Now you’ll definetely ask, WHY? and HOW?
As a result of the globalization, we all live in a digital world. The internet has become the major
source which is all the people could rely on. In modern day lots of people share most sensitive and
private data through internet, so now they all seek for high secured network. Otherwise it could be a huge
threat to their privacy. In now a days, some attackers are trying to get inside of this networks and steal
the sensitive data. They may have their reasons. It can be happening under a person, company or
individual. Those activities are known as cyber crimes and threats.
source which is all the people could rely on. In modern day lots of people share most sensitive and
private data through internet, so now they all seek for high secured network. Otherwise it could be a huge
threat to their privacy. In now a days, some attackers are trying to get inside of this networks and steal
the sensitive data. They may have their reasons. It can be happening under a person, company or
individual. Those activities are known as cyber crimes and threats.
Are you one of those people who is eager to know about the cyber threats and how to prevent from it? Then here I am to clarify your doubt.
Top 5 cyber crimes
- Phishing attacks
According to the research data, this is the most successful (91%) cyber attack, in modern days. It
will come through e-mails. Those e-mails are designed as very proffessional and valuable. And also
it shows like, those e-mails are coming from a trustworthy source or someone we know well.
There might be some malicious links which can leads to malware dowloading and also some
requests to enter our private data.
If you ask from me, what you should do to prevent from this cyber threat, I would prefer, you
shouldn’t blindly trust the every e-mail you’ve received. You should know about the security
awarenesses and updates because from that knowledge you will be able to recognize the phishing
e-mails simlpy. Now the technology is far too improved, so there are people who provide phishing
training, from that you will be able to know the signs of a phishing attack and prevent from being a
victim.
- Ransomware
Ransomware is a kind of malware which is designed to encrypt some sensitive data, information
or files on a digital device. When it hits to a machine the whole system would rely on it. Attackers
are interested in this cyber-attack because if they steal some sensitive data or information which
has a great value and a high demand payment, they will receive a high price in exchange. If we
don’t back-up our data, we have to give them whatever they request as the exchange.
Personally I believe that, you should back-up your data recently in a separate location because if you back-up your data in a same location then it might be find easily by the attacker. I know that the data redundancy is a waste of memory space but it’s more secured. Safety come first, isn’t it?
- IoT(Internet of Things) Hacking
This describes the physical objects which are embedded in networks. It can be a sensor,a smart camera and a smart bulb etc. All those objects are connecting through the interent. They are capable of collecting and exchanging data. There could be some imporatant data. Because of that attackers are looking to hack those devices and steal the data.
In my view, I would like to say that if you want to prevent from this type of attack you shouldn’t save your passwords and other login credentials to those devices. It’s safe to keep it in your memory. You have to use a strong and unforgettable password. It will help you to keep your devices more secure.
- Malware
Malware is also a malicious software which is capable of damage or gain access to a digital device. The attackers may have lots of reasons to use malwares. It can be for money,for gain the power or to get some sensitive information. Malware has various types such as viruses, Trojans, Worms, Botnets and Ransomware. All those threats are capable of spreading and corrupting files and also it can infect all the devices which are connected to the network through the infected machine. From this cyber threat, the attacker can take the authority of the machine.
It seems to me that, to prevent from these attacks, you should be aware about the e-mail attachments which you’ve received. And also you should avoid visiting the suspicious and unneccessary websites. In my opinion, I would prefer to install the default anti-virus guard to secure your devices because it will keep safe your machine better than other anty-virus guards.
- Website spoofing
Website poofing is also a major cyber threat in modern days. It has the capability of accessing your systems and steal the money,data and information and spread some malware as well. Those are designed as real websites, we cannot easily identify them. They may come up with a famous brand or company name, then they will create an attractive user interface and whenever a user click that fake website, the attackers will collect user’s data and drop some malware files to the device as well.
If you ask for an advice I would prefer you should ignore the websites and links which are not related to your concerns. Legitimate companies are capable of contacting you through many ways. So try to avoid those websites and it will save your privacy and your valuable time as well.
To sum up the discussion, I would like to say this as my final point. As a company or individual, you should be capable of handling your responsibilties well. Oneday you will be a skillful IT proffessional who has a lots of responsibilities but you have to prioritize the risks and keep focused on the updates. To prevent from all those cyber crimes and threats you should know what’s next because before stop something you should know how to start. If you are more interested joining a defense team against to the cyber attacks I would like to recommend you to start your path with ISACA NSBM student chapter. It will be a huge milestone of your journey.
I hope you’ve learned something interesting!
1 Comments
This is my first article in a blog. Hope to see some interesting comments.
ReplyDelete