security data




SECURITY DATA








1.Hacking


"The process of accessing a computer system without permission"







Why do people try to hack into computer systems?
#
Hackers try to break into computers for the following reasons:
  • To cause damage to files and data by deleting or changing them
  • To commit fraud by stealing data (bank numbers etc)
  • To access sensitive information
  • Simply to see if they are clever enough to beat the system's security.


NOTE!
Some companies actually employ hackers as a way of testing how secure their security is.




Preventing Hacking and Hackers


Just as in the real world, there is no guaranteed way to stop someone breaking into a building (you can make it very difficult, but every security system has its weaknesses), there is also no guaranteed way to stop someone breaking into a computer system.

However, you can make it difficult enough so that a hacker moves on and looks for an easier target.



There are various methods you can use to help stop hackers from accessing your computer files and data. These include:
#. 1. Firewall's
#. 2. User-ID's and Robust Passwords 
#.

Firewall's

Firewall's provide a 'shield' between your computer and the Internet.

Firewall's can block unwanted data (including hackers) from reaching your computer. They can also stop your computer from connecting to unwanted websites.


User-ID's and Robust Passwords
U
User-ID'sA user-ID is usually a word or a number that identifies particular users as they log onto the computer system. 
User-ID's give people access to certain areas or files within the computer.
U
Robust Passwords (hard to guess)
A good password should be hard to guess. It should be made up of a combination of letter and numbers and changed regularly.
  • 2-Phishing:


Phishing is the nickname given to the sending of fraudulent
 e-mails that attempt to trick people into revealing details 
about their bank accounts, or other online accounts (e.g. Amazon, eBay, etc.) 




The 'phishers' then use these bank details to login to the victim's bank account and take their money.

This is an example of a phishing e-mail...
The e-mail looks very convincing. It even has the
 bank's logo.

 And it sounds urgent and scary... someone has tried to take money from our bank account! What should we do?! 



This is exactly the scare tactic that phishers use to make people panic.





If you were to click the link, you would be

 taken to a fake bank website. Then if you

 were to enter your login details, these would 

be recorded by the phishers and used to 

empty your real bank account.


How to protect yourself against 

phishing:



1.
Never give your bank details or passwords out over email.

(Banks NEVER ask their customers for this information)
2.
Phishing scams sometimes promise you enormous wealth.

For example:
 you might receive an email which says "We have recently discovered you have been mentioned in the will of *****. If you provide us with your bank account number we will deposit the sum of **** ".

Once you send your bank details, instead of depositing money the crooks will make off with your cash.

If something sounds too good to be true then it probably is and you would be best off ignoring the mail.
3.
Report any phishing attempts to your email account provider.
4.
Don't respond to emails from people you do not know.





3-Pharming


'Pharming' is similar to phishing, but instead of deceiving you (as phishing does), a pharming attack deceives your computer.

In a pharming attack, when you type in a completely genuine URL(e.g. for your online banking website), your computer is tricked into displaying a fake website (often a very accurate copy).

Then, when you try to login to the fake website, your username / password are recorded and used to take money from your real bank account.

It is very difficult to spot pharming attacks, because to the user everything seems to be normal.




How to protect yourself against pharming:



1.
Check the url (web address) of the website before you enter personal information.

The bogus website will have a slightly different address to the legitimate website.
2.
Make sure that you are on a secure website (one that is encrypted with SSL)before entering personal information.

Remember: the way to tell is to look at the url:

  • A secure website will begin with https
  • An unsecure website will begin with http.


No comments:

Post a Comment