Cyber security and awareness

Cyber security and awareness 

What is Cyber security?

Cyber(computer system network program or data)

Security(system security network security program or data security)

Cyber security is the protection of interconnected systems, including hardware, software and data from cyber attacks.

 

Cyber security is also known as information technology security, and is vital for safeguarding computers, networks, and data from unauthorised access and potential harm. In our digital age, with increased reliance on technology and smart devices, the importance of cyber security has grown significantly. Cyber security, ranging from identity theft to business disruptions, pose serious threats to individuals, businesses, and even national security. These attacks include marware, phishing, and cyber terrorism. To counter these threats, various measures such as firewalls, antivirus software and encryption are developed.



Needs of cyber security:

  1. To protect private data.

  2. To protect intellectual data. 

  3. To protect banking and financial data.

  4. National security.

  5. Global security.

  6. Protect sensitive data.



Cyber security is committed in the following ways:

  1. Computer hacking.

  2. Through fake email.

  3. Use of viruses and malware.

  4. By creating a fake Website.

  5. Online fraud.


Ways to stay safe for cyber crime are:

  1. Internet usage awareness.

  2. Vigilance in internet use.

  3. Use of antivirus software.

  4. Not opening suspicious websites and Email.

  5. Secure password.



Seven most common cyber attacks:

  1. Malware attack.

  2. Phishing attack.

  3. Man in the middle attack.

  4. Denial of the service attack.

  5. SQL injection.

  6. Cross-site scripting (XSS) attack.

  7. Password attack.


What is phishing?

  • The term fishing refers to an attack using mail programs to trick web users into revealing sensitive information that can be used for criminal purposes. 

  • In general, hackers conduct phishing attacks by using email messages that look as though they come from a genuine source like a Post office, a bank, or online service. Attackers can also use text messages, phone calls, and instant messaging.

  • The most common example is asking a user to update his account or change his password for security reasons.

  • It involves sending fraudulent emails, messages, or websites that mimic legitimate ones to trick individuals into revealing sensitive information such as passwords, credit card numbers, and personal details.



Preventing measures of Phishing:

Cybercriminals know that organizational & internet service providers use anti-spam detection software and take preventive measures such as blocking some IP addresses. Those criminals keep their own adjustments. They invent new methods to bypass detection tools. 


The example is:

A person receives a message “Congratulations! you won ₹10 lakh. Click here to claim.” Excited, they click the link and enter their bank details. Soon, all their Money disappears. 


Common signs of phishing:

  1. Unfamiliar sender or suspicious email address.

  2. Generic greetings like “Dear user”

  3. Urgent language (example- your account will be suspended)

  4. Unexpected attachments or links.



How to protect yourself:

  1. Verify links by hovering over them before clicking.

  2. Don't open suspicious attachments.

  3. Double-check with the sender if the message seems odd.

  4. Use multi-factor authentication(MFA) whenever possible.



What is hacking?

  • Hacking is the process of identifying weakness in a computer system or network to exploit the security & gain access to personal data or business data.

  • Example of hacking: using password cracking algorithms to gain access to computer systems.

  • Providing fake wifi is another example, However once connected to the fake wifi hacker’s get instant access to their device allowing them to steal personal data and files.

  • Hacking costs many organizations millions of dollars every year & business needs to protect themself against these attackers. 

  • Hackers are highly skilled individuals, they mostly remain unnoticed by cyber security & IT teams.

  • They are highly skilled in tricking users into opening malicious attachments or links and freely giving up their sensitive information.


Types of Hackers:

  1. Black hat hackers(crackers)

A hacker who gains unauthorized access to the computer system for personal gain. They discover weaknesses in computer systems and software to them for financial gain or steal co-operate data.

  1. White hat hackers(Ethical hacking)

White hat hackers attempt to prevent the success of black hat hackers through protective hacking.

They use their technical skills to break the system and test the level of network security 

These individuals are hired by the organization itself to find the vulnerabilities into their system.

They use similar techniques of hacking as black hat hackers use.

  1. Grey hat hackers

A hacker who is between ethical and black hat hackers. He/she breaks into computer systems without the authority with a view of identifying weaknesses and revealing them to the system owner.



Punishment:

Under the IT act 2000, section 66, the punishment is imprisonment upto 3 years or a fine which may extend upto 5 lakhs rupees or both.


Ways to stay protected:

  1. Use strong unique password (use a password manager)

  2. Update software regularly to patch security flaws.

  3. Avoid public Wi-fi for sensitive transactions. 

  4. Install antivirus and firewalls on your devices.


General cyber hygiene tips:

  1. Look at your devices with strong PINs or biometrics. 

  2. Regularly backup important data.

  3. Educate yourselves and others about new scams.

  4. Report suspicious activities to your IT team or relevant activities.

⚠️
Mobile Access Required
This website is optimized for mobile devices only.
Please open this page on your smartphone or tablet for the best experience.