Image by B_A from Pixabay
Cybercrime is a word we hear every time we see a news channel or read a news article. It has become the common word for this generation. Cybercrime started when technology started gaining widespread attention. The first known cyberattack was in 1834 when two thieves hacked the French telegraph network.
This incident was the first attack on telegraph technology, but it was not a computer. So the first attack using modern technology was the "Morris worm incident" in 1988. There were several attacks before this, but this attack gained massive attention and was considered the first cyber attack. It is also the first cyber attack to be convicted under cyber law in the United States.
Humans use technology (computers) to accomplish many incredible and helpful inventions. To be clear, let us look at some areas where technology makes our life simple.
So literally, technology is used in every nook and corner of our life. It is also safe to say that our lives have become dependent on computers and technology. So the chances of a cyberattack are possible in any field. So everyone who uses technology must have an awareness.
So let us look at some basic information about cyberattack and how to prevent it. We will also see what to do if you are under cyberattack.
Cybercrime is an attack or crime committed using a computer. All illegal and harmful activities using a computer or technology come under cybercrime. It is not just an attack on computers but also networks.
Cybercrime includes hacking, stealing data, cyber-terrorism, cyber attacks like malware and ransomware, fraud activities, etc. Let me tell you about some of them in detail.
Hacking is the illegal act of gaining access to one's devices or network. It includes stealing data from a person or gaining control of a system. The hackers can change your data, and steal your personal data like passwords and usernames. Some hackers use phishing, malware, ransomware, trojan virus, and any means to get your data.
You should know not all hackers are illegal. Some hackers hack to learn the security measures and find all possible ways that a hack can occur and helps prevent it. They are termed white hat hackers. The hackers who steal data and do illegal activities are known as black hat hackers.
Malware is malicious software, hence the name malware (malicious+software=malware). Malware is used to steal data, leak information, prevent you from accessing your system, and cause serious privacy issues. Trojans, ransomware, adware, viruses, etc are categories of malware.
Trojan viruses are hidden inside real and legit software or embedded in links sent through emails. In the case of emails, the mail usually encourages the users to click the link to get offers and other advantages. In the case of software, the trojan virus will be hidden inside what seems to be a legit file or application.
Usually, these applications are fake, or the virus is added to the legit application and downloadable from fake and illegal sites. So this is why experts suggest users download applications and files only from legal and authorized places. These trojans cause problems by stealing data and personal information or taking control of your system. It affects not only PC, and laptops but also phones.
Adware, as you can see, it is advertisement and malware. The primary work of this adware is to show ads, just random useless ads through pop-ups. Though they seem harmless, they are dangerous. These ads randomly show up and cause trouble, apart from irritating us with useless ads, they affect the system's performance.
They slow the device down and consume lots of data. It can also steal your personal data and other important files. They are usually downloaded along with applications you download.
Cyberterrorism is the act of committing terrorism using the internet: activities that result in loss of life and destruction and harm. Technology is used to spark fear among the population.
A more formal definition of cyber terrorism by NATO is "cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal."
If you still don't understand cyber terrorism (like me), just imagine movies like Die Hard 4: Live Free or Die Hard and Eagle Eye. These movies are based on cyber terrorism, where the villains try to inflict damage on the economy and human life.
First and foremost, do not install any application or files from 3rd party or malicious websites. Apart from the above step, if you wish to have more security for your devices, use anti-virus software. There are both paid and free versions choose the one that suits you.
While creating passwords, create strong passwords. According to cybernews.com, these are the top 10 most common passwords used in the world.
All platforms suggest that users create a strong password by using a combination of letters, symbols, numbers, and capital letters.
Be careful while clicking on links and files received through email. Several services can analyze the links for you. These links can be tempting to click, but beware, they can cause lots of damage.
Do not share sensitive and crucial information like your bank and personal details like PAN number or government id details with anyone. These details can be used to steal your money or identity.
Update your software. Because newer versions have better security features and constantly try to overcome all the security risks. Cyber attacks evolve continuously, so we must also enhance our security.
Have a firewall to protect your network. A Firewall acts as a gate between your network and the internet. So it does not allow unauthorized 3rd parties to access your network, and it does not allow devices in your network to access unauthorized sites.
Unfortunately, you are under a cyber attack (just for example). There are several steps you need to take during this crisis. The first and most important step is to contact the authorities if you are confident that you have been hacked.
If you are being hacked, disconnect from the internet and perform a scan on your devices and network. Next is to change all your usernames and passwords. Try to determine what data that has been hacked.
So I hope you got a basic and clear idea about what's a cyber attack, the types of attacks and how to prevent it, and if you have been hacked, the steps that need to be taken. There are more ways to steal data than the ones mentioned above, this is a very vast topic, and it cannot be fully covered in a single article. Technically it can be covered, but this article would be so long that half of the readers will sleep before finishing the introduction.
So goodbye. Take care and be safe.