Cyber Security
No such thing as a “unhackable” device exists. In general, cybersecurity can be described as ensuring that there is no unauthorized access to the network of an organization, to apps, to databases, and ultimately to all the information we want to keep safe and protected.
Cybersecurity is not about creating a “unhackable” framework. Cybersecurity is about reducing the risk of violation (confidentiality), modification (integrity), or interruption (availability) of a device without permission. Such three definitions-Confidentiality, integrity, and availability-make the foundation of every cyber security policy.
Quite frequently, the third principle (availability) is overlooked or ignored when designing a safe infrastructure. Although security and data integrity are essential, this data is worthless if it is not accessible to approved users. As I said above, protection means no unauthorized entry, which means no broken authentication by SQL injection (SQL queries), brute force (dictionary attack, normal credential), buffer overflow (pass any random data), social engineering (get exact credential), man-in-the-centre (stealing credential) and session management (use of cookies, session ID) that can lead to (sensitive) exp data.
The inadequate knowledge of computer users and system administrators on computer network architecture and the functioning of their protocols do not serve to advance network security. In reality, the risks are rising. In a mechanical universe where people grasp the devices, things are functioning differently.
The network architecture has limitations and this situation is complicated because both system managers and customers have little understanding of how the system operates, its weaknesses and when those weaknesses are present in the network.
Further Reading
COVID-19 Themed Malicious Cyber Activities Threat Update v1.0
Author
Prajakta Bhujang (19BCE10035)