Cybersecurity is the protection of computer systems, data and networks from unauthorized access with the aim ensuring confidentiality, integrity and availability of information
Cybersecurity Fundamentals(CIA triad):
Confidentiality: This is the protection of sensitive information from unauthorized access.
Integrity: This is the assurance that sensitive information/ data remains accurate, unaltered and trustworthy throughout its lifecycle.
Availability: This is ensuring that information can be easily accessed by authorized users only
A cybersecurity attack is a deliberate compromise of a computer system, data or networks with the sole aim of stealing information, disrupting normal operation or to cause damage
Types of Cyberattack:
web based attack
system based attack
Injection Attack
An attack where data or a malicious code is injected into a computer system or network to compromise or manipulate its functionality or to steal information
Dictionary attack
An attack where an attacker gets a list (dictionary) of password and keeps on trying until the right password
Man-in-the-middle
An attack where a third party intervenes a communication between two parties without their knowledge to steal information, often to eavesdrop, or to inject malicious content
Phishing
An attack where attackers impersonate trustworthy entities with the purpose of tricking users into providing sensitive information
Protocol attacks
Attacks that exploit the vulnerabilities in the protocols used in a network or computer system
Session Hijacking
An attack where an attacker takes over an active session between a user and a computer system or network
Brute force
An attack where attackers try to gain unauthorized access by trying to guess encrypted keys, password or personal identification number until it is found
DNS spoofing
A cyberattack whereby the Domain Name System is manipulated to a different IP address thereby leading the user to a malicious site which makes their system vulnerable to attackers
Web-Based Attack
An attack that takes place over the internet
URL interpretation
A type of attack where the URL is manipulated to gain unauthorized access or steal information
File inclusion attack
An attack where an attacker makes use of the vulnerabilities that are in a web application with the sole purpose of planting malicious file or script
Denial-of-Service
An attack where the normal functioning of a network or computer system is disrupted by overwhelming it with traffic or requests