In this series on Internet publications, last week, I spoke on “IP address and DNS“.
In this post today, we will talk about cybersecurity and crime, which when neglected can cause serious damage to our lives and to society. This damage can be financially, personally, and even national security.
The big countries do not only have the REGULAR ARMY, but they also have the CYBER ARMY which does not have traditional weapons, but computers that can be used to shut down water supply, the energy network, transport, etc.
In recent years alone, around millions of credit cards have been stolen, millions of identities have been compromised, even a nuclear centrifuge has been hacked and airline drones hijacked.
The people who commit this crime do not have a particular profile. They can be international terrorists, even a teenager or an institution.
How does it work?
Let’s see how cybersecurity works under the hood, by learning about:
- Phishing …
In biology, a virus is an organism that spreads in various ways, one of them by physical contact. Viruses work by infecting cells and duplicates their genetic material that makes a person very sick and then spread around.
A computer virus works a bit similar.
In a computer, a virus is a computer program that is installed usually unintentionally and harms the user’s computer. It is also possible for a computer virus to spread and infect other computers.
How the virus does infects?
There is a couple of ways that a virus can infect computer
- Fake Installation: This is when a popup asking the user to update or install software for an emergency security update. Alternatively, maybe saying your computer has been infected, you need to clean up.
- Security vulnerability or security backdoors: This happens when your system has a vulnerability or poorly designed system that hackers can access your computer to install his virus or malicious software.
Once the virus in on your computer, it can harm your computer by:
- Steeling your data
- Deleting your data or some of your files
- Allow someone or hacker to control your computer remotely
- Making certain programs to behave unusually.
DDOS (Distributed Denied Of Service)
Using computer viruses, hackers can take over millions of computers worldwide and use them as a BOTNET to attack and take down a website, this kind of attack is called DDoS.
DDoS is when a hacker overwhelms a website with too many requests. When he uses millions of a computer that he controls worldwide and attacks at once a website that sends millions of requests at once toward a website that can shut it down.
Most websites are able to handle millions of requests by day. But when that website receives billions and trillions of requests coming from different places, the computer (website server) is overloaded and stop responding (shut down).
A phishing scam is another way cybercriminals use to send some tricking emails scam to people into sharing sensitive personal information.
A Phishing is when users receive an email that seems coming from a trusted company or service provider, asking users to click in order to login to their service website. When a user clicks, it will take him to a fake website that looks exactly like user’s website provider, example your baking website or your Gmail login system that prompt user to sign in with their username and password. Once user enter those credentials, hackers can get hold of those credentials to use it in order to sign in to the user’s real account to steal information or money.
Fortunately, many companies and government organizations are working to make the internet safer, even though that effort is not enough.
People may think that when a computer has been hacked, the problem is security design or software, but 90% of the time, a system is hacked it is not for security or vulnerability in the system but because of a simple human mistake.
We finish today’s post by providing a few steps or advice to take in consideration to avoid being hacked:
- Use strong password
- Check for authentic web addresses
- Install system security updates often
- Do not install the software you do not trust.
We all need to keep up in order to stay safe.
Hope this helps thanks for reading.
By Alexis Ange Dauli, Web Developer.