Monday 9 November 2015

Digital Security



https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAUQjhxqFQoTCMWx_s60iMkCFcruGgodkqkKow&url=http%3A%2F%2Fwww.extremetech.com%2Finternet%2F214873-get-ready-for-organized-cybercrime&psig=AFQjCNFUismzqKhu5y311lvot3ko1pxgaQ&ust=1447332689876165

Issues surrounding security


Devices and Networks
Our computers, laptops, tablets and smart phones are at risk from malicious software, also known as malware.

Digital fraud and crime
Includes crimes such as scams, child pornography, identity theft, social media re-engineering, cyber bullying, and cyber stalking and cyber harassment.


Terms and conditions
Not reading the small print can mean big problems.
 Rebecca Smithers, consumer affairs correspondent Wednesday May 11, 2011 07.00 BST
The research, commissioned by investment specialist Skandia, exposes how easy it is for people booking and paying for goods and services online to click the terms and conditions box without actually reading them in full.  She said online shoppers may be tempted to tick the box to confirm they have read the terms and conditions when they have not actually done so, but added: “

They are different on every website, so make sure you know what you’re agreeing to.  People are often surprised to find out they’re obliged to pay to return unwanted items purchased online, as it is commonly stated in the terms and conditions and these fees can be expensive.


Cyber crime
When any crime is committed over the Internet it is referred to as a cyber crime.

Types of cyber crimes and their how can they be avoided

Identity Theft: when a person purports to be some other person, with a view to creating a fraud for financial gains.  It can be data breaches of private websites too, that contain important information such as – credit card information, address, email ID’s, etc.
How to prevent identity theft
-shop online only on trusted websites.
-do not directly reply with your resume to online job offers via emails- even if the job website is reputed.
-balance your credit card standards every month to see if any item exists that you cannot relate to.
-check out your credit reports once a year to see if there are any loans that you did not take.

Ransomware: enters your computer network and encrypts your files using public-key encryption, and unlike other malware this encryption key remains on the hacker’s server. Attacked users are then asked to pay huge ransoms to receive this private key.
How to prevent Ransomware
Update OS and security software
Back up your data
Never click on unknown links or download attachments from unknown sources.

DDos attacks: are used to make an online service unavailable and bring it down, by bombarding or overwhelming it with traffic from multiple locations and sources.  The idea is normally to draw attention to the DDOS attack, and allow the hacker to hack into a system.
How to prevent DDos
You must clog your server bandwidth with fake request from botnets. Buying a little more bandwidth will reduce or even prevent DDoS attacks but it can be a costly method.

Malvertising: is a method whereby users download malicious code by simply clicking at some advertisement on any website that is affected.  The cyber criminals show how clean ads for a period of time and then replace it with malverts so that the websites and advertisements do not suspect.
How to prevent malvertising
 Precaution is the only way to avoid malvertising and remember to keep your operating system and your installed software, including browser plugins, always updated
.
Remote Administration Tools: are used to carry out illegal activities.  It can be used to control the computer using shell commands, steal files/data, and send location of the computer to a remote controlling device and more.
How to prevent remote administration tools
-use a strong user login password
-be careful while opening emails from unknown senders and especially while clicking on attachments.
-you will need good anti-malware software to detect and isolate the Trojan before it can install any kind of script on your computer.















No comments:

Post a Comment