Cyber Security 101: Your Ultimate Guide to Online Safety
What is cyber security ?
Cybersecurity is the process of securing computer hardware, software, networks or digital information against cyber incidents or intruders, attacks, or harm. It covers many aspects, including technology, its processes, and practices, the general purpose of which is to protect digital data and assets.In the current world, with the changes that have occurred and given that in today’s world the world that seems to be related to our lives in some way or another is through technology, the safeguarding of people against cyber attacks is deemed to be much more meaningful than before. To make it very simple, cyber security is the practice of protecting computers, servers, smartphones as well as other electronic apparatus and networks from misuse, alteration and annihilation. 1 It is more than a solution for the system, that is relevant to such components as hardware resources, software, computer networks and end-users.
Cyber Security 101: Your Ultimate Guide to Online Safety
Â
The Growing Landscape of Cyber Threats
The Growing Landscape of Cyber Threats
The Evolving Spectrum of Risks
It is important to understand that threats in the digital realm are not static, and neither is the realm itself. undefined
Malware > Harmful software created to perniciously affect computers, it includes viruses, worms, trojans and ransomware.
Phishing > Fraudulent messages or websites designed to make people give away personal details.
Hacking > A deliberate violation of the integrity of a computer or computer network by an unauthorised party with the intention of committing unlawful activities.
Denial-of-Service attacks > Conceding a network or system with excessive traffic thereby denying access to legitimate users.
Data breaches > Gaining unauthorised access to confidential information, leakage of personal and organisational data for criminals’ selfish gains, monetary losses, and tarnishing the image of an organisation.
The cybersecurity threats may be defined as any activity or event which is aimed at causing damage or detriment and which is threatening the security of a network or of any system. Threats are possibilities of those threats to materialise in the form of risks, which include loss of data, loss of money, and damaged reputation among others. Threats are powerful anything that poses a threat to a system or network while vulnerabilities refer to points where threats can gain access. The knowledge of these three concepts is important when it comes to security since it means that one is in a position to see areas of weakness and come up with measures which help prevent and deal with threats. cyber security 101 you ultimate guide to online safety
It is a type of contagious software that is particularly developed to corrupt the computers and or the networks. These are viruses, worms, trojans, ransomware and adware among others.
Any form of malware can transmit viruses; it’s important for computer systems to have preventive measures against them. Malware can get into a system in different ways; it can be by downloading an attachment from an email, downloading software from an untrusted website or using a flash drive. A malware can once it penetrates the business system snatch data, destroy files, complicate operations, or lock systems for a ransom.
PHISHING
Phishing is another type of attack whereby people are duped into divulging personal information willingly. These criminals design messages that look like they are coming from your bank, online store you shop from or your preferred social networking site. Some of these messages could include links or attachments that if clicked or opened will result to other malicious sites or malware. These links or attachments when clicked by the victims or opened by the victims, the victims inadvertently submits their personal details, login details, or even their financial details to the phishers. cyber security 101 you ultimate guide to online safety
Cracking on the other hand is the act of gaining illegitimate access to computers and or computer networks. There are different methods that hackers use to hack into a computer, for instance, cracking techniques that seek to take advantage of flawed software and applications, password cracking techniques which involve guessing of passwords and lastly; social engineering which involves tricking of users to disclose sensitive information in a computer. The hackers when they are in they may tamper or steal information, degrade services or use the compromised systems as a base to launch new attacks. cyber security 101 you ultimate guide to online safety
A DOS attack refers to any[unauthorised] attempt to prevent or impair being used by its intended recipient or user.Through flooding an environment with multiple requests , one can be able to compromise the working capacity of a system and restrict authorised users from accessing particular services. This often leads to heavy losses in business and tarnishing of reputation for the various businesses and organisations.