When dealing with cyber security, it is important to understand what vulnerabilities there are, the different types, and how they can be prevented. Sunaina Aytan- a cyber security analyst at e-secure, tells us how

When dealing with cybersecurity, it is important to understand what vulnerabilities there are, the different types, and how they can be prevented. Sunaina Aytan – a cybersecurity analyst at e-secure, tells us how.

To begin, there are two types of vulnerabilities- software vulnerabilities and hardware vulnerabilities.
Software vulnerabilities are usually when there is an error in the operating code and an attacker uses this error to find their way into the system. To combat these types of vulnerabilities, big companies release patch updates.
Hardware vulnerabilities are usually not exploited through random attempts as the attacker needs direct access to the hardware and its design flaws.

Security vulnerabilities can also come in different shapes and forms. For example, we can come across non validated input when the data coming into the program could contain malicious content. Also, weaknesses in security practices and race conditions, where attackers can gain access when outputs do not occur in the correct order.

Malware is an important concept to consider when looking at vulnerabilities. What is Malware? It is a form of malicious code that attackers use to steal data, gain access, or cause problems.

Similar to security vulnerabilities, there are many types of malware. Below, you can find out about the different types of malware, as well as how to prevent them.

  1. Spyware such as keystroke loggers. To prevent these, check nothing is physically connected to your computer.
  2. Adware. To prevent these unwanted advertisements, pay close attention when downloading software.
  3. Ransomware. Making sure you steer clear of these payment demanding malware, make sure to only use supported operating systems.
  4. A Man in the Mobile attack is when the attacker gains access to a mobile to extract sensitive data. To prevent this, do not connect your mobile device to any public WIFI routers, as this is how these attacks are carried out.

As always, it is important to make sure that you have a trustworthy antivirus software installed onto your device(s).

Now read:
Which Cybersecurity Career Is Right For Me?
Uncover your hidden talent for cybersecurity with Cyber Discovery

Have you grabbed your Stemettes swag yet? Start your collection with a Grey or Black tee

Want to discuss this with other young women in STEM? Why not join the Stemette Society to continue the conversation.

Share on: