Professional Documents
Culture Documents
Cyber Security
Cyber Security
Levels of Web
Surface web is only the
part that we can see or
access in our daily life.
Here sites ends
with .com, .net, .edu, .or
4% g etc
y
te
lit
g
a
rit
nti
Confidentiality measures are designed to y
de
nfi
protect against unauthorized disclosure of
Co
information.
Security
2. Hackers
In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
controls. They make malicious attempt, using digital
technologies, to cause personal or property loss or damage,
and/or steal or alter confidential personal or organizational
data
3. Malwares
The word "malware" comes from the term "MALicious
softWARE." Malware is any software that infects and
damages a computer system without the owner's
knowledge. They are software that we execute. It may hide
and run on background without your notice and transmit
your data over internet. Or even lock your computer and
with complex Hash encryption and demand for money.
It can also capture your key strokes and even access and
take photos, videos and screenshot from your device
Cyber Security Threats
5. Password Cracking
Password cracking is the process of recovering passwords
from data that has been stored in or transmitted by a
computer system. A common approach is to repeatedly try
guesses for the password and to check them against an
available cryptographic hash of the password.
Password cracking is done by specialized software and
algorithm.
2020 May 31