Here is my first thread on cyber security, not so deep, just gonna start with basics and gonna go deep into the thing. #security#iot#analytics#technology#tech
Thread🧵👇 (1/n)
A cyber security threat refers to any possible malicious attack that seeks to unlawfully access data, disrupt digital operations or damage information #machinelearning#design#innovation#cloud#robot (2/n)
In recent years, numerous high-profile cyber attacks have resulted in sensitive data being exposed. For example, the 2017 Equifax breach compromised the personal data of roughly 143 million consumers, including birth dates, addresses and Social Security numbers #bigdata (3/n)
Everyone should have an in-depth understanding of the following types of cyber security threats.
1)Malware
2)Emotet
3)Denial of Service
4)Man in the middle
5)phishing
6)SQL injection #cybersecurity#startup#artificialintelligence#marketing (4/n)
1)MALWARE is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. (5/n)
2)EMOTET-The Cybersecurity and Infrastructure Security Agency (CISA) describes Emotet as “an advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware.” (6/n)
3)A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. (7/n)
A man-in-the-middle (MITM) attack occurs when hackers insert themselves into a two-party transaction. After interrupting the traffic, they can filter and steal data, MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. (8/n)
Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number “The goal is to steal sensitive data like credit card and login information or to install malware(9/n)
A Structured Query Language(SQL)injection is a type of attack that results from inserting malicious code into a server that uses SQL. the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box(10/n)
Finance Minister Nirmala Sitharaman’s Budget announcement on cryptocurrency taxation at a flat rate of 30 %.
Overall, this is a positive move, the good news for crypto is that it was finally acknowledged in the budget. That doesn't mean it's legal—it will only be after the crypto bill.
But still, 30% is way too high
To capture details of all such crypto transactions, she also proposed a 1% tax deduction at source on payments made related to purchase of virtual assets.
Here you are, thanks to the internet , the thing that connects you to the world.
But internet as you know is changing, it is now giving way to new version called web 3.0.
and while some believe this might be a game changer, there is something to disagree too(1/n)
But what exactly is web 3.0?
it will be a third version or evolution of world wide web.
And everyone is talking about it because they believe it will revolutionise the web.
umm, how? (2/n)