mainly happened by suspicious email and redirect users to a fake website whose look and feel are almost same to a legitimate one. Attackers are using creative ways to gain access to real accounts. A common scam is for attackers to send fake electronic invoices to individuals showing that they recently purchased music, apps, or other, and instructing them to click on a link if the purchases were not authorized.
Spoofing: Spoofing is a act of masquerading as a valid entity through falsification of. Data, in order to gain access to information or resources. That one. Is otherwise unauthorised to obtained.
Email Spoofing, where an attacker forges the sending (From, or source) address of an email.
IP Address Spoofing, where an attacker alters the source IP address in a network packet to hide their identity or impersonate another computing system.
MAC Spoofing, where an attacker modifies the Media Access Control (MAC) Address of their network interface to obscure their identity, or to pose as another.
Biometric spoofing, where an attacker produces a fake biometric sample to pose as another user.
Malware: Malicious software (malware) installed on a computer can leak personal information, can give control of the system to the attacker and can delete data permanently.