2 years ago
We visit the internet everyday using our phones. We download files, create and sign into our social media accounts and keep pieces of information on our devices. More importantly, these devices and the ATM also hold some of our finances. Even though these precious data may be safe from physical attack, they are still prone to attack from hackers and other attackers. This form of attack is known as cyber-attack. And just like how humans seek security from security men and police to avoid physical endangerment, these attacks are also prevented by what is termed cyber security.
Cyber-security is a security system that protects software and hardware components of devices from being hacked and being attacked in other cyber forms as well as protecting the services these devices come with. Still advancing with technology, an amateur can think of a simple Facebook log in and log out. Such a measure is put in place to ensure no one has access to the profile of the individual unless he permits it by providing the person with a secret password. However, with cyber-attacks coming in more dangerous forms, other security forms such as network securities, cloud securities and application securities have been put in place to ensure devices are well protected.
Malware is a file or a program that harms a computer. It accompanies mostly downloaded files and infect devices with virus. Anti-virus programs are able to protect devices by performing scans and quarantining or destroying such viruses. Every computer also comes with firewall and this helps the computer to deny access or even block any malware. Ransomware is another attack which requires users to pay attackers before they unlock victim’s data. This is a common experience on WhatsApp platforms with hackers from World Remit for example impersonating other accounts to advertise their dealings. To protect this application, private messages are enhanced with end-to-end encryption to ensure only sender and receiver see messages. A two-step verification process which requires a 6-digit pin has also been put in place to ensure the accounts of users of this application are protected. Cyber security may come in the form of just one factor which includes just username and password. This is mostly seen in network security during WiFi and Hotspot set-up to prevent hackers from intercepting networks and attacking valuable data in the process. In other cases, it might be a two-factor authentication; thus, the username and password are accompanied by a card as seen in most credit card or even phone contact or g-mail as seen in some social media accounts. It may also come as a third factor authentication; thus, the two factor plus something the user possesses such as eye scan verification or retinal scan, fingerprint authentication and facial recognition.
In spite of the protection offered by the computer or devices, they will still be used by humans. Hence it is important that staff in businesses are well-trained in order to install cyber-security forms in all necessary departments. The public must also be thoroughly educated to create an awareness on cyber-attacks and how to stop them. This is necessary because with the advancement of technology comes more and more attacks and the loss of valuable data and hence it is important to protect our devices
Total Comments: 0