Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary About cybersecurity

Beoordeling
-
Verkocht
-
Pagina's
2
Geüpload op
04-02-2024
Geschreven in
2023/2024

What is cybersecurity

Instelling
Vak

Voorbeeld van de inhoud

Meet Anne. She often shops from WWJ Pink Art. She has her information like email ID,
address, and credit card details saved on the website to enable a faster and hassle-free
shopping experience. The required information is stored on a server. One day, she received
an email which stated her eligibility for a special discount voucher from Shopping Cart. In
order to receive the coupon code, she was asked to fill in her Shopping Cart account
credentials. This didn't seem fishy to her at the time as she thought it was just an account
verification step. Little did she realize the danger she would be facing. She was knocked off
her feet when a substantial amount of money was wiped off her account. How do you think
this happened? Well, yes, the email she received was fake, and Shopping Cart account
witnessed unauthorized access from a third party. This type of attack is known as a cyber
attack, and the person who carries it out is called a hacker.

Cybersecurity involves techniques that help in securing various digital components,
networks, data, and computer systems from unauthorized digital access. There are multiple
ways to implement cybersecurity, depending on the kind of network you are connected to
and the type of cyber attacks you are prone to. So, let's take a look at the various cyber
attacks Anne could have been exposed to.

Types of Cyber Attacks
Malware attack
Phishing attack
Man-in-the-middle attack
Password attack
One of the most common types of cyber attacks is a malware attack. Like Trojan, adware,
and spyware, to name a few. If Anne had downloaded any suspicious attachments online,
her system could have gotten corrupted by certain malicious viruses embedded within the
attachments.

Next is a phishing attack. The type of cyber attack which Anne experienced. The hacker
usually sends fraudulent emails, which appear to be coming from a legitimate source. This is
done to install malware or to steal sensitive data like credit card information and login
credentials.

Another type of attack is man-in-the-middle attack. Here, the hacker gains access to the
information path between Anne's device and the website's server. The hacker's computer
takes over an IP address. By doing so, the communication line between Anne and the
website is secretly intercepted. This commonly happens with unsecured Wi-Fi networks and
also through malware.

Password attack is one of the easiest ways to hack a system. Here, Anne's password could
have been cracked by using either common passwords or trying all possible alphabetical
combinations.

To prevent future cyber attacks, Anne should implement a few cybersecurity practices. First,
she installed a firewall. Second, she implemented honey pots. In addition to these, she also
decided to use unique alphanumeric passwords, antivirus software, and started avoiding
mails from unknown senders.

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
4 februari 2024
Aantal pagina's
2
Geschreven in
2023/2024
Type
SAMENVATTING

Onderwerpen

$3.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
jjjjjj2

Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
jjjjjj2 Published
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
3
Laatst verkocht
-
Learn high

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen