Types Of Network Security

Types Of Network Security

Types Of Network Security


types of network security,types of cyber attacks,examples of cyber crimes,what is a cyber attack,types of cyber security


ARTIFICIAL INTELLIGENCE AND ITS USES:

     Artificial intelligence is on the peak and is on the way to make our lives better and it makes the use of algorithms to get the desired solution.


     The computer is a very useful machine and it is used in all the areas or field and the use of a computer is used in the daily world to make our lives better and the best use of this is to make the use of daily data to be stored and used in the useful form and the computer security and its threats is known to prove a  very important field to know and it is very important because all of our data is stored in the computer and it can be easily accessed or attacked and it will make the misuse of data if hacked.

types of network security,types of cyber attacks,examples of cyber crimes,what is a cyber attack,types of cyber security



SOURCES OF HACKING ATTACKS/types of attacks in network security :

     The most important thing is how these things are downloaded and what may be the sources of attack and it I very important to know and it will make the person a knowledgeable person. there are many known sources of attack in the computer that makes the person’s data vulnerable and makes the person a victim to the hacker and it is very well known that many people are unaware that how the data is hacked or steal ed so the sources of attack maybe


Downloadable programs
Cracked software's
Through Internet
Booting from unknown cd’s
Booting from unknown pen drives
E-mail attachments
Through malicious attachments
Through stenography methods

     what is the source of the attack in computer and how these attacks are performed are necessary to know how the cyber world is performing and the cybercriminals act of hacking and intruding into one's computer is necessary to know how all these things are performed to know the act of breaking into one's computer and this is necessary to know because this will make the person more knowledgeable and make the use of a computer to a higher level?

     There are many methods of hacking like stenography, sensor attacks, phishing, vishing, spear phishing, etc. These methods are done to make the person or victim infected by the attack and to steal the data and this method will make the person unaware that his or her data is being hacked and the data may be misused to hack the bank account or to make the person a criminal in the law.

     The data is hacked by certain methods and some are given below.

PHISHING:

     It is the act of making the person a victim by making him trapped in the attackers net and making use of the data of the person in the wrong way. In simple words to catch a fish, you put the net, the same is followed here.


types of network security,types of cyber attacks,examples of cyber crimes,what is a cyber attack,types of cyber security


VISHING:

     It is the act of making the person victim by making his data to be given in the telephone calls.

VIRUS:

     It infects the person's computer by attacking the files and encrypts them and does not give the person to access it and infects the computer.

TROJAN:

     It is also called as Trojan horse and it makes the person's computer unauthorized access and does not make the person's computer user access, it acts as a normal file but it is not a normal file and gives the computer a no access.

WORMS:

     Worms are a self-replicating structure to a person's computer and it spreads the computer to computer and makes the person's computer a damaged one.

HACKING:

     It is the method in which the person has the power or tools to access any data and misuses or uses it for a purpose.

ANTIVIRUS:

     It is the software that scans the person's computer for any malicious data but many virus or malicious data has the power to bypass the antivirus.

FIREWALL:

     It makes the person's computer secure from preventing the access to more data and makes the computer secure but it is also not very powerful nowadays. 


Post a Comment

0 Comments