Cybercrime is increasing day by day. To get rid of this we need Cyber Security. The Internet is accessible by most of the people today. Due to which online security is a great concern. Surfing the internet in a safe way is important. Cyber Security helps us to understand what are the malicious things we can encounter on the internet. Hence, aware us about the malicious content online. There are many terms in Cyber Security that we should know. This would help us to broad our knowledge about Online things.\n\n\n\nEnsuring Online Security is easy, but sometimes we get worried about online Security.\n\n\n\nWhat Is Cyber Security?\n\n\n\nCybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access.\n\n\n\n Types of Cyber security threats \n\n\n\nRansomware is a type of malware that involves an attacker locking the victim's computer system files. Further, demanding a payment to decrypt or unlock them.Malware is any file or program which harms a computer user, such as worms, computer viruses, Trojan horses and spyware.Social engineering is an attack that relies on human interaction to trick users into breaking security procedures in order to gain sensitive information that is typically confidential.Phishing is a form of fraud where fraud emails are sent that resemble emails from reputable sources. However, the intention of these emails is to steal sensitive data, such as credit card or login information.\n\n\n\nAbove mentioned threats are common. You can clearly see these threats happening. You may be familiar with these threats. In cyber security, these attacks include some terms. These terms in cybersecurity should be known to you.\n\n\n\nCommon Terms In Cyber Security and Cybercrime\n\n\n\n1. Cloud\n\n\n\nCloud refers to an online storage space. This Cloud Storage act as normal storage. The only difference is that it is not present on Cloud or Online instead of your PC or Mobile. Cloud storage is helpful. This storage ensures data safety. Your data is kept safe from theft and loss. If you choose a good cloud provider then you can have peace of mind.\n\n\n\nBest Cloud Storage To use\n\n\n\n\n\n\n\n2. Domain\n\n\n\nDomain refers to a group of different Computer components connected together. For example, In a company, there is a domain which contains different PC connected to each other.\n\n\n\n\n\n\n\n3. VPN (Virtual Private Network)\n\n\n\nVirtual Private Network refers to a virtual network. This virtual network is used to connect anonymously to the Internet. VPN is an important part of Cyber Security. Moreover, Cybercrime is mainly committed by using a VPN.\n\n\n\nVPN helps the user to hide its original IP by the set of algorithms. Hiding IP prevents the user to be directly tracked by the attackers. Though Govt. is still able to track you if they want. But you are safe from the attackers.\n\n\n\nThere are many VPN service providers. You can choose anyone from the list. But we suggest you go with the reputed one. Consequently, they will provide you with better security.\n\n\n\n\n\n\n\n4. Exploit\n\n\n\nIn simple words, exploit is a loophole in any program or item. Exploits are the main reason due to which we can see several cybercrimes taking place. These exploits can be big or small which can result is a cyber attack. To avoid cybercrime (s) companies constantly look for their exploits. When they found one. They instantly remove it.\n\n\n\n\n\n\n\n5. Breach\n\n\n\nExploits and breach are co-related to each other. If there is an exploit and a person uses it. Then they can easily get unauthorised access to the system which is known as Breach. \n\n\n\nIn a similar way, a hacker uses an exploit to breach into a system. After breaching he can clearly do whatever he wants. This can be a cybercrime (if done in an unauthorised manner).\n\n\n\n\n\n\n\n6. Firewall\n\n\n\nFirewall is the safety mechanism that prevents unauthorised access to your system. These act as a barrier between you and the other person who tries to breach into your system.\n\n\n\n\n\n\n\n7. Malware\n\n\n\nMalware is the malicious programs that can cause your system not to work properly. These are Virus, Worms, Ransomware etc.\n\n\n\nIllustration of virus detection\n\n\n\n 8. DDoS attack. \n\n\n\nAttackers use DDoS (Distributed Denial of Service) attacks to make a network unavailable. They do this by loading the targeted machine with massive requests from multiple devices. The target suffers a severely pack bandwidth, and later connections are impossible. These attacks are typically carried out by botnets.\n\n\n\n\n\n\n\n9. Botnet \n\n\n\nA botnet (robot and network) is a network of devices infected by an attacker. Botnets are generally utilising to perform tasks such as carrying out DDoS attacks, mining Bitcoins, and spreading spam emails. Nearly any device connected to the internet, including home routers, can be infected and pulled to act as botnets without its owner ever noticing.\n\n\n\n\n\n\n\n10. Phishing \n\n\n\nAs the name sounds. Phishing is a way of catching people into traps. These traps can be fake websites looking original, promotional emails etc. Phishing is done to grab sensitive data from the user. Further, this data is either sold out or used for some malicious activity.\n\n\n\n\n\n\n\n11. Ransomware \n\n\n\nRansomware is malware that encrypts your system. Sometimes attacking individual files. When you try to access the encrypted files you get a note which states that your storage or PC is not usable anymore. To unlock your PC you have to make a payment which is usually $600 on average. Further, the messages sometimes appear to be from an official government agency. According to which you have committed a cybercrime. This scares many into paying the ransom. Payment is often demanded in Bitcoins.\n\n\n\nRecently, we have seen Wanna Cry attack Windows Systems. This is one of the examples of Ransomware attack. In this Wanna Cry attack, the victim is asked to pay a huge amount in bitcoin to unlock its System.\n\n\n\n\n\n\n\nThese are some terms in cyber security which are basic and you should know them. You may hear these terms in cyber security on a regular basis.\n\n\n\nFor more awesome Tech Content Like us on Facebook, Follow us on Twitter, Instagram, Pinterest and Subscribe to Our YouTube Channel.