ABSTRACT:In thing about the ‘cyber security’ whenever

ABSTRACT:In today’s growing word cyber security is very necessary because,As technology provides many facility to us it also some effects like security threats and cyber attacks.To protect the data from hanker and the cyber attacks we will require the cyber security. Cyber security  is a process  to save the networks, computer programs and data from the illegal access or users that aim to access users data for personal uses and benefits.For protection of data many organizations develop a softwares. These software help to protect the data and information.Cyber security playing a big role in developing a technology and other services like internet.we only thing about the ‘cyber security’ whenever we  listen about the cyber crimes.This paper describe the cyber security ,cyber attack,types of cyber attacks, and major area in cyber security.INTRODUCTION:-Cyber combine form relating to information,the internet and virtual reality.cyber security is necessary since it helps in securing data from threats such as data theft or misuse,also safeguard your system from virus. The term cyber security is used to refer to the security offered through online services to protect your online information.with an increasing amount of people getting connect to internet,the security threats that cause massive harm are increasing also.In india we went straight from no telephones to the latest in mobile technology says Cherian samuel of the Institute for Defence studies and Analysis,(IDSA)in new delhi and the same with internet connected computers Cyber security was designed to help learners develop a deeper understanding of modern information and system protection technology and methods.In information technology data protection or information security is one of the great challenges for the world.Cyber crime has  led to the loss of billions of dollars,malfunctioning of computer system,the destruction of critical information, the compromising of network integrity and confidentiality,etc. Cyber crime:-cyber crime, or computer oriented crime, is crime that involves a computer and a network.cyber crime also called computer crime,is any illegal activity that involves a computer or network connected device, such  as a mobile phone.The Department of justice divides cybercrime into three categories:crimes in which the computing device is the target,for example to gain network access;crimes in which the computer is used as a weapon,for example to launch a denial of service (DoS) attack; and crimes in which the computer is used as an accessory to a crime,for example,using a computer to store illegally-obtained data. DOWNLOAD THMajor areas of cyber security1) Application Security2) Information Security3) Disaster recovery4) Network SecurityApplication security:-                             Application security is hold within measures that are taken in the development of the  life cycle to prevent the applications from threats and attacks that come in the application design developments and maintenance.Some basic ways used in application security are:-a)Input parameter validation, b)User/Role Authentication & Authorization, c) Session management, parameter manipulation & exception management.  d) Auditing and logging.Information security:-                  Information security protects information from unauthorized access to avoid identity theft and to protect privacy. Major techniques used to prevent this are:- a) Identification, authentication & authorization of user.b) Cryptography.Disaster recovery:-                 Disaster recovery is a process that includes performing risk assessment, establishing priorities, developing recovery strategies in case of a disaster. all business should have a concrete plan for disaster recovery to resume normal business operations as soon as possible after the disaster.Network security:-                   Network security includes the activities to protect the usability, reliability, integrity and safety of the network. The effective network security targets a variety of threats and stops them from entering or spreading on the network. Network security components are:-a) Anti-virus and anti-spyware, b)Firewall, to block unauthorized access to your network.c)Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacksd) Virtual Private Networks (VPNs), to provide secure remote access.Cyber attacks:-A cyberattack is carefully exploitation of computer systems, technology-dependent enterprises and networks. Cyberattacks use malicious code to alter computer code, logic or data, resulting in disturbing consequences that can compromise data and lead to cyber crimes, such as information and identity theft.Cyber Attack is also known as a computer network attack (CNA).Types of attacks in cyber securityIdentity theft.Malware.spyware.phishing, spamming, spoofing, Trojans and virusesStolen hardware, such as laptops or mobile devices.Denial-of-service(DOS).Password sniffingSystem infiltrationWebsite defacementInstant messaging abuseIntellectual property (IP) theft or unauthorized accessIdentity theft:-                     Identity theft is the act of a person obtaining information illegally about someone else. Thieves and hackers try to find such information as full name, maiden name, address, date of birth, social security number, passwords, phone number, email, and credit card numbers. When  thief  stole your personal information then use this information for different purpose like financial fraud, such as credit card fraud, bank fraud, tax rebate fraud.They can use your information for other crimes like  entering  a country illegally, trafficking drugs, smuggling etc.PREVENTION FROM IDENTITY THEFT1.When you are  entering any personal information on the Internet and server, make sure that connection is secure.2.whenever you are purchasing anything from internet,do not store your credit card number and personal information on that site.3.A good antivirus is always active in your system.4.Be aware from the fake sites and services.  Malware:-             Malware is a combination of mal and ware from the (malicious and software)Malware is a term used for variety of threats such as   Trojans, viruses and worms. Malware is simply defined as code with malicious intent that typically steals data or destroys something from the computer.Malware is mostly entered into the system through email attachments, software downloads from internet.Types of malwareVirusSpywareWormTrojan horseBrowser hijacker etcVirus:-      Infects program files and/or personal filesSpyware:-        Software that collects personal informationWorm:-      Malware that can replicate itself across a networkTrojan horse:-                  Malware that looks, and may even operate, as a legitimate programBrowser hijacker:-              Software that modifies your web browser           spyware:-