TN ICT teachers team creates awareness among the society about cyber crime and cyber safety measures which a teacher must aware and train the students the points to remember about cyber crimes and how to follow cyber security rules.
Today internet computer smartphones and other communication technology devices have become an integral part of our life. imagine how much time we spend each day on the smart devices we have made internet communication mediums like Google emails WhatsApp, Twitter, Facebook etc., Part and parcel of our everyday activities. But most of us are unaware of Cyber safety and cyber security essential to safeguard ourselves.
Note do you know that whatever information or personal details are shared on internet stay online forever as it is extremely difficult to delete the information completely.
What are Cyber Crimes
Cyber crimes are offences that may be committed against individuals, companies or institutions by using computers, internet or mobile technology. cyber criminals use platforms as such as social networking sites, emails, chat rooms, pirated software, websites etc to attack victims. Children are also vulnerable to various types of Cyber crimes.
cyber attack are becoming more complex and sophisticated and are increasingly targeted on stealing the personal information such as phone number at this photographs bank detail etc. the personal information can be used by cyber criminals against you in different ways like creating your fake profile cyber bullying etc.
Common ways used by Cyber Criminals
Malware
Malware, or malicious software, is any program or file that is harmful to a computer user. Types of malware can include computer viruses, worms, Trojan horses and spyware. These malicious programs can perform a variety of different functions such as stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring users' computer activity without their permission.
How malware works
Malware authors use a variety of physical and virtual means to spread malware that infect devices and networks. For example, malicious programs can be delivered to a system with a USB drive or can spread over the internet through drive-by downloads, which automatically download malicious programs to systems without the user's approval or knowledge. Phishing attacks are another common type of malware delivery where emails disguised as legitimate messages contain malicious links or attachments that can deliver the malware executable to unsuspecting users. Sophisticated malware attacks often feature the use of a command-and-control server that allows threat actors to communicate with the infected systems, exfiltrate sensitive data and even remotely control the compromised device or server.
Common types of malware
Different types of malware contain unique traits and characteristics.
Types of malware include:
A virus is the most common type of malware which can execute itself and spread by infecting other programs or files.
A worm can self-replicate without a host program and typically spreads without any human interaction or directives from the malware authors.
A Trojan horse is designed to appear as a legitimate program in order to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.
Spyware is made to collect information and data on the device user and observe their activity without their knowledge.
Ransomware is designed to infect a user's system and encrypt the data. Cybercriminals then demand a ransom payment from the victim in exchange for decrypting the system's data.
A rootkit is created to obtain administrator-level access to the victim's system. Once installed, the program gives threat actors root or privileged access to the system.
A backdoor virus or remote access Trojan (RAT) secretly creates a backdoor into an infected system that allows threat actors to remotely access it without alerting the user or the system's security programs.
Adware is used to track a user’s browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase. For example, an advertiser might use cookies to track the web pages a user visits to better target advertising.
Keyloggers, also called system monitors, are used to see nearly everything a user does on their computer. This includes emails, opened web-pages, programs and keystrokes.
Malware, particularly spyware, is malicious software disguised as software designed to collect and transmit private information, such as passwords, without the user's consent or knowledge. They are often distributed through e-mail, software and files from unofficial locations. Malware is one of the most prevalent security concerns as often it is impossible to determine whether a file is infected, despite the source of the file.
Phishing is a type of scam where the scammers disguise as a trustworthy source in attempt to obtain private information such as passwords, and credit card information, etc. through the internet. Phishing often occurs through emails and instant messaging and may contain links to websites that direct the user to enter their private information. These fake websites are often designed to look identical to their legitimate counterparts to avoid suspicion from the user.
Internet scams
Internet scams are schemes that deceive the user in various ways in attempt to take advantage of them. Internet scams often aim to cheat the victim of personal property directly rather than personal information through false promises, confidence tricks and more.
Personal safety
The growth of the internet gave rise to many important services accessible to anyone with a connection. One of these important services is digital communication. While this service allowed communication with others through the internet, this also allowed the communication with malicious users. While malicious users often use the internet for personal gain, this may not be limited to financial/material gain. This is especially a concern to parents and children, as children are often targets of these malicious users. Common threats to personal safety include: phishing, internet scams, malware, cyberstalking, cyberbullying, online predictions and sextortion.
Cyberstalking
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization. It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment.
Cyberbullying
Cyber bullying is the attack upon an individual or group through the use of electronic means such as instant messaging, social media, e-mail and other forms of online communication with the intent to abuse, intimidate, or overpower.
Internet safety or online safety Internet safety or online safety is trying to be safe on the internet and is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general.
Sensitive information such as personal information and identity, passwords are often associated with personal property (for example, bank accounts) and privacy and may present security concerns if leaked. Unauthorized access and usage of private information may result in consequence such as identity theft, as well as theft of property.
Post a Comment