July 12, 2020

Cybercrime,Cyber security and Types of Cybercrime,

Why Cyber Security?

Cybercrime is one of the fastest growing criminal industries in the world today, surpassing even the drugs trade in terms of profitability. 

Cyber crimes are criminal acts that are performed with the aid of a computer. Crimes that fit this category are identity theft, mischievous hacking, theft, and more.

There are many ways that you can become a victim to cybercrime, from falling for an online phishing scam to having your PC(personal computer) hacked and personal information stolen. Like all crime the best way to prevent it is to be fully aware of the dangers, so that you can take sensible precautions to reduce the chances of it happening.

Different types of Cybercrime

With so many words out there to describe different types of Cybercrime it helps if you have an idea of what each one means. Here is the list of the most commonly used terms related to cybercrime..Worms,Spyware,Trojans, Adware,Phishing Scams, Computer viruses, Identity theft, Ransomware, Brute- force-attack, Petya, DNS hijacking etc.

Petya: Petya is a family of encrypting  ransomware that was first time discovered in 2016. The malware targets Microsoft Windows based Systems, infecting the master boot record to execute a payload that encrypts a hard drives file System table and Prevent windows from booting.
It subsequently demands that the user make a payment in Bitcoin in order to regain access to the system. Variants of Petya were first seen in march 2016, which propagated via infected email attachments.

In June 2017, A new variant of Petya was used for a global Cyberattack, primarily targeting Ukraine.  The new variant propagates via the Eternal Blue exploit, which is generally believed to have been developed by the US National Security Agency and was used earlier in the  year by the WannaCry Ransomware.

Brute Force Attack: It is a Password and Cryptography attack that does not attempt to decrypt any information but Continue to try a list of different passwords, words, or letters. For Example- a simple Brute Force Attack may have a dictionary of all words or Commonly used passwords and Cycle through those words until it gains access to the account.
A more complex brute force attack involves trying every key Combination until the Correct password is found.

Incognito mode: Alternatively referred to as private browsing, In private browsing, private window. Incognito mode is a setting that prevents Internet history from being stored. For Example- when you visit any webpage, any text, pictures and cookies loaded in the page is all stored on your computer.

DNS Hijacking: It is a process in which an individual redirects quarries to a domain name server. It may be accomplished through the use of malicious software or unauthorized modification of a server.
Once the individual has control on the DNS(Domain Name server or System), they can direct others who access it to a web page that looks the same, but contains extra content such as advertisements. They may also direct uses to pages containing malware or a third party search engine.

How to prevent cybercrime crime when it happening on a personal level?
# Always make sure that you factor in the cost of the antivirus software when buying a new PC. The few bucks spent protecting yourself now will save you a lot of time and money in the future. Norton and McAfree are the biggest providers of online security.

# Keep it updated, Naver give out your information to anyone online. If an email claiming to be form your bank arrives in your inbox do not reply to the email. Phone your bank directly( face to face) to ask what they want. Your bank should never need to verify your private information via phone.

# Keep your passwords complicated and even think about changing them on a regular basis.

# Don't give out too much personal information on your social networking sites.

# Protect your children by installing antivirus software parental controls.

No comments:

Post a Comment