Cyber sécurité
Résumé : Cyber sécurité. Recherche parmi 300 000+ dissertationsPar Pavel B • 14 Décembre 2022 • Résumé • 339 Mots (2 Pages) • 217 Vues
Cybersecurity is the art of protecting networks, devices and data from unauthorized access.
One of the best methods of protection is data encryption. With encryption, data is encrypted
via a unique key needed to access the data. With strong protection, cybersecurity allows you
to have control over who has access to your data, while keeping it clean and confidential to
prevent any action aimed at accessing, stealing or corrupting your data.
A cyber attack is any malicious act which harms IT systems for economic or political
reasons.
They represent a threat for us the consumers, but mainly the organizations and
companies.
The main goal for hackers is to claim money in exchange for the stolen data.
We will see an old and a recent example of a cyberattack.
The Morris Worm is considered to be the first of its kind and is very famous for having made
many systems unusable on the Internet at that time. Its creator, R.T Morris didn’t expect that
his experiment would cause such an effect. He was judged and sentenced to 3 years of
probation, 400 hours of compensatory work and 10 thousand dollars.
More recently RockstarGames known for "Gta" games have been attacked. Gta games is
the second most sold games in history. Videos and images of the next game were
unfortunately leaked by the hacker group "Lapsus$ ".
Lapsus$ group uses social engineering to steal information from the company they target.
Social engineering is the use of deception to manipulate individuals into divulging
confidential or personal information that may be used for fraudulent purposes.
For example, this hacker group was able to retrieve microsoft customers passwords. To do
this, they called the support services pretending to have forgotten their password to reset a
new one.
They also used social networks to enroll employees from companies to leak information.
Lapsus$ also developed an nvidia certificate signing tool. Using these signatures on their
viruses, they will be spoofed so the anti-virus won’t detect them.
The best way to combat "social engineering" is to educate employees and personal user in
general about the risk of this type of social attack.
VPN means Virtual Private Network
It is a tool that allows the users to rema
...