3 minute read
Introduction to Cybersecurity
When using computers, tablets or smartphones for internet banking, online shopping, sending and receiving emails or social media, it is vital to take necessary steps to prevent hackers and cybercriminals from getting hold of your data.
We all spend more time online, which means more opportunities for cybercriminals to carry out cyberattacks by targeting people and businesses using:
- Email and website scams
- Malware software that can damage your device or let a hacker into your computer system.
If hackers get into your device or accounts, they could access your money, your personal information, or information about your organisation.
Cybersecurity is all about protecting the devices we use and services we access while online, either at home or work and preventing unauthorised access, theft of valuable information and sensitive data or damage caused by cyber-attacks.
Who are Cybercriminals?
Not all cybercriminals are hooded young male individuals (black hats), but a varied group of malicious attackers young, and old, men and women, from all over the world driven by a range of devious motives.
Black Hats unofficial mascot is the image of Guy Fawkes, known as hackers often working in gang’s and using computer systems to gain access to business and personal information for malicious and exploitive purposes.
However, cybercriminals are difficult to identify due to the cunning and shady security measures they use to protect their identity.
The growth of the cybercriminal network globally is due to the increased use of the internet opening a window of opportunity for financial incentives, has created a number of different types of cybercriminals, many of which present a major threat to individuals, organisations and even governments.
Types of Cyberattacks
There are many ways cybercriminals hack into a website or computer networks. Below are some of the most common methods used.
A type of malicious software whose intent is to exploit a user’s vulnerability when they click on a dangerous link or open an email attachment that subsequently installs malicious software on their computer.
Once infected, malware can obtain information by retrieving data from the hard drive disrupting the computer system and making it inoperable.
Types of Malware attacks:
A virus is a specific type of malware that infect software applications and computer files and then self-replicates by inserting its code into other programs in the computer system.
Typically hidden in an email from someone you know and click on what looks like a legitimate link, application or attachment. Once downloaded and opened it installs malware and takes control of your device.
How to avoid a Cyberattack
The full guide describes the types of cyberattacks, and the steps to take to avoid them.
Follow, like, share and subscribe
All images images, photographs and videos used on this website, are purchased, free stock, or CC0 and accredited to the artist where possible.