IntroductionI the unauthorised exploitation of systems, networks and

IntroductionI am going to talk in around 1000 words about cyber security and what it is used for and how to prevent hacking. Cyber security comprises technologies, processes and controls that are designed to protect systems, networks and data from cyber attacks. Effective cyber security reduces the risk of cyber attacks, and protects organisations and individuals from the unauthorised exploitation of systems, networks and technologies. A cyber attack is any type of offensive manoeuvre employed by nation-states, individuals, groups, or organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.There are many different types of hacking. For example trojans, worms and viruses. These can’t usually be detected until it is too late and the person that has infected your computer has disappeared with your money or details. Now they can use your bank account to buy things and use your identity to do some bad things. There are also different types of social engineering. These can be people that look over your shoulder when you type in a pin or a password. They could also be emails or malware that redirects your ip address to a certain website which looks real but is fake and is used to take money or steal bank details like passwords. These are all different methods which can be stopped by looking over your shoulder or checking that you are on the correct website. There are ways that stop people from phishing(The fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.), pharming(The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers.), Blagging(is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances.) and shouldering(Shoulder surfing is using direct observation techniques, such as looking over someone’s shoulder, to get information.) these are CAPTCHAs(Completely Automated Public Turing test to tell Computers and Humans Apart) and biometric and password systems and email configurations. These won’t stop all attempts but it will stop most attempts.Real Life Case There are many cases where people have been hacked and lost money or personal data. The WannaCry ransomware attack was a May 2017 worldwide cyberattack by the WannaCry ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It propagated through EternalBlue, an exploit in older Windows systems released by The Shadow Brokers a few months prior to the attack. While Microsoft had released patches previously to close the exploit, much of WannaCry’s spread was from organizations that had not applied these, or were using older Windows systems that were past their end-of-life. WannaCry also took advantage of installing backdoors onto infected systems.The attack was stopped within a few days of its discovery due to emergency patches released by Microsoft, and the discovery of a kill switch that prevented infected computers from spreading WannaCry further. The attack was estimated to have affected more than 300,000 computers across 150 countries, with total damages ranging from hundreds of millions to billions of dollars. Security experts believed from preliminary evaluation of the worm that the attack originated from North Korea or agencies working for the country.In the FutureIn the future people theorize that search companies will keep track of what you are doing on the internet