INTERNET SECURITY IS THE GUARD FOR YOU
- Get link
- Other Apps
We hear a lot of people saying that we had this account hacked, our bank details being hacked and same happens in big and small companies too. We all become victim of cybercrime or cyber threat. So let’s see here how we can defend all these threats?
What Is Internet Security?Internet
security is that the application of data security to the sector of
computing and applies both to information stored on computers and to
information transmitted over the communications network, such as the internet.
Because It Is Important?
The value of the information
itself must be kept in mind. Let's think about bank details, passwords, photos
or even our hobbies. All this is very important and must be protected, because
there is always the possibility that someone outside of us misuses it.
Technologies Used Against Internet Security
We can classify the technologies
used against internet security into two large groups: Social and Technical.
In the case of social
technologies, great computer skills aren't needed. They are supported applying
deception methods to computing and always require the voluntary intervention of
the user of the system.
The technical engineering does
require high knowledge about computer and, unlike social type technologies
don't require the intervention of the user of the system.
Phishing
Phishing is the typical example
of a social security attack. It consists of the impersonation of a trusted
entity through a link in the email in order to obtain the credentials. The user
receives an email that features logos or images that have been collected from
the actual website to which the fraudulent message refers and with the request
that they click on a link in the email. This link will take us to a fake
website and ask for our credentials.
The main advice to protect
yourself from phishing is to never access web pages through links provided by
email.
Malware
Viruses, Trojans and worms belong
to the category of technical engineering and would allow taking control of
remote computers or modifying their operation and capturing information
(Keyloggers).
The Keyloggers are specific tools
designed to record keystrokes keyboard of a computer to save them in a file and
send it via internet. Thanks to this program, criminals can steal a large
volume of confidential information without the victim being aware of it.
To protect ourselves from
malware, we must avoid downloading and installing unknown programs. It is very
important to keep the operating system and all installed programs up to date.
Pharming
Pharming requires advanced
computer skills and consists of modifying the information provided by DNS to
impersonate a trusted entity.
The pharming is a form of online
fraud very similar to phishing in that fake websites are used, but unlike phishing
not required that the victim accepts a message "decoy" as pharming
redirects its victims to the site Fake web, even if you correctly type the web
address of your bank or other online service in your internet browser.
How does our computer know which
IP address corresponds to the bank's website that we just put in the Internet
browser? The first thing it does is consult a file of the operating system,
generally called hosts, where it stores some IP addresses widely used by our
equipment, and if it does not have it, it makes a query to our service provider
(the one that gives us Internet access) and it tells you what the IP address
is.
The most common way of suffering
a pharming attack is due to someone accessing our computer and replacing our
hosts file with false IP addresses. Therefore, the best way to protect our
system against these attacks is to have a good antivirus installed and to keep
it updated.
Man in the Middle (MITM)
It consists of capturing the
traffic between sender and receiver to obtain information. For example, in an
email MITM attack, the attacker could redirect all emails to an alternate
address or modify the information before sending it to the correct recipient.
Another example we can have when
we connect our Smartphone to an unencrypted Wi-Fi network, the attacker could
have access to everything we do.
The best way to protect yourself
against these attacks is to connect through known and secure networks and check
the validity of the certificates provided by the browsers.
Conclusion
Much of the computer security is
within our backup on cloud, ensuring that our computers have the latest
operating system and antivirus updates installed and not downloading and
installing programs from websites that we do not trust.
- Get link
- Other Apps
Comments
Post a Comment