https://www.google.co.za/url?sa=i&rct=j&q=&esrc=s&source=images&cd=&cad=rja&uact=8&ved=0CAUQjhxqFQoTCMWx_s60iMkCFcruGgodkqkKow&url=http%3A%2F%2Fwww.extremetech.com%2Finternet%2F214873-get-ready-for-organized-cybercrime&psig=AFQjCNFUismzqKhu5y311lvot3ko1pxgaQ&ust=1447332689876165
Issues surrounding security
Devices and Networks
Our computers, laptops, tablets and smart phones are at
risk from malicious software, also known as malware.
Digital fraud and crime
Includes crimes
such as scams, child pornography, identity theft, social media re-engineering,
cyber bullying, and cyber stalking and cyber harassment.
Terms and conditions
Not reading the small print can mean big problems.
Rebecca Smithers,
consumer affairs correspondent Wednesday May 11, 2011 07.00 BST
The research, commissioned by investment specialist Skandia,
exposes how easy it is for people booking and paying for goods and services
online to click the terms and conditions box without actually reading them in
full. She said online shoppers may be
tempted to tick the box to confirm they have read the terms and conditions when
they have not actually done so, but added: “
They are different on every
website, so make sure you know what you’re agreeing to. People are often surprised to find out
they’re obliged to pay to return unwanted items purchased online, as it is
commonly stated in the terms and conditions and these fees can be expensive.
Cyber crime
When any crime is committed over the Internet it is referred
to as a cyber crime.
Types of cyber crimes and their how can they be avoided
Identity Theft: when a person purports to be some other
person, with a view to creating a fraud for financial gains. It can be data breaches of private websites
too, that contain important information such as – credit card information,
address, email ID’s, etc.
How to prevent identity theft
-shop online only on trusted websites.
-do not directly reply with your resume to online job offers
via emails- even if the job website is reputed.
-balance your credit card standards every month to see if
any item exists that you cannot relate to.
-check out your credit reports once a year to see if there
are any loans that you did not take.
Ransomware: enters your computer network and encrypts your files
using public-key encryption, and unlike other malware this encryption key
remains on the hacker’s server. Attacked users are then asked to pay huge
ransoms to receive this private key.
How to prevent Ransomware
Update OS and security software
Back up your data
Never click on unknown links or download attachments from
unknown sources.
DDos attacks: are used to make an online service unavailable
and bring it down, by bombarding or overwhelming it with traffic from multiple
locations and sources. The idea is
normally to draw attention to the DDOS attack, and allow the hacker to hack
into a system.
How to prevent DDos
You must clog your server bandwidth with fake request from
botnets. Buying a little more bandwidth will reduce or even prevent DDoS
attacks but it can be a costly method.
Malvertising: is a method whereby users download malicious
code by simply clicking at some advertisement on any website that is
affected. The cyber criminals show how
clean ads for a period of time and then replace it with malverts so that the
websites and advertisements do not suspect.
How to prevent malvertising
.
Remote Administration Tools: are used to carry out illegal
activities. It can be used to control
the computer using shell commands, steal files/data, and send location of the
computer to a remote controlling device and more.
How to prevent remote administration tools
-use a strong user login password
-be careful while opening emails from unknown senders and
especially while clicking on attachments.
-you will need good anti-malware software to detect and
isolate the Trojan before it can install any kind of script on your computer.
No comments:
Post a Comment