What is Cyber Security? Definition and Cyber Threats


Tuesday, 6 September 2022

Softwares are all full of threats that harm the people using them. That is why cyber security is important to people. If you do not know what is cyber security and want to know more about it and the different cyber threats, you should read this article. 




What is Cyber Security?

Cyber security is the practice of protecting internet-connected devices and services from digital attacks. Cybersecurity measures are created to defend networked systems and computer networks from threats that come from inside and outside an organisation. The National Cyber Security Center (NCSC) states that “cyber security's core function is to protect the devices we all use (smartphones, laptops, tablets and computers), and the services we access - both online and at work - from theft or damage.”

Cyber security is important because it helps the user to protect their data from thefts and damage. Nowadays, people are constantly using smartphones and computers, which make them part of our lives.

People share their information and important data on every device, whether it is for shopping or for work. The constant use of these devices makes it easier to cyber attackers to hack and damage all of our information and data. 

Some History

The first digital computer started to be developed during the 1940s. As there were not many computers and not everyone knew them, threats did almost not exist. During the 1950s, the term “hacking” started to be used in communication through phones, but not on computers yet. It was during the 1970s that the birth of cyber security began. Ray Tomlinson created “Reaper”, the first antivirus software programme. In the 1980s, these problems evolved and the terms “computer virus” and “Trojan horse” became normal; with the Cold War happening, cyber espionage was common. During the 1990s, internet connection grew, as well as cyber security. New developments in the cyber security area were made. 

Different Types of Cyber Threats

  • Malware: Malware refers to malicious software variants. This type of cyber threat includes worms, trojans, viruses, spyware, and ransomware. This threat can install harmful software to your device, block usage, disrupt your system or transmit information from your data storage. 
  • Ransomware: This type of malware threatens to lock down your files and data and erase or destroy your information unless a ransom is paid to the cybercriminals. 
  • Phishing: This type of cyber threat sends e-mails or text messages to people and tricks them to provide sensitive information. The e-mails and text messages appear to be from known companies and ask the user to follow instructions asking for personal information. It usually installs malware when you click on them. 
  • Man-in-the-middle attacks: This cyber threat involves an attacker intercepting a two-way conversation in order to steal data from them. This often occurs on an insecure Wi-Fi network. 
  • Insider threats: Any person who has had access to important information in the past can be considered an insider threat if they abuse their access permission.  
  • Distributed denial-of-service (DDoS) attacks: This type of threat floods the network with an amount of traffic and overloads it, disabling it from responding to user requests. 
  • Advanced persistent threats (APTs): In this type of threat, an intruder infiltrates a network and spends some time there without activating any defensive countermeasure with the aim of stealing data from the network. 

All in all, cyber security is the practice of protecting software from different threats. Among these threats, we can find malware, ransomware, phishing, man-in-the-middle attacks, insider threats, DDoS, and APTs. 

If you are interested in protecting software from these various threats, you should get a degree in Cyber Security. In Australia, there are several universities that offer you the possibility of getting a degree in Cyber Security: 





Get Instant Information about the University

By clicking “Get Information Now,” I hereby authorize topaustralianuniversities.org, their dependents, subcontractors, or associates to contact me in regards to education proposals offered by universities in the Australia.