Cyber Secuirity
It is a practice of defending computers, mobile devices,networks and data from malicious attacks. It can be divided into the few common categories.
- Vulnerability : They are defects that would be identify when using software. We can divide into few categories.
i). Buffer Overflow : It can be doing by storing more data in Hardware. Then that device not working correctly.
ii). Non-Validate Input : Software might be have positions without checking Data.(where to come, what to come). If Anyone know that SQL Database have this Vulnerability, then he can be change data.
iii). Race Condition : Some programmers can code like cow boy coding. Then he don’t know format, time, where to code. Then someone can log and change data. Then always we want to code orderly, according to format and handle event-log.
iv). Weaknesses in Security Practice : Some system do’t have security method system, then someone can change data. Thus, When any user change the password or something, system should have security method system to identify correct user.
v). Access-Control Problems : That is main, Because if someone detect bug they can access system as identify user. Then System should have method for dividing permission user or not permission users.
2. Malware : Hacker is developed the softwares after identify these vulnerabilities. That softwares call Malwares. It can be steal data, bypass, access control and like harmful works.
i). Spyware : It can install OS, after it can track what to do.
ii).Adware : It can be change homepage of Browser.
iii). Bot : If it install OS, then Hacker can be active. After Hacker can be control our Computer.
iv). Ransomeware : It can be encrypted data.
v). Scareware : It can be distract user. (like Blind Display, Open CD Rom)
vi). Rootkit : It can be get Admistrator permission, Then hacker can modify registry file to make backdoors.
vii). Worm : It can be expand all of the computer in network.