Posts

Showing posts from December, 2023

Article 5: What is Ransomware?

Image
  Ransomware Ransomware is a type of cryptovirological malware that permanently block access to the victim's personal device or data unless a ransom is paid. Meanings: Ransom:  A sum of money demanded or paid  for the release of  a captive. Ware:   A application or software for a computer. Ransomware Attack Ransomware Attack is the process of encrypting ones personal files found on his personal device and demaning a ransom payment for the decryption key. Cyberattackers usually place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files. Types of Ransomware Most common three types of ransomware are as follows: Crypto Ransomware or Encryptors:  Encryptors are one of the most well known and damaging variants. This type encrypts the files and data on their personal device within a system, making their data inaccessible without a decryption key. Lockers:   Lockers completely lock you out of your system, so your files and ap

Article 4: What is Cyber-Security?

Image
 Cyber-Security Cyber-Security is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or removing important information; extorting money from users via ransomware; or interrupting normal business processes. Types of Cyber-Security The five types of Cyber-Security are as follows: Application Security Network Security Cloud Security Critical Infrastructure Security IoT (Internet of Things) Security 1. Application Security Application Security is the process of devloping, adding, testing security features within applications to prevent security vulnearabilities against ransomware or threats such as unauthorized access and modification. 2. Network Security Network Security is the protecting of the underlying networking infrasrtucture from unauthorized access, misuse, or theft. It involves creating a secure infrastructure for devices, applications, and users to work in a secure manner. 3. Cloud Securit