Cyber security also known as computer security is a field of study which deals in protecting of computer systems from either damage or theft. The damage or theft could be either in the form of its hardware or software or may even include loss of electronic data. The field is beginning to grow in terms of its importance because of the boom of Internet and other technologies like wireless networks(which include Bluetooth and WI-FI) and smart devices. Cybersecurity can be defined in a better way as the act or practice of protecting computers,networks and programs from digital attacks. These so called attacks are usually aimed at accessing,changing or destroying sensitive information,stealing money from users; or interrupting a process. These attacks are performed by a hackers known as Black hat hackers. A Black hat hacker is usually a person who commits a crime by illegally breaking into systems and compromising their security. These hackers are often countered by ethical hackers known as white hat hackers. The are also known as penetration testers. They are like an army that fight against cyber crime and their aim is to prevent cyber crime from happening. There is a third category of hackers known as grey hat hackers-They are usually hackers that conduct black hat hacks for white hat hacker reasons.
The helplessness of a person’s interaction with information systems can be easily exploited to launch a cyber attack. A better understanding of the elements of cyber security will make us aware of the loopholes which we have in our system and help us from preventing a malicious attack.
Application Security: Application security starts with the steps taken through an information application. A hacker first sees loopholes in the security protocols and policies of an application and then figures out a way to penetrate the application in-turn hacking into a user’s computer/device.
Take for instance you have an app in your phone which is allowed to read text messages and make phone calls. If the app isn’t protected enough a hacker can easily get into the app and misuse the app and use the app inappropriately. Things could get worse as he is able to read the message on your phone using the app as a medium and could potentially give a threat to you.
The method to tackle threats to application security is to have knowledge about potential threats and improving the security of an application, network or host and embedding security within the software development process.
In context to application security, an asset refers to a resource of value like information within a database or in the file system or system resource. The main challenge over here is to spot the vulnerabilities within the parent system which when becomes exposed to a cyber hacker can be misused or exploited. The risk can be mitigated or in other terms be prevented by weaving the security within the application.
The common application threats and attack types are mentioned below.
i) Input validation related like buffer overflow, cross site coding, ,canonicalization ,structured query language injection
Although it may seem that canonicalization isn’t that big a threat,we have to be aware that canonicalization attacks may consequencially lead to loss of confidentiality,integrity and denial of service results if in case the files are deleted by the hacker
ii) Authentication related like brute force assault, network eavesdropping, replaying cookies, dictionary assaults, stealing credentials etc.
Disclaimer: This essay has been submitted by a student. This is not an example of the work written by our professional essay writers. You can order our professional work here.
Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.
Your essay sample has been sent.
Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.Order now