wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security Threats Faced and Countermeasures adopted by Organizations to avoid them

profile
44_Rohit Sharma
Oct 20, 2021
2 Likes
1 Discussions
99 Reads

Cyber civilization has become an important source of information exchange and professional activities such as business, banking, shopping, services and advertising. With the exponential increase in the use of cyberspace, the activities of cybercriminals are also increasing exponentially.

Due to this high dependency on the Internet, there are major issues related to Internet or Cybersecurity. Following are the common security threats that are faced.

    • BotNet
    • Cyptojacking
    • Ransomware
    • Worms
    • Phishing
    • Ddos Attack.
    • Advanced Persistent Threats

Cyber-attacks can happen for multiple reasons, some of the reason are:-

    • The hacker just wants to gain some fame or wants to satisfy self-ego.
    • The hacker ants to make quick money.
    • Hacker wants to damage the organization or the government.

Cyber-attacks can be countered with following methods.

    • Encryption
    • Data Loss Prevention.
    • Access Management.
    • Firewalls
    • Antivirus and Malware solutions.
    • Risk and Compliance Management.

According to my understanding, whatever the technology is, even though we follow any security protocols or whatever we try to make the network to 100% secured, someone will always find a way to bypass the security and infiltrate the environment. We if someone manage to make the network 100% secured, someone can just use social engineering skills to make the employee of the organizations give up the data, either by blackmailing them or offering huge amount of money.


Comments ()


Sign in

Read Next

What is thread and multithreading ?

Blog banner

Theads

Blog banner

Ola

Blog banner

Race Condition in Operating Theatre

Blog banner

GIS REMOTE SENSING

Blog banner

Busted : Common Web Security Myths

Blog banner

De-Coding Love

Blog banner

Virtual Memory

Blog banner

Mesh Topology

Blog banner

The evolution of OS

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Financial Fraud Detection

Blog banner

Full Disk Encryption on Digital Forensics

Blog banner

Memory Management in Operating System

Blog banner

Zoho

Blog banner

Paging

Blog banner

(Input/Output) in os

Blog banner

Trends that began during the pandemic

Blog banner

What are Virtual Machines

Blog banner

CYBER FORENCIS: PAST, PRESENT AND FUTURE.

Blog banner

Firewall / IDS Evasion Techniques

Blog banner

Assignment 2

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

Yoga in INDIA and ABROAD

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

Security issues

Blog banner

FILE SHARING

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner

Jira service Management

Blog banner

OS Assignment 3 Deadlock

Blog banner

Evolution of Operating System

Blog banner

Data Analytics in Data Science

Blog banner

Telegram and it's features

Blog banner

Service Design Principles

Blog banner

Multiprocessor

Blog banner

Virtual memory

Blog banner

Cache Memory

Blog banner

What is Email? Uses of Emails

Blog banner

IO Buffers

Blog banner