“Cyber Security”

 Malware, spam, virus, cybersecurity

       In this modern society, we have things being invented to make our life easier and more comfortable.

        One of them is Cyber Security which is one that helps us. Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. Cyber security, also referred to as information technology security, focuses on protecting computers, networks.

     This is important to us especially to the governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of confidential information on computers and transmit that data across networks to other computers. With the growing volume and sophistication of cyber attacks, ongoing attention is required to protect sensitive business and personal information, as well as safeguard national security.

          Those who violate or attack these cyber security are named as cybercriminals. A cybercriminal is an individual who commits cybercrimes, where he/she makes use of the computer either as a tool or as a target or as both.

Cyber Security threats for this year:

*Retail Data Hacks

Retail hacks are a serious danger because they can impact virtually anyone. 2014 saw a rise in cyberattacks against large companies like Target, with hackers stealing 40 million customer credit and debit card numbers. Cybercriminals steal and sell this personal information on the black market, which can easily lead to identity theft. While much of the responsibility falls on the retailer, such as keeping their payment methods up to date and secure, keeping a close eye on your bank account and credit card statement is a good way to stay safe during retail attacks.

*Mobile Security & Smartphone Vulnerability Threats

Cybercriminals can easily exploit vulnerabilities in your mobile phone to obtain private data. These vulnerabilities sometimes come from the apps you use or within your smartphone itself. Mobile phones are also vulnerable to malware, which can log keystrokes and capture screenshots. Protect yourself by researching the apps you download, being careful with what emails you open, and which pictures you decide to upload.

*Identity Theft

One of the fastest growing online crimes is identity theft. Many of the points previously covered in this article can lead to identity theft, phishing emails and data breaches. However, your identity is also at risk through everyday materials such as your resume, home address, social media photos and videos, financial data, and so forth. Identity thieves will steal your personal information and open credit cards and loan accounts in your name.

*Targeting of Children by Sexual Predators

Users looking to exploit children lurk in dark corners of the internet to trade illegal, lewd photos of children. This is done over email, peer-to-peer programs, or, increasingly, through the dark web, an area of the internet that is inaccessible with standard search engines. While these are disturbing trends, it is best to leave these sites to law enforcement officials and for the average person to avoid them entirely.

Another online danger aimed at children is when sexual predators try and lure them into meeting off line, as well as either sending or asking for lewd, pornographic images. Make sure your children are well aware of the dangers of talking to strangers online and never to share personal information with people they’ve never met.

*Attacks on Banks

In the 21st century, bank robbing has gone digital. A famous example is when a criminal gang stole up to one billion dollars in about two years from a variety of financial institutions across the world. Cybercriminals targeted bank employees and officials with a malware called ‘Carbanak‘ through emails. Once they had successfully infected the targeted computers, the cybercriminals were able to successfully mimic the employees’ behavior and transfer money to themselves, direct ATMs to dispense money at certain times, and used e-payment systems to filter money.

Sources:
* https://www.techopedia.com/definition/27435/cybercriminal
* http://www.umuc.edu/cybersecurity/about/cybersecurity-basics.cfm
* https://usa.kaspersky.com/internet-security-center/threats/top-7-cyberthreats#.V9hp39KAOko

By:
Rusel II B. Feliscuzo
IT 314 🙂

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s