How to Cite: Sharma, A., Tyagi, A., & Bhardwaj, M. (2022). Analysis of techniques and attacking pattern in cyber security approach: A survey. International Journal of Health Sciences, 6(S2), 1377913798. https://doi.org/10.53730/ijhs.v6nS2.8625 International Journal of Health Sciences ISSN 2550-6978 E-ISSN 2550-696X © 2022. Manuscript submitted: 09 March 2022, Manuscript revised: 18 April 2022, Accepted for publication: 27 May 2022 13779 Analysis of techniques and attacking pattern in cyber security approach: A survey Aman Sharma Department of Computer Science and Information Technology, KIET Group of Institutions, Delhi-NCR, Muradnagar, India Anushka Tyagi Department of Computer Science and Information Technology, KIET Group of Institutions, Delhi-NCR, Muradnagar, India Dr. Manish Bhardwaj Department of Computer Science and Engineering, KIET Group of Institutions, Delhi-NCR, Muradnagar, India Abstract---IT or Cybersecurity. It's the protection of computer systems and networks against data leakage, theft or damage to their hardware and software as well as service interruption or misdirection. Increasing reliance on computer systems, such as smart phones, televisions and the micro devices that make up the Internet of Things, has made this field increasingly vital. Data security has risen to the top of the to-do list in today's globe. Cybercrime is being tackled in a variety of ways by governments and corporations around the world. There is still a lot of anxiety about cyber security, despite several efforts. This Paper provides an Intensive survey of various cyber- attacks in India and their Countermeasures. Keywords---cyber security, cyber attacks, cybercrimes, cyber solutions. Introduction We all live in a fast-paced and developing society, and the Internet is now the most important infrastructure in our daily lives. Our data is our most valuable asset or liability on the Internet. It may be our credit card information, medical records, financial transaction reports, military secrets, business strategies, chats, videos, and anything else. What happens if the evil people get their hands on it? When it comes to protecting our data from unauthorised access and modification, this is where cybersecurity comes into play.