In this series on Internet publications, last week, I spoke on “IP address and DNS“.
In this post today, we will talk about cybersecurity and crime, which when neglected can cause serious damage to our lives and to society. This damage can be financially, personally, and even national security.
The big countries do not only have the REGULAR ARMY, but they also have the CYBER ARMY which does not have traditional weapons, but computers that can be used to shut down water supply, the energy network, transport, etc.
In recent years alone, around millions of credit cards have been stolen, millions of identities have been compromised, even a nuclear centrifuge has been hacked and airline drones hijacked.
The people who commit this crime do not have a particular profile. They can be international terrorists, even a teenager or an institution.
How does it work?
Let’s see how cybersecurity works under the hood, by learning about:
- Virus
- DDoS
- Phishing …
VIRUSES
In biology, a virus is an organism that spreads in various ways, one of them by physical contact. Viruses work by infecting cells and duplicates their genetic material that makes a person very sick and then spread around.
A computer virus works a bit similar.
In a computer, a virus is a computer program that is installed usually unintentionally and harms the user’s computer. It is also possible for a computer virus to spread and infect other computers.
How the virus does infects?
There is a couple of ways that a virus can infect computer
- Fake Installation: This is when a popup asking the user to update or install software for an emergency security update. Alternatively, maybe saying your computer has been infected, you need to clean up.
- Security vulnerability or security backdoors: This happens when your system has a vulnerability or poorly designed system that hackers can access your computer to install his virus or malicious software.
Once the virus in on your computer, it can harm your computer by:
- Steeling your data
- Deleting your data or some of your files
- Allow someone or hacker to control your computer remotely
- Making certain programs to behave unusually.
DDOS (Distributed Denied Of Service)
Using computer viruses, hackers can take over millions of computers worldwide and use them as a BOTNET to attack and take down a website, this kind of attack is called DDoS.
DDoS is when a hacker overwhelms a website with too many requests. When he uses millions of a computer that he controls worldwide and attacks at once a website that sends millions of requests at once toward a website that can shut it down.
Most websites are able to handle millions of requests by day. But when that website receives billions and trillions of requests coming from different places, the computer (website server) is overloaded and stop responding (shut down).
PHISHING
A phishing scam is another way cybercriminals use to send some tricking emails scam to people into sharing sensitive personal information.
A Phishing is when users receive an email that seems coming from a trusted company or service provider, asking users to click in order to login to their service website. When a user clicks, it will take him to a fake website that looks exactly like user’s website provider, example your baking website or your Gmail login system that prompt user to sign in with their username and password. Once user enter those credentials, hackers can get hold of those credentials to use it in order to sign in to the user’s real account to steal information or money.
Fortunately, many companies and government organizations are working to make the internet safer, even though that effort is not enough.
People may think that when a computer has been hacked, the problem is security design or software, but 90% of the time, a system is hacked it is not for security or vulnerability in the system but because of a simple human mistake.
We finish today’s post by providing a few steps or advice to take in consideration to avoid being hacked:
- Use strong password
- Check for authentic web addresses
- Install system security updates often
- Do not install the software you do not trust.
We all need to keep up in order to stay safe.
Hope this helps thanks for reading.
By Alexis Ange Dauli, Web Developer.
Pingback: HOW THE DATA TRANSMITS THROUGH WIRES, CABLES, AND WIFI – Daulipost
Pingback: Kaspersky Total Security – Best Antivirus – Daulipost
Excellent article. I am experiencing a few of these issues as well.. Nissy Bax Kemp
Thanks friend.
I like looking through an article that will make people think. Also, many thanks for permitting me to comment. Tani Rik Yuria
Hi friend. You welcome and thank you very much.
You have brought up a very fantastic points , thanks for the post. Rosamond Lezley Gaudet
Hi friend. Thanks and you are welcome.
You made some decent points there. I looked on the internet for the topic and found most guys will consent with your blog. Othilie Nicol Guzel
Hi friend, thank you for that.
Here are several of the web pages we recommend for our visitors. Cristy Franklin Mannes
Thank you friend.
As soon as I noticed this internet site I went on reddit to share some of the love with them. Rosamund Payton Arlyne
Hi friend. Thank you very much for your support.
I am not rattling superb with English but I line up this rattling easygoing to translate. Genia Chic Fawn
Thanks friend
You made some decent points there. I looked on the internet for the topic and found most individuals will approve with your website. Breanne Irving Romilda
Thank you friend.
Hi mates, its wonderful piece of writing on the topic of tutoringand completely explained, keep it up all the time. Therine Jonas Blanch
Thanks friend
I loved your article post. Really thank you! Great. Paula Drud Dulciana
Hi friend, thank you for this wonderful comment.
If you would like to grow your know-how just keep visiting this web site and be updated with the newest news update posted here. Romona Zollie Raskin
Hi friend, thanks
Hello, after reading this amazing article i am as well happy to share my experience here with colleagues. Dacy Meredith Dragone
Hi friend, tell me how I can to facilitate that.
There is certainly a lot to find out about this subject. I like all the points you made. Milka Westley Helve
Thanks friend for the feedback.
Thanks for the post. Really looking forward to read more. Much obliged. Pamella Joel Kezer
Thank you friend for coming. You welcome.
I like the efforts you have put in this, appreciate it for all the great articles. Anthea Mickey Almeria
Hello friend, thank you very much fir the wonderful feedback. And you welcome
Major thankies for the article. Much thanks again. Great. Liuka Simone Richers
Thank you friend and you are welcome.
I have been surfing online greater than 3 hours lately, but I never discovered any attention-grabbing article like yours. Kariotta Orlan Pavior Gerty Winn Audley
Thanks friend for this wonderful comment.
Really appreciate you sharing this blog. Really looking forward to read more. Much obliged. Olive Irwinn Gredel
Welcome friend and thank you
so that you demand to be a bust for causal agency other a pass along. Reeva Jeffrey Felizio
I was looking at some of your articles on this internet site and I think this website is very instructive! Continue putting up. Marigold Marten Torrey
Thanks friend
I know everything here is true, it is written you have to ask God to open your eyes and pray for the rich and evil good will do the test. Not to worry only trust in the Almighty and put on the armour of god Delinda Maddie Gerta
Hello there. I discovered your web site by the use of Google while searching for a comparable subject, your web site got here up. It appears to be good. I have bookmarked it in my google bookmarks to come back then. Karol Patten Huey
Thanks friend
Hey there. I found your web site by means of Google whilst searching for a related topic, your website got here up. It appears great. I have bookmarked it in my google bookmarks to visit then. Elysia Base Cesaria
Thanks friend
I really enjoy examining on this internet site , it has got great posts . Astrix Drud Tia
Thanks friend
Thumbs up! This information is magnificent. You are a very persuasive writer. Good job on this article! Fidela Emmet Ham
Thanks friend
I blog often and I truly appreciate your content. Your article has really peaked my interest. I will bookmark your website and keep checking for new details about once per week. I opted in for your Feed as well. Libbi Colin Tonjes
Welcome friend
Pretty! This was an incredibly wonderful article. Many thanks for providing this information. Olly Isadore Antonie
You welcome friend.
Very informative blog article. Much thanks again. Fantastic. Latashia Isaiah Philippine
Thanks friend
I blog frequently and I seriously appreciate your content. This great article has really peaked my interest. I will book mark your blog and keep checking for new information about once per week. I opted in for your RSS feed too. Jennilee Shermy Taub
Welcome friend
Nice post. I learn something new and challenging on blogs I stumbleupon everyday. It will always be helpful to read articles from other writers and use a little something from their websites. Kayle Jerrold Seth
Thanks friend
There is noticeably a bundle to find out about this. I think you made sure great factors in functions also. Christalle Daren Santiago
Thanks friend
I intended to create you a little note just to give thanks as before for the exceptional solutions you have featured in this case. It was really shockingly open-handed with you to grant publicly just what many of us might have offered for an ebook to generate some dough for themselves, mostly now that you might have tried it in case you desired. These secrets as well served to be a good way to fully grasp that other people online have the identical fervor much like my personal own to know the truth more regarding this matter. I am sure there are numerous more pleasant periods in the future for many who read your site. Alyss Burgess Flower
Thanks friend for this honesty. I get the idea.
After all, we should remember compellingly reintermediate mission-critical potentialities whereas cross functional scenarios. Phosfluorescently re-engineer distributed processes without standardized supply chains. Quickly initiate efficient initiatives without wireless web services. Interactively underwhelm turnkey initiatives before high-payoff relationships. Holisticly restore superior interfaces before flexible technology. Dotty Winifield Girish
Thank you for the sensible critique. Me and my neighbor were just preparing to do a little research about this. We got a grab a book from our local library but I think I learned more clear from this post. I am very glad to see such wonderful info being shared freely out there. Malissa Alfie Mike
Thank you friend. You welcome
works great, but is not working as required fields. can you improve this. i will pay you 30 euros for improvment, i think this one could be the number 1 datepicker-plugin. please reply. Eva Reinaldo Scrogan
Hi friend. Email me at
info@daulipost.com with details.
Thanks
Thanks so much for the blog post. Thanks Again. Great. Bernette Haydon Sherl
You welcome friend and thank you for commenting.
definitely an interesting read. i usually dont comment. signed Mark Cuban Elnore Marcellus Barnet
Thank you friend.
Etiam pretium, erat a ultrices sodales, nisl augue venenatis ante, a ultrices quam leo vitae mi. In gravida eleifend interdum. In viverra eros quis leo mattis ultricies. Pellentesque porttitor, tellus sit amet molestie euismod, quam elit pretium nisl, vitae dictum orci lorem imperdiet mauris. Alaine Sidnee Tarah
Greetings! Very helpful advice in this particular post! It is the little changes that make the largest changes. Many thanks for sharing! Chelsae Jarad Tavey
Thank you friend and you are welcome.
We stumbled over here coming from a different web address and thought I may as well check things out. I like what I see so i am just following you. Look forward to finding out about your web page for a second time. Elsbeth Dav Benildis
Thank you friend and welcome.
You made some really good points there. I checked on the internet for more information about the issue and found most people will go along with your views on this website. Sunny Riordan Nasia
Thanks friend
I like looking through a post that will make men and women think. Also, many thanks for permitting me to comment! Mandie Raffaello Mace
Thanks friend, you are welcome.
I am genuinely delighted to read this webpage posts which carries tons of useful facts, thanks for providing these information. Vivien Elisha Rancell
Thanks friend. You welcome
How are you fellow muted the head great info the article 2019 Rosmunda Ari Burra