WHAT IS CYBER CRIME AND WHAT PRECAUTIONS YOU SHOULD TAKE TO PROTECT YOURSELF?

Many of you must be already familiarized with the term "Cybercrime" as well as "Cybersecurity". Those who do not know, I hope will find this article useful.
Cybercrime is defined as any crime which is committed through the computer, internet, network or network device. It involves targeting both individuals and companies. The people who commit these crimes use several means to get access to the network or system of the target and misuse the data obtained for monetary or other illegal purposes.

TYPES OF CYBER CRIMES

1. HACKING
Possibly the most used ms among people are hacking. It is an act committed by a person by accessing your computer or network system with your consent. The people who commit these crimes are known as hackers.

2. PHISHING
Perhaps the most common type of crime you came across daily with. Phishing involves sending malicious URLs or email attachments which involve email spoofing, as a means to gain access to the user's computer. They are posed in such a way they don't get flagged in email as spam. Users are usually tricked by thinking that it is usual attachments related to bills, banks etc.

3. IDENTITY THEFT 
This is the type of crime when a person pretends to use the identity of another person to commit, fraud, theft on the behalf of that person. This mostly involves using your I.D and credit cards to make a purchase, do illegal work.

4. EMAIL BOMBING
It involves sending a bulk volume of meaningless emails to the user in an attempt to crash their mail servers. This type of crime usually meant to consume the network resources.

5. COMPUTER WORM 
Worms are described as a malicious piece of software that self - replicate and take over the machinery of the network or the system. They use bandwidths and memory thereby overloading the system. 

6. RANSOMWARE
Ransomware involves using malicious software known as "malware" to encrypt the data of the user's system and after that demand ransom for decrypting so that they can get access to their system.

7. CYBERBULLYING 
It involves using a bundle of threatening messages, emails through the internet as a means to harass or threaten a person. It is usually done by bullies or people who just want to instil fear among the targeted person.

8. DoS attack (Denial of service attack) 
This is the type of cyber crime most people are unaware of. The DoS attack involves an attempt to make a service inaccessible to the user. These types of attacks are mainly done on web servers of government sites or big companies.

9. BRUTE FORCE ATTACK
This type of attack occurs when the attacker tries to gain access to the account of the user by using and guessing different combinations of possible passwords until it succeeds. 

10. TROJAN HORSEDerived from the great Trojan warhorse, the Trojan horse attack occurs when a harmful software gains access by appearing as useful and harmless but once executed it damages and corrupts the data.

CYBER SECURITY
As the name suggests, cybersecurity is the protection of data, network and system from cyberattack, through the use of technology, software and practices.
How to stay online.
Now a question must be arising after all these details, that how we should stay safe online in this era of the digital world?

1. KEEP UPTO DATE 
The first and foremost step is to always keep your software as well as operating systems updated. Using outdated programs will invite more threats into your system.

2. USE STRONG PASSWORD 
This is where most of the people invite the brute force attackers by keeping their password too short or simple so that they could remember it easily. Always make your password at least 10 digits long using the combination of numbers, special characters and alphabets.

3. ANTIVIRUS PROTECTION 
always invest in good antivirus software, they will protect you from harmful programs and keep it updated to get full protection.

4. CLICK BAITS
Beware of the click bates you get to see whenever you visit an unprotected site. By clicking them you are inviting a lot of malware in your system which hides in the computer and works in the background to extract your data.

5. DON'T OVERSHARE 
Always be selective about what kind of information you are sharing online and with whom, the attacks that occur through phishing and social engineering are because the attackers are well aware of the person's liking due to online posting.

6. URL ALERT
Do not click on any random shared URLs, always check them on URL checker for their legitimacy to identify whether it is secured or not.
Close Menu