Cyber Security and Cyber Attacks are talk of the town these days. We hear and read in the newspapers daily regarding cyber-attacks on websites and loss of millions. Today we will answer top questions on cyber security and how we can secure ourselves from such attacks.

Let’s take an example of a person who often shops from an online store. His information like email ID, address and credit card details are saved on the website to enable a faster and hassle-free shopping experience. This required information is stored in a server. One day he receives an email which stated his eligibility for special discount voucher from the shopping store. And in order to receive the coupon code, he was asked to fill in his shopping store account credentials.

This didn’t seem fishy to him at that time. As he thought it was just an account verification step. Little did he realized the danger he would be facing. He was knocked off his feet when a substantial amount of money was wiped off his account. How do you think this happened? Well yes! The email he received was fake. Shopping store account witnessed unauthorized access from a third party. This was a cyber-attack, carried out by a hacker.


Could he have prevented this attack? Indeed, he could have with the help of cyber security. There are techniques that help in securing various digital components networks data and computer systems from unauthorized digital access. There are several ways for the Cyber security implementation. It commonly depends upon the type of the network connection . The type of cyber-attacks you are prone to.


So, let’s take a look at the various cyber-attacks that one could be exposed to.


One of the most common types of cyber-attacks is a malware attack like Trojan adware and spyware to name a few. If you download any suspicious attachments. Your system could have gotten corrupted by certain malicious viruses embedded within the attachments.


Next is a phishing attack. This is the type of cyber-attack which is attempted by a hacker. He sends fraudulent emails, which appear to be coming from a legitimate source. This is done to install malware for stealing sensitive data like credit card information and login credentials.


Here the hacker gains access to the information on the path between your device and the website’s server. The hacker’s computer takes over your IP address. By doing so the communication line between you and the website is secretly intercepted. This usually happens through unsecured Wi-Fi networks and through malware.



This is one of the easiest ways to hack a system. Here your password could have been cracked by using either common passwords or trying all possible alphabetical combinations.


To prevent future cyber-attacks, we need to implement a few cybersecurity practices.

First, installing a firewall. As the name suggests, it is a virtual wall securing our computer. To safeguard your network, the Internet firewalls filter the incoming and outgoing traffic on your device. These can either be Software Applications or Hardware reinforcements.

Secondly, honey pots can be implemented. Dummy computer systems called honey pots are used to attract attackers. To deceive attackers, these systems are made to look vulnerable.

Thirdly, use unique alphanumeric passwords, antivirus software and start avoiding mails from unknown senders.

In this way individuals can save themselves from such attacks.

Hope you like this article. Please share it with your friends and visit again for more.

Leave a Reply

Your email address will not be published.