https://invisiblesecurity.blogspot.com/ https://knowledgeanitivirus.blogspot.com/ https://easydatasolutionshere.blogspot.com/ https://anitvirusecurity.blogspot.com/ https://letstechtalkwithus.blogspot.com/ https://computersecuritygossip.blogspot.com/ https://computersecurityinformations.blogspot.com https://computersecurityreviews.blogspot.com/ Techie- Tech: INTERNET SECURITY IS BOON

Wednesday, April 7, 2021

INTERNET SECURITY IS BOON

 

INTERNET SECURITY IS BOON

 


We hear a lot of people saying that we had this account hacked, our bank details being hacked and same happens in big and small companies too. We all become victim of cybercrime or cyber threat. So let’s see here how we can defend all these threats?

What Is Internet Security?

Internet security is that the application of data security to the sector of computing and applies both to information stored on computers and to information transmitted over the communications network, such as the internet.

Because It Is Important?

The value of the information itself must be kept in mind. Let's think about bank details, passwords, photos or even our hobbies. All this is very important and must be protected, because there is always the possibility that someone outside of us misuses it.

Technologies Used Against Internet Security

We can classify the technologies used against internet security into two large groups: Social and Technical.

In the case of social technologies, great computer skills aren't needed. They are supported applying deception methods to computing and always require the voluntary intervention of the user of the system.

The technical engineering does require high knowledge about computer and, unlike social type technologies don't require the intervention of the user of the system.

Phishing

Phishing is the typical example of a social security attack. It consists of the impersonation of a trusted entity through a link in the email in order to obtain the credentials. The user receives an email that features logos or images that have been collected from the actual website to which the fraudulent message refers and with the request that they click on a link in the email. This link will take us to a fake website and ask for our credentials.

The main advice to protect yourself from phishing is to never access web pages through links provided by email.

Malware

Viruses, Trojans and worms belong to the category of technical engineering and would allow taking control of remote computers or modifying their operation and capturing information (Keyloggers).

The Keyloggers are specific tools designed to record keystrokes keyboard of a computer to save them in a file and send it via internet. Thanks to this program, criminals can steal a large volume of confidential information without the victim being aware of it.

To protect ourselves from malware, we must avoid downloading and installing unknown programs. It is very important to keep the operating system and all installed programs up to date.

Pharming

Pharming requires advanced computer skills and consists of modifying the information provided by DNS to impersonate a trusted entity.

The pharming is a form of online fraud very similar to phishing in that fake websites are used, but unlike phishing not required that the victim accepts a message "decoy" as pharming redirects its victims to the site Fake web, even if you correctly type the web address of your bank or other online service in your internet browser.

How does our computer know which IP address corresponds to the bank's website that we just put in the Internet browser? The first thing it does is consult a file of the operating system, generally called hosts, where it stores some IP addresses widely used by our equipment, and if it does not have it, it makes a query to our service provider (the one that gives us Internet access) and it tells you what the IP address is.

The most common way of suffering a pharming attack is due to someone accessing our computer and replacing our hosts file with false IP addresses. Therefore, the best way to protect our system against these attacks is to have a good antivirus installed and to keep it updated.

Man in the Middle (MITM)

It consists of capturing the traffic between sender and receiver to obtain information. For example, in an email MITM attack, the attacker could redirect all emails to an alternate address or modify the information before sending it to the correct recipient.

Another example we can have when we connect our Smartphone to an unencrypted Wi-Fi network, the attacker could have access to everything we do.

The best way to protect yourself against these attacks is to connect through known and secure networks and check the validity of the certificates provided by the browsers.

Conclusion

Much of the computer security is within our backup on cloud, ensuring that our computers have the latest operating system and antivirus updates installed and not downloading and installing programs from websites that we do not trust.

 

No comments:

Difference Between Endpoint Protection & Antivirus Software

  Difference Between Endpoint Protection &  Antivirus Software With regards to cybersecurity, there are parcels and bunches of confusing...