wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Security Threats Faced and Countermeasures adopted by Organizations to avoid them

profile
44_Rohit Sharma
Oct 20, 2021
2 Likes
1 Discussions
99 Reads

Cyber civilization has become an important source of information exchange and professional activities such as business, banking, shopping, services and advertising. With the exponential increase in the use of cyberspace, the activities of cybercriminals are also increasing exponentially.

Due to this high dependency on the Internet, there are major issues related to Internet or Cybersecurity. Following are the common security threats that are faced.

    • BotNet
    • Cyptojacking
    • Ransomware
    • Worms
    • Phishing
    • Ddos Attack.
    • Advanced Persistent Threats

Cyber-attacks can happen for multiple reasons, some of the reason are:-

    • The hacker just wants to gain some fame or wants to satisfy self-ego.
    • The hacker ants to make quick money.
    • Hacker wants to damage the organization or the government.

Cyber-attacks can be countered with following methods.

    • Encryption
    • Data Loss Prevention.
    • Access Management.
    • Firewalls
    • Antivirus and Malware solutions.
    • Risk and Compliance Management.

According to my understanding, whatever the technology is, even though we follow any security protocols or whatever we try to make the network to 100% secured, someone will always find a way to bypass the security and infiltrate the environment. We if someone manage to make the network 100% secured, someone can just use social engineering skills to make the employee of the organizations give up the data, either by blackmailing them or offering huge amount of money.


Comments ()


Sign in

Read Next

File and File System Structure

Blog banner

OS Assignment 3 Deadlock

Blog banner

RAID

Blog banner

ODOO

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

OPERATING SYSTEM

Blog banner

VIRTUAL MEMORY

Blog banner

Operating system

Blog banner

SQL Injection Techniques

Blog banner

Deadlock and starvation in operating system

Blog banner

FILE SHARING

Blog banner

I/O Buffering

Blog banner

internet email and it's applications

Blog banner

Indian Culture and Tradition

Blog banner

Vulnerabilities in OnePlus Devices

Blog banner

Street foods

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

A Happier Workplace Starts with Healthy Lunches by Meal Maharaj

Blog banner

Jio .....A Revolution ?? ??

Blog banner

PHONE TECHNOLOGY

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

INTRODUCTION TO C#

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Threads

Blog banner

Power of words

Blog banner

Service Strategy principles

Blog banner

The Secure Software Development Life Cycle (SDLC)

Blog banner

IP ADDRESS

Blog banner

MEMORY MANAGEMENT REQUIREMENT

Blog banner

Real time scheduling

Blog banner

Digital black market or dark net poses a national security threat?

Blog banner

Decoding the Weave — How to Identify Original Patola Art on a Fabric

Blog banner

E-security systems | CCTV

Blog banner

The Difference Between Plaque and Tartar Explained Simply

Blog banner

CRISP-DM Methodology

Blog banner

Discover The Top 3 Places To Stay in London

Blog banner

Financial Fraud Detection

Blog banner

Operating System Objectives and Functions

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Oracle Corporation

Blog banner

Broken Authentication Attacks

Blog banner

Data Warehousing

Blog banner