Everything That You Needed To Know About Cyber Security
We are living in the internet world and we do lot of transaction on the internet. But how safe is our data and transaction? Today we find cyber crimes increasing and hence need to make sure our cyber security. What is cyber crime?
It is a crime involving computers and the networks. Cyber crimes include attack against hardware and software, financial crimes like online fraud, credit card fraud, and abuse like sexploitation. There are three main cyber security goals.
It means the computer related assets are accessed only by the authorized parties.
It refers that the computer related assets are modified only by the authorized parties in authorized ways.
The computer assets must be available to the authorized people at the appropriate time.
There are several attacks and threats that breach the cyber security of the computers and networks. Some of them are cited below:
VIRUS – Vital Information Resource Under Siege:
Viruses are programs that can copy themselves and infect the computer without the knowledge or permission of the owner.
Example Melissa virus and I Love you virus
Both the viruses are email viruses i.e. spread through e-mail. Melissa is one of the fastest spreading viruses which sent e-mail messages to the first 50 people in the address book. The latter virus was sent as a piece of code sent in the attachment which when double clicked was triggered and sent to everyone in the victim’s address book.
A piece of software which uses computer flaws and holes to replicate itself is called a worm. The difference between a virus and the worm is that the virus does not have a propagation vector and hence infect only a single host. Worm propagates and infects other computers as well
Eg: Code Red
This worm made huge headlines in 2001 by posing a great threat to cyber security.
It slowed down the internet traffic when it started replicating.
Trojan horses are programs which claim to do something innocuous (and usually do), but which also hide malicious behavior. It has a potential even to erase our hard disk.
Eg : Nimbus and Zeus
These are malicious code hiding in the software present in the computer. It waits for certain trigger to execute its payload.
It is a set of instructions designed to bypass the normal authentication mechanism and allow access to the system to anyone who knows that the back door exist. This could be a great threat to cyber security.
A salami attack consists of many smaller, often considered inconsequential attacks.
Eg: Credit card thieves make vary small charges to many cards.
It is a method to gain unauthorized root or administrative privileges to a machine.
We expect our computer to behave in certain ways when we interact with standard user interface elements. But often, malicious code can make non standard user interface elements in order to trick.
It is a good example of interface illusion. It looks like you are revisiting the Paypal’s website, but you are really not. And then you enter the password and yes, you just gave it to an attacker.
Latest cyber attacks
Not only the individual but also big organization and companies fall prey to hacking. Ebay was embarrassed to inform that hackers stole personal records of 233 million users this year. Even the most secured passwords were compromised. Ebay asked their users to change their passwords and asked them to assure that their financial information was not stolen.
It is the hacker’s favorite tool today. Many high profile companies like Facebook, Microsoft and Twitter are victims to this attack. These hackers poison the website frequented by the users. Either the hackers modify the entire website code or install other malware
Cyber Security against these attacks
1. Get the latest AntiVirus Software.
2. Make sure you have the latest security patches and hot fixes using Windows Update.
3. Use a host-based Firewall.
4. BACKUP your Important Files
5. Never click links in email – go to the site and log on directly.
6. Do not give personal information over the phone or email.
7. Security passwords must not be shared even to the close relatives and friends.
8. Watch out for the links sent via email or text.
9. Change your passwords frequently.
10. Check the legitimacy of the provider while downloading apps in smart phones or software in your system.
Today not only the computers but our smart phones are also victims for hacking. Every cyber security measures can be breached by smart hackers. Even when the security is breached immediate action to prevent further damage must be taken.