notes

INTERNET VULNERABLE

🔽A vulnerability is a weakness in an IT system that can be exploited by an attacker to deliver a successful attack. 

🔽They can occur through flaws, features or user error, and attackers will look to exploit any of them, often combining one or more, to achieve their end goal.


🔽The internet is vulnerable due to weaknesses, known as vulnerabilities, in hardware, software, and user behavior that cybercriminals can exploit to steal data or disrupt services.

🔽 Common vulnerabilities include unpatched systems, misconfigured network devices like routers, and weak passwords. 


HACKING

hacking is the act of exploiting vulnerabilities to gain unauthorized access to a computer system, network, or digital device for various purposes, including data theft, system disruption, or manipulation.



DATA THEFT

Data theft in cybersecurity is the unauthorized access and copying, transfer, or retention of sensitive personal, financial, or proprietary information from digital sources.


CYBER VANDALISM

Cyber vandalism is the intentional, unauthorized disruption, modification, or destruction of digital systems, data, or websites

CYBER FRAUD

Cyber fraud, or cybercrime, is the deceitful use of the internet or other digital technologies to illegally acquire money, personal information, or goods from individuals and organizationsdata



COOKIES

In cybersecurity, "cookies" refer to tiny data files websites store on your device to remember information like login details, preferences, and past activity. While cookies enhance user experience by personalizing visits, they pose significant cyber security risks including session hijacking, identity theft, and unauthorized access to sensitive data








Comments

Popular posts from this blog

E COMMERCE INTRODUCTION MODULE 1 NOTES

MODULE 3 BANKER & CUSTOMER Notes