CYBER CRIME AND CYBER SECURITY
Today internet computer smartphones and other communication technology devices have become an integral part of our life. imagine how much time we spend each day on the smart devices we have made internet communication mediums like Google emails, Whats App,Twitter, Facebook etc., Part and parcel of our everyday activities. But most of us are unaware of Cyber safety and cyber security essential to safeguard ourselves.
CYBER CRIME AND CYBER SECURITY
Note do you know that whatever information or personal details are shared on internet stay online forever as it is extremely difficult to delete the information completely.
What are Cyber Crimes
Cyber crimes are offences that may be committed against individuals, companies or institutions by using computers, internet or mobile technology. cyber criminals use platforms as such as social networking sites, emails,chat rooms, pirated software, websites etc to attack victims. Children are also vulnerable to various types of Cyber crimes.cyber attack are becoming more complex and sophisticated and are increasingly targeted on stealing the personal information such as phone number at this photographs bank detail etc. the personal information can be used by cyber criminals against you in different ways like creating your fake profile cyber bullying etc.
Common ways used by Cyber Criminals
Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission.
Malware authors use a variety of physical and virtual means to spread malware that infect devices and networks. For example, malicious programs can be delivered to a system with a USB drive or can spread over the internet through drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge. Phishing attacks are another common type of malware delivery where emails disguised as legitimate messages contain malicious links or attachments that can deliver the malware executable to unsuspecting users. Sophisticated malware attacks often feature the use of a command-and-control server that allows threat actors to communicate with the infected systems, ex-filtrate sensitive data and even remotely control the compromised device or server.
Different types of malware contain unique traits and characteristics. Types of malware include:
A virus is the most common type of malware which can execute itself and spread by infecting other programs or files.
A worm can self-replicate without a host program and typically spreads without any human interaction or directives from the malware authors.
A Trojan horse is designed to appear as a legitimate program in order to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.
Spyware is made to collect information and data on the device user and observe their activity without their knowledge.
Ransomware is designed to infect a user's system and encrypt the data. Cyber criminals then demand a ransom payment from the victim in exchange for decryption of the system's data.
A rootkit is created to obtain administrator-level access to the victim's system. Once installed, the program gives threat actors root or privileged access to the system.
A backdoor virus or remote access Trojan (RAT) secretly creates a backdoor into an infected system that allows threat actors to remotely access it without alerting the user or the system's security programs.
Adware is used to track a user’s browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase. For example, an advertiser might use cookies to track the web pages a user visits to better target advertising.
Key loggers is also called system monitors, are used to see nearly everything a user does on their computer. This includes emails, opened web-pages, programs and keystrokes.
This comment has been removed by the author.
DeleteI found one successful example of this truth through this blog. I am going to use such information now.
DeleteBest Tech Blogs
I love reading to improve my knowledge and this kind of blogs helps me to do so, Thanks.If you need accountants In delhi
Deleteleading audit firms delhi
big audit firms delhi
please click on it.
Nice post! This is a very nice blog that I will definitively come back to more times this year! Thanks for informative post. Phishing Testing
DeleteI Like to add one more important thing here, Digital Signature Market by Solution (Software and Hardware), Service, Deployment Mode, Application (BFSI, Government & Defense, Legal, Real Estate, HR, Manufacturing & Engineering, Healthcare & Life Sciences), and Region - Global Forecast to 2021-2026- Executive Data Report
DeleteThanks for the nice video. It was very useful for me. We are one of the best Digital Signature Agency in Delhi
DeleteThis article is very nice. I got information to improve my blog traffic. Thank you very much
DeleteDigital Signature Certificate
very nice blog post , thank you for sharing great experience
DeleteTo learn more PDF Signer Software
Thanks for the wonderful information.
DeleteDigital Signature Provider in India