CYBER CRIME AND CYBER SECURITY
Today internet computer smartphones and other communication technology devices have become an integral part of our life. imagine how much time we spend each day on the smart devices we have made internet communication mediums like Google emails, Whats App,Twitter, Facebook etc., Part and parcel of our everyday activities. But most of us are unaware of Cyber safety and cyber security essential to safeguard ourselves.
CYBER CRIME AND CYBER SECURITY
Note do you know that whatever information or personal details are shared on internet stay online forever as it is extremely difficult to delete the information completely.
What are Cyber Crimes
Cyber crimes are offences that may be committed against individuals, companies or institutions by using computers, internet or mobile technology. cyber criminals use platforms as such as social networking sites, emails,chat rooms, pirated software, websites etc to attack victims. Children are also vulnerable to various types of Cyber crimes.cyber attack are becoming more complex and sophisticated and are increasingly targeted on stealing the personal information such as phone number at this photographs bank detail etc. the personal information can be used by cyber criminals against you in different ways like creating your fake profile cyber bullying etc.
Common ways used by Cyber Criminals
- [tab]
- Malware
- Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission.
- How malware works
- Malware authors use a variety of physical and virtual means to spread malware that infect devices and networks. For example, malicious programs can be delivered to a system with a USB drive or can spread over the internet through drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge. Phishing attacks are another common type of malware delivery where emails disguised as legitimate messages contain malicious links or attachments that can deliver the malware executable to unsuspecting users. Sophisticated malware attacks often feature the use of a command-and-control server that allows threat actors to communicate with the infected systems, ex-filtrate sensitive data and even remotely control the compromised device or server.
Common types of malware
[next]
Different types of malware contain unique traits and characteristics. Types of malware include:- [vtab]
- Virus
- A virus is the most common type of malware which can execute itself and spread by infecting other programs or files.
- Worm
- A worm can self-replicate without a host program and typically spreads without any human interaction or directives from the malware authors.
- Trojan horse
- A Trojan horse is designed to appear as a legitimate program in order to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.
- Spyware
- Spyware is made to collect information and data on the device user and observe their activity without their knowledge.
- Ransomware
- Ransomware is designed to infect a user's system and encrypt the data. Cyber criminals then demand a ransom payment from the victim in exchange for decryption of the system's data.
- Rootkit
- A rootkit is created to obtain administrator-level access to the victim's system. Once installed, the program gives threat actors root or privileged access to the system.
- Backdoor virus
- A backdoor virus or remote access Trojan (RAT) secretly creates a backdoor into an infected system that allows threat actors to remotely access it without alerting the user or the system's security programs.
- Adware
- Adware is used to track a user’s browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase. For example, an advertiser might use cookies to track the web pages a user visits to better target advertising.
- Key loggers
- Key loggers is also called system monitors, are used to see nearly everything a user does on their computer. This includes emails, opened web-pages, programs and keystrokes.
- [message]
- Malware
- Malware, particularly spyware, is malicious software disguised as software designed to collect and transmit private information, such as passwords, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file.
- [message]
- Phishing
- Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user.
- Phishing
- Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user.
CYBER CRIME AND CYBER SECURITY
- [message]
- Internet scams
- Internet scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more.
- Internet scams
- Internet scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more.
- [message]
- Personal safety
- The growth of the internet gave rise to many important services accessible to anyone with a connection. One of these important services is digital communication. While this service allowed communication with others through the internet, this also allowed the communication with malicious users. While malicious users often use the internet for personal gain, this may not be limited to financial/material gain. This is especially a concern to parents and children, as children are often targets of these malicious users. Common threats to personal safety include: phishing, internet scams, malware, cyberstalking, cyberbullying, online preditions.
- Personal safety
- The growth of the internet gave rise to many important services accessible to anyone with a connection. One of these important services is digital communication. While this service allowed communication with others through the internet, this also allowed the communication with malicious users. While malicious users often use the internet for personal gain, this may not be limited to financial/material gain. This is especially a concern to parents and children, as children are often targets of these malicious users. Common threats to personal safety include: phishing, internet scams, malware, cyberstalking, cyberbullying, online preditions.
- [message]
- Cyber stalking
- Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment.
- Cyber stalking
- Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment.
- [message]
- Cyberbullying
- Cyber bullying is the attack upon an individual or group through the use of electronic means such as instant messaging, social media, e-mail and other forms of online communication with the intent to abuse, intimidate, or overpower.
Internet safety or online safety
- [message]
- Internet safety##check##
- Internet safety or online safety is trying to be safe on the internet and is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.
- Personal safety##check##
- Sensitive information such as personal information and identity, passwords are often associated with personal property (for example, bank accounts) and privacy and may present security concerns if leaked. Unauthorized access and usage of private information may result in consequence such as identity theft, as well as theft of property.
This comment has been removed by the author.
ReplyDeleteI found one successful example of this truth through this blog. I am going to use such information now.
ReplyDeleteBest Tech Blogs
I love reading to improve my knowledge and this kind of blogs helps me to do so, Thanks.If you need accountants In delhi
ReplyDeleteleading audit firms delhi
big audit firms delhi
please click on it.
Nice post! This is a very nice blog that I will definitively come back to more times this year! Thanks for informative post. Phishing Testing
ReplyDeleteI Like to add one more important thing here, Digital Signature Market by Solution (Software and Hardware), Service, Deployment Mode, Application (BFSI, Government & Defense, Legal, Real Estate, HR, Manufacturing & Engineering, Healthcare & Life Sciences), and Region - Global Forecast to 2021-2026- Executive Data Report
ReplyDeleteThanks for the nice video. It was very useful for me. We are one of the best Digital Signature Agency in Delhi
ReplyDeleteThis article is very nice. I got information to improve my blog traffic. Thank you very much
ReplyDeleteDigital Signature Certificate
very nice blog post , thank you for sharing great experience
ReplyDeleteTo learn more PDF Signer Software
Thanks for the wonderful information.
ReplyDeleteDigital Signature Provider in India