I'm here to tell you guys about how cyber security makes this all possible now before we begin let me brief you all about the topics that we are going to cover today so basically, we are going to ask three questions that are important to cyber security firstly

Why cyber security is needed?

What exactly is cyber security?

How cyber security can save a whole organization from organized cybercrime?


 okay so let's get started now as I just said we are living in a digital 

    whether it be booking a hotel room ordering some dinner or even booking a cab we are constantly using the Internet and inherently constantly generating data this data is generally stored on the cloud which is basically a huge data server or data center that you can access online also we use an array of devices to access this data now for a hacker.

     it's a golden age with so many access points public IP addresses and constant traffic and tons of data to exploit Blackhat hackers are having one hell of a time exploiting vulnerabilities

    and creating malicious software for the same above that cyber ducks are evolving by the day hackers are becoming smarter and more creative with their malware and how they bypass virus scans and firewalls still baffle many people let's go through some of the most common types of cyber-attacks now.


    so as you guys can see I've listed out eight cyberattacks that have plagued us since the beginning of the Internet let's go through them briefly so first on the list we have general 

Malware 

    malware is an all-encompassing term for a variety of cyber threats including Trojans viruses and bombs malware is simply defined as code with malicious intent that typically steals data or destroy something on the computer next on the list we are

 phishing often posing as a request for data from a trusted third party 

Phishing attacks

 are sent via email and asked users to click on a link and enter the personal data fleshing emails have gotten much more sophisticated in recent years making it difficult for some people to discern a legitimate request for information from a false one phishing emails often fall into the same category as spam but are more harmful than just a simple ad next on the list we have 

Password attacks

     a password attack is exactly what it sounds like a third party trying to gain access to your system by cracking a user's password next up is 

DDoS 

    which stands for distributed denial of service ad or staff focuses on disrupting the service of a network attackers sent high volumes of data or traffic through the network that is making a lot of connection requests until the network becomes overloaded and can no longer function next up we have

 Man-in-the-middle attacks

     by impersonating the endpoint in an online information exchange that is the connection from your smartphone to a website the MIT M attacks can obtain information from the end users and entity he or she is communicating with for example if you're banking online the man in the middle would communicate with you by impersonating your bank and communicate with the bank by impersonating you the man in the middle would then receive all the information transferred between both parties which could include sensitive data such as bank accounts and personal information next up we have 

Drive-by downloads

     through malware on a legitimate website a program is downloaded to a user system just by visiting the site it doesn't require any type of action by the user to download it actually next up we have mal advertising which is a way to compromise your computer with malicious code that is downloaded to your system when you click on an affected ad lastly we have

 Rogue software’s

     which are basically malware that are masquerading as legitimate and necessary security software that will keep your system safe