Troubles in cyber security - The inexorable cyber terrorisms

https://f002.backblazeb2.com/b2api/v1/b2_download_file_by_id?fileId=4_za8a2358db1d7f91b68b30916_f102a239ea6318ed2_d20220819_m052538_c002_v0001170_t0020_u01660886738775

During and even after the pandemic, since, everything has gone online, every individual in  
society knows very well to make use of any electronic gadget. Communication among people is built strongly only when they’re connected online. This without any doubt makes use of something called “INTERNET” which can be a boon or a bane. 

Many of us have to know how dark this internet is behind the screen. We only look at the 
overview of everything on the internet and so respond to it, but once in a while, we need to know what happens on the other side, if we handle the internet without any basic knowledge about it. 
 

That is how cybercrimes play a very important role. 

Cybercrime is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrime may harm someone's security and financial health. 

Cybercrime, also called computer crime, is the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy.  
 

Business email compromise: 

An attacker targets a business to defraud the company. A business email compromise is a large and growing problem that targets organizations of all sizes across every industry around the world. 

Gaining unauthorized access to a trusted vendor or an employee's email account to assume their identity to make fraudulent payment requests or changes in bank data. 

 

Phishing - smishing - malware: 

Deceptive email, telephone, and text messages that appear to be valid resources, only when after you click, your data can get a way to be accessed by the authors.

Infected links, attachments, and pictures  allow attackers or hackers to access your private data or take control of your computer. 
 

Social engineering: 

Using the social networking sites or applications that can manipulate you to share your data and contacts.

Especially, the teenagers to get likes, followers and comments get trapped in this very easily. 
 

Cyber extortion: 

The cyber-criminal disables your confidential data and keeps it for blackmailing you to receive a payment. 

(Threatening someone with their embarrassing pictures to get a huge amount). 
A way to force someone to pay, by accusing them of irrelevant or undesirable issues. 
 

Data breach: 

It is a security violation, in which sensitive, protected, or confidential data is copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so.

Other terms are unintentional information disclosure, data leak, information leakage, and data spill.

A data breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system's owner. 

(Sending some sensitive data about someone to the wrong person via email – This says the attacker has gained the access to my email account very easily) 

 

Identity theft: 

It is when someone uses your data to commit any fraud. They apply for credits, file taxes or medical services, after which your name and reputation are spoiled, it can damage your status and it will cost you time and money to restore your good name. 

 

Cyberbullying: 

It is a form of harassment using electronics. It is also known as online bullying. It has become 
increasingly common, especially among teenagers, as the digital sphere has expanded and technology has advanced. 

 

Cyberbullying is when someone, typically a teenager, bullies or harasses others on the Internet and other digital spaces, particularly on social media sites. 

Harmful bullying behavior can include posting rumors, threats, sexual remarks, gossip about a victim's personal information, or pejorative labels about an innocent. 

  • Sending mean texts or IMs to someone. 

  • Pranking someone's cell phone. 

  • Hacking into someone's gaming or social networking profile. 

  • Being rude or mean to someone in an online game. 

  • Spreading secrets or rumors about people online. 

  • Pretending to be someone else to spread hurtful 

 

Ransomware: 

Ransomware is malware that employs encryption to hold a victim's information at ransom. A user or organization's critical data is encrypted so that they cannot access files, databases, or applications. 

This is done to threaten the business organizations and to make them pay a very huge amount of money. 

 

Account hacking: 

It is a process through which an individual's email account, computer account, or any other account associated with a computing device or service is stolen or hijacked by a hacker. 

It is done to: 

  • Steal your money and open credit card and bank accounts in your name. 

  • Ruin your credit. 

  • Request new account Personal Identification Numbers (PINs) or additional credit cards. 

  • Or sometimes, just to prove that the hijackers can do whatever they want. 

 

Cyberstalking:  

It is a crime in which someone harasses or stalks a victim using electronic or digital means, such as social media, email, instant messaging (IM), or messages posted to a discussion group or forum. 

Examples: 
Post rude, offensive, or suggestive comments online. Send threatening, controlling, or lewd messages or emails to the target. Use technology to threaten or blackmail the target. 

 

World-class learning for you       

– Start learning with Easy Shiksha today and get certified       

– Authorized certificate recognized everywhere 

Leave a Reply