Professional Documents
Culture Documents
Internet Security: Internet Security Is Important These Days With The Rise of Cyber Crime, Phishing And, and Data Theft
Internet Security: Internet Security Is Important These Days With The Rise of Cyber Crime, Phishing And, and Data Theft
SECURITY
Internet security is important these days with the rise of
cyber crime, phishing and, and data theft.
Malware
such as worms,viruses and trojan are designed and written to exploit various different
vulnerabilities in computer systems, particularly the opening system and web browsers on
order to destroy data, take over a computer or steal a sensitive information.
5 TYPES OF MALWARE
VIRUS
A computer virus is a piece of malicious code that replicates itself by injecting code into other
programs.
WORN
A worn is standalone, self replicating, malicious computer program designed to cause disruption
to a network, steal data, install a back door, or even lock files in ransomware attack.
TROJAN
A name and concept was derived from the story of the Trojan horse used to invade the city of Troy.
A trojan masquerades as an ordinary program or utility that carries, a hidden more sinister
function. This could be data theft, or ransomware attack.
ROOTKIT
Ransomware is a malicious program designed to encrypt and lock a computer system until a fee is
paid effectively holding the system to ransom. Ramsomware attack are usually carried out using a
trojan worm that a user is tricked into opening. These trojan can arrived through email or from a
phising cam.
SOCIAL ENGINEERING
-Social engineering is the use of deception and manipulation to rick individuals into handing over
confidential information such as passwords, bank details, and personal information in order to steal
money or the person’s identity.
PHISHING
Pronounced “fishing”, this social engineering technique is designed to trick a user into handing over
confidential information. Many phishing scams come via an email or phone call, that appear to originate
from a legitimate source such as a bank, the police, IRS (HMRC), or a well known company. Here’s an
example.
The email appears genuine and is designed to scare you, but notice the link have been spoofed.
PHARMING
Pronounced “farming”, this social engineering technique is designed to redirect a legitimate website’s traffic
to a duplicate fake site by either using the infected computer’s host file, the victim’s internet router, or a
compromised DNS server. Using the fake site, the scammers can harvest usernames and password entered
by unsuspecting users then use them to gain access to the victim accounts on the official website.
PRETEXTING
This social engineering technique uses a fabricated scenario designed to gain a user’s trust a trick them into
handing over personal information. This scam usually a phone call that appears to come from an authority
such as the police or tax office.but could also impersonate a co-worker an insurance company some fake
organization running bogus special offers or some external IT support company.
SHOULDERING
New phones, tablets, and laptops nowadays, include finger print scanners, iris, and facial ID cameras, that use a
finger print, or a mathematical representation of your face.
STRONG PASSWORDS
A online services are starting to include 2-factor authentication where a confirmation code is sent to the user’s
phone number or email address that was registered when the account was opened.
2-FACTOR AUTHENTICATION