hello everyone this is george from invensis learning welcome to our youtube channel [Music] i am sure you guys might have heard of cyber security in today's session we are going to have a brief tutorial about cyber security threats so without any further delay let's get started we will begin this session by discussing a little about what are cyber security threats next we will move further on to the types of cybersecurity threats and finally we will end this session by discussing the ways to prevent cybersecurity threats i hope the agenda is clear to you guys we
will now begin the presentation and understand what are cyber security threats today almost 59 of the global population is using the internet on one or the other electronic devices this makes it even more important for electronic devices to be safe and secure hackers have started coming up with ways to gain unauthorized access and conduct cyber attacks cyber security is the set of practices used to protect computers computer servers mobile devices various electronic systems communications and computer networks and data from malicious attacks and threats it is also known as information technology security or electronic information security
a cyber threat is an offensive action taken by a hacker or unauthorized individual or a group of individuals these malicious attacks and threats are called cyber attacks or cyber threats they target computer systems i.t infrastructure computer networks mobile devices and other computer devices they use different methods to break into steal damage or alter crucial data and information let us now look in detail at the types of cyber security threats the first type of cyber attack is called fishing phishing is one of the most used types of cyber attacks the attackers by this method try to
get access to personal information like login credentials debit or credit card details by pretending themselves as concerned confident authorities phishing is executed mainly through emails messaging and phone calls the next type of cyber attack is called the ransomware in a ransomware attack the user is compelled to remove all of their data and information from their system if they fail to meet the timeline and paying a ransom declared by cyber criminals in spite of all this there is no guarantee as to whether paying the ransom would secure their data or not let us now look into
a recent 2017 ransomware attack called wannacry in the wannacry attack the hackers would send a malicious email to make victims click on an attachment or visit a website the ransomware uses the flaws in the windows operating system to force it to run the ransomware code in the system the ransomware then encrypts or locks all the important files in the system and demands a ransom in the bitcoin cryptocurrency the wannacry ransomware uses the operating system flaw to replicate itself and spread around the computer network the hackers however made a mistake a kill switch was discovered by
another hacker which helped in overcoming this attack microsoft also released a patch update both these measures help the users to regain access to their documents the next type of cyber attack is called malware malware short form for malicious software is a code or file created by hackers to be delivered over a computer network it is used to infect steel or to gain control over a system or network to gain an authorized access in a malware cyber attack the hackers create a malware code to hack any electronic or digital device these devices can be mobiles computers
and laptops to obtain unauthorized access to sensitive information it takes critical expertise to create the malware code and is extremely dangerous for the users who are prone to such attacks malware is an intrusive software used to cause damage to computers and computer systems now we are now going to discuss the man in the middle attack a man in the middle cyber attack or mitten attack occurs when the hacker places himself in between the client and the owner or between users and the server or between clients and server to misinform the client and get unauthorized access
to data and information from the system in this attack the hacker breaks the communication link between the user and the server all data and information transfer of both the user and the server goes through the hacker this gives the hacker unsolicited access to complete information of the whole system this gives the hacker complete control over the whole system the data involved and the processes involved in it we will now discuss the next type of cyber attack called as the trojan horse a trojan horse or a trojan is a malware program designed by hackers to break
into electronic and digital devices by disguising the program with the necessary software this type of cyber attack is quite dangerous as it helps the hackers to have unauthorized access to crucial information of users such as their credentials and financial details the next type of cyber attack is called as the sequel injection sql injection is the latest type of cyber attacks being launched by hackers this includes incorporating malicious data into users digital device to enable the hacker to give unauthorized access to all the crucial and confidential information belonging to the user sql injection is a cyber
attack that allows a hacker to interfere with the sql queries that an application incorporates into its database it gives hacker access to view data that is not normally allowed to retrieve we will now see and understand what dos and ddos cyber attacks are in a client server communication system there are three level handshakes before the data from the server is transferred to the client system the first handshake is the client's request to the server to load the webpage or any result or any content the second handshake is where the server approves the client's request gets
ready to load and asks the client device when to load in the third handshake the first device acknowledges and the server loads the request error 404 reflects when a web page doesn't load the website is down or there's a lot of traffic on the website it is detrimental to the profits of the organization this happens when the number of users on the website on that page exceeds the limit the website can handle once it exceeds the page is down and the users get this error what happens if someone fakes the number of users currently using
the website and the website gets down intentionally this is precisely what the dos and ddos attacks are the dos attack stands for denial of service attack ddos stands for distributed denial of service attack in a dos attack the fake requests are made by the same device to overwhelm the website causing it to crash in a ddos attack a big network of devices creates a large number of fake requests and together requests the server at the same time in a ddos attack big network devices created by the hacker are called botnets the botnets create a large
number of requests and together all request the server at the same time one botnet creates one or two requests in both the attacks the hacker fakes the number of users currently on the website once this number exceeds the limit the website cannot handle this anymore and it crashes down this crashing is done intentionally by the hacker so that it affects the owners of the website we will now see spear fishing and whale fishing in a spear phishing attack a hacker tries to gain unauthorized access to confidential information by conducting fraudulent emails or phone calls in
a whale phishing attack a hacker tries to access confidential and sensitive information of powerful and famous personalities like the chairman and head of organizations let us now discuss drive-by cyber attacks in a drive-by attack hackers embed malicious scripts into various websites whenever a user tries to visit the website all the user data is accessible to the hacker because of these malicious scripts the system gets corrupted giving unauthorized access to data and information to the hacker the next type of cyber attack is called the spyware hackers use cyberattacks called spyware which is unwanted software to infiltrate
into a victim's computer in order to have access to their sensitive information and internet usage data it is a type of malware that uses malicious software to gain access and damage a computer without the knowledge of the user there are again four types or categories of spyware commonly called as one adware two keyboard loggers three trojans four mobile spyware the next type of cyber attack is called the adware the cyber tax where hackers use various pop-up advertisements to show up on a computer or mobile device are called adware short for advertising software the adware can
become dangerous by harming your device hacking into your browser slowing down the device and install viruses or spyware or both the next type of cyber attack is called the eavesdropping attacks when hackers launch a cyber attack by hacking into cell phones computers and laptops by fabricating information in those devices it is called an eavesdropping attack this attack is conducted to gain unauthorized access to files by cyber criminals the next type of cyber attack is called the password attacks a password attack involves continuous attempts by a hacker to obtain the login credentials of a victim or
user many hackers use different algorithms or simply make calculated guesses to obtain the password in the shortest time possible we will now discuss the most crucial part of today's discussion basic practices and methods to avoid cyber attacks best practices and methods to avoid cyber attacks include the steps and methodologies involved to keep oneself and any organization on the whole safe and secure both internally and from any external threats be it cyber attacks or any viruses or computer worms etc these practices and methods help in a smooth and safe operating environment and include keep your user
data private check your privacy settings update your antivirus use strong passwords scan emails before opening check website url log out as in when required respect others let us now look into each of these in detail data privacy having user data privacy is the first step against cyber threats always make sure that you keep your data private so that it reduces the chances of data leakage in the advent of a cyber attack strong password strong password reduces the chances of cyber attack having a strong password is of utmost importance since hackers first target the user credentials
in order to gain unauthorized access antivirus antivirus protects against computer viruses malwares and other self-replicating software programs that hinder performance.having a reliable and strong antivirus helps against any malicious software viruses and computer worms and other programs developed in order to deliver a cyber attack scan emails scanning emails before opening them prevents any dangerous email embedded cyber threats from harming the user dot it is highly recommended to scan your emails before opening them this helps in a way to avoid the chances of various email hacking attacks usually used by hackers privacy settings check your privacy settings
as a first line of defense against any possible cyber attack or threat maintaining strong privacy settings for all your work be it on mobile devices or laptops or computers act as the first line of defense against hackers website url cross-checking the website url is very important to avoid opening any malicious website a website that starts with https is far more secure than the ones that start with http the additional protection provided always counts in the advent of any cyber attack log out log out of your system every time to avoid prying eyes every time you
complete your work and don't intend to use the system log out of the system this is a preemptive measure as it avoids prying eyes from breaking into your account respect others respect other system users and their privacy having respect for others privacy and confidentiality is crucial especially that more and more people are connected to the internet this is important in every regard [Music]