What is Cyber ​​Security | Why is Cyber Security Important

Hello friends, all of you are familiar with the term Cyber Security. Today we will know in detail about Cyber Security, in this article. In this article, Let’s discuss, What is Cyber ​​SecurityWhy is Cyber ​​Security important. And discuss How many types of Cyber ​​Attacks are there and How to Protect Yourself from Cyber ​​Attacks.

What is Cyber ​​Security and  Why is Cyber Security Important

What is Cyber ​​Security?

Cyber Securityis the practice of protecting computers, servers, mobile devices, electronic systems, networks, and information from malicious attacks. It is also known as information technology security or electronic data security. This term applies to a wide range of situations, from business to laptop, and can be divided into a few general categories. Network security is the practice of detecting computer networks from intruders, whether targeted attackers or malicious malware.
A risk-based Security report revealed that shocking 7.9 billion records were exposed to data breaches in the first nine months of 2019 alone. This figure is more than double (112%) the number of records disclosed during the same period in 2018. Medical services, retailers, and community structures have experienced serious violations, with vicious criminals targeting multiple incidents.

Why is Cyber ​​Security important?

In today’s the connected world, everyone benefits from advanced cybersecurity tools, cybersecurity programs. On a personal level, a cybersecurity attack can result in the loss of important data for family photos, from identity theft to extortion attempts. Everyone relies on critical infrastructures such as power plants, hospitals, and financial services companies. Securing these and other organizations is essential to keep our society functioning.

How many types of Cyber Attacks are there?

There are many types of Cyber ​​Security attacks. This includes malware, phishing attacks, denial-of-service (DoS), human-in-the-middle (MITM), etc. to hack systems, demanding money in the form of cryptocurrency, or selling data on the Dark Web.

“If you want to know more about Dark Web than Click Here How to Avoid the Dark Web.


This is the most common method of online attacks using by hackers. In phishing, the attacker presents itself as a trusted source and sends a malicious email that at first glance seems legitimate. The reason behind sending such genuine-looking emails is to hack the hacker name, password, credit card, and other banking details.

An example of a common phishing attack could be an email about the expiration of your social media account password. The email is likely to contain a link that seems legitimate at first, but if you look carefully, you may notice some manipulation of its spelling.


Smishingis a method of executing a phishing attack which is usually done via an SMS. Usually, SMS claims that the user has won a lottery, and to receive it, the user has to provide his details. If you click on such a link, the website (which may also look legitimate) can steal your personal information without your consent. You must read such emails carefully and avoid clicking suspicious URLs.


It is malicious software, as the name suggests is software that uses a payload to gain access to the victim’s data. This software installs a program that contains many types of malware such as Ransomware, spyware, Trojans, worms, etc., designed to damage a system or network or to delete and hijack system data.


Ransomwareis the most common malware using to steal data. Once the malware installs into the system, it hunts for sensitive information and encrypts it. Then a pop-up message on the system asks for a ransom.
If the victim refuses to pay the ransom, hackers often threaten to delete the data or sell it online. Subsequently, if he gives the amount demanded, the victim is likely to have access to their data again. Although there is no guarantee that the hacker will give back your data or delete them from your system.

Denial of Service (DoS)

DoS attack is a brute force attack that aims to reduce the traffic of a system or website and make it offline. Attackers can flood a system or website with excessive traffic or send altered information triggering a crash, making it out of reach for the rest.

In computer networks, attackers in computer networks can use a distributed DoS (DDoS) name of a DoS attack. Like DoS, DDoS saturates bandwidth with excessive traffic from multiple systems connected to the main server, thus clogging the network and then bringing it down. The goal of such an attack is to ensure that the traffic of the victim network or website is reduced or used to target the rest of the network.

Man-in-the-Middle (MITM)

In this, the attacker reveals communication between the two parties. These parties can be between two users or one user and one application or one system. The attacker presents itself as one of two entities, making it appear that both legitimate parties are communicating with each other.

The attacker tracks the communication between the two (as if they are sitting in the middle), thus making access to all the information shared between the two parties. The goal of such attacks is to obtain personal and sensitive information from the victim. Which usually includes banking and finance-related information.

To avoid such attacks, make sure that you are connecting to a secure internet connection. Go to the website with HTTPS protocol which uses different encryption levels to avoid any spoofing attacks.

SQL Injection and Cross-Site Scripting (XSS)

In a SQL injection attack, the hacker attacks the database of a vulnerable website to obtain sensitive information. The attacker uses malicious code to target the SQL vulnerabilities of any database. Thus gaining access to all data stored in the database for successful implementation.

In the case of an XSS attack, the attacker targets a web application that delivers malicious code to a web browser. The web browser acts as a bridge to execution. And the code is injected only when the user visits the website containing the attack. During such attacks, sensitive information that enters the user’s website can be hijack without the knowledge of any website or users.

How to Protect Yourself from Cyber ​​Attacks?

1. Do not share your sensitive information such as email id, password, credit card details, etc. on forums or websites.

2. Make sure that your password is hard and not something that can be easily guessed. For example, avoid using a common password such as date of birth, your name, or 12345 for the required account. Use different character and number combinations instead.

3. Before clicking on the link, make sure the website is valid. Check for any spelling mistakes in the message or in the URL.

4. Use reliable anti-virus software to scan your system frequently.

5. Do not open or reply to spam messages and emails.

6. Avoid using open Wi-Fi. These networks are not secure, so hackers can easily inject a malicious code to gain access to your data.

7. Use a virtual private network (VPN) that creates a secure tunnel between you and the website.

I hope you understand, What is Cyber ​​Security, Why is Cyber ​​Security important. And understood How many types of Cyber ​​Attacks are there and How to Protect Yourself from Cyber ​​Attacks.

2 thoughts on “What is Cyber ​​Security | Why is Cyber Security Important”

Leave a Comment