What is Cyber Crime? How to Stay Secure? Complete Guide 2020

Besides Corruption and Population, the only thing which is also increasing in the world is Cyber Crime.

These is a digital/information age. All information is at the tip of our fingers. With so much ease, also comes the problem of theft of data or personal info or maybe any other such thing.

We all use smart devices but we don’t know how secure they are. From friend’s messages to financial details, from personal photographs to office emails everything is stored in our devices. Imagine just on a small device how much data we have, and if these are misused what havoc it can cause in your life, do not fear we’ve got you covered.

Let me simplify everything for you.
Before we get ahead we need to know what actually cyber crime is ?

In a simple meaning, Cyber crime means crime committed using a 
computer and the internet to steal Data or Information. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts.



Types of cyber crime

 Hacking
 Phishing
 Identity Theft
 Computer Viruses
 Ransomware
 Software Piracy
 DDoS Attack

Hacking

Hacking generally refers to unauthorized intrusion into a computer or a network. The person engaged in hacking activities is known as a hacker. This hacker may alter the system or security features to accomplish a goal that differs from the original purpose of the system. Hacking can also refer to non-malicious activities, usually involving unusual or improvised alterations to equipment or processes.


According to the dictionary, the definition of 
a computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem. If he is doing for the betterment of the product or services and his intent is pure it is ethical. But when he misuses these skills to gain or defy anyone than these becomes unethical.

Most of us have a default perception that hackers are bad 
persons who with their skills harm people. Everything has two sides. The same is the case with hackers.

Types of Hackers*

White Hat Hacker (Good Guy)
Grey Hat Hacker (Mixed intentions)
Black Hat Hacker (Bad Guy)

                                                    
(*There are many terms in the world of hacking to keep it simple I have kept  list small.)

Phishing


This type of attack involves hackers sending malicious/fake email 
attachments or URLs to users to gain access to their accounts or computer.

Cyber criminals are becoming more established and many of these 
emails are not flagged as spam. Users are tricked into emails claiming they need to change their password or update their billing information, giving criminals access.

When you log in through a phishing link the input you provide is send to attacker's side.

To understand it in a better way let me give you a very 
simple example.

Suppose your friend shares you a phishing link stating “I challenge 
you for these games. Log in through these links and let's play “your favourite” game". Your friend has sent you a phishing link of a fake Facebook login page/email page. You believed it was your friend and logged in through it for the sake of playing and competing. When you log in through these link. The email/username/mobile no.and password goes to your friend. Now your friend has your id and password.

Now he can see your chats, the images you shared, and other details.
Now these was your friend. What if it was a complete stranger?

The question you may think is why I will log in through a 
unknown link.The reason is greed and  ignorance. Many people have committed these mistakes.These types of links mainly offer some sort of benefit.

Ex: Login through this link and earn Rs. 500.
       Login to secure your bank account.

Computer Viruses



Most criminals take advantage of viruses to gain unauthorized 
access to systems and steal important data.

Hackers send viruses, malware, and Trojan, to infect and destroy 
computers, networks, and systems. Viruses can spread through removable devices and the internet.

When the virus enters your devices, it increases its spread and affects every system.

Software Piracy

The internet is filled with torrents and other programs that illegally duplicate original content, including songs, books, movies, albums, and software.

Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original.

Ransomware

Ransomware is one of the most destructive malware-based attacks.

It enters your computer network and encrypts files and information through public-key encryption. In 2016, over 638 million computer networks are affected by ransomware. In 2017,
over $5 billion is lost due to global ransomware.

DDoS Attack

This is an act by the criminals who flood the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the service he is entitled to access or provide.

Large networks of infected devices known as Botnets are created 
by depositing malware on users’ computers.The hacker then hacks into the system once the network is down.

Identity Theft

This cyber crime occurs when a criminal gains access to a user’s personal information to steal funds, access confidential information, or participate in tax or health insurance fraud.

They can also open a phone/internet account in your name, use your name to plan a criminal activity, and claim government benefits in your name.

They may do this by finding out user’s passwords through hacking, retrieving personal information.

Now, these discussions were about the type of cyber crime.

What’s the solution to it?

The best possible solution is being aware of the activity you do on the internet. I have mentioned a few more solutions below: 

- Be aware of the sites you provide your data.

Make sure you’re at the correct link for which you were headed. Phishing sites look very similar to original sites. But their URL is different. Also if you notice properly you will find other differences too. Whenever you go to a site check it's “https”. S in HTTPS means  secure socket layer, means it is relatively secure. If it's "https" you can give your password details. If its only "http" avoid giving your password details.



There can be instances when you go to a legit gmail.com and it's https also but it can be manipulated by SSL stripping attacks, which attacks a Wi-Fi network. You are going to a legitimate gmail.com, It will be https.gmail.com but you’re going to attacker’s page and the password will go to attacker. The easiest solution to these is two-factor authentication. It is explained later.

- Do not give unnecessary permissions to every app.

Ex: For Google maps to work properly it needs to use your GPS services. But what if it asked for the permission of the storage/gallery. For maps to function properly it doesn’t need access to your device's images and files. Google is a reputed company and we trust them and it won’t do such a thing.

But there are millions of apps on the app store and every app asks for permission. Before allowing permission to it, check whether the app need that permission to perform its function properly.

For example, if a simple torch or calculator has access to your gallery. But it doesn’t need those permissions to perform its function properly. Then your data is at risk. 

- Securing Password

Use always Strong password

Strong Password: (Numbers, Special Characters, Alphabet) Ex: {Xlnc}@#74
 
Weak Password: 12345678,  qwertyuiop ,abcd1234, “DOB”, “USERNAME” , “MOB NO” , etc.

Never use the same password for two different sites. And if you do always add a little variation.

- Use Two Factor Authentication.

What two-factor auth. does is every time you log in after entering your correct password, then it sends an OTP to your device, only after entering OTP  you can log in. Bring two-factor authentication in the application immediately for your devices security.

- Do not install applications from the non trusted sources, both on your laptops and mobile devices. Because they can infect your devices.

- Do not give your data to unauthentic sites. They can fill your email/mobile with spams.

- Update your devices regularly. These is an important thing which people miss out on.

- Is Antivirus a solution? I don’t think so. It can prevent you. But is up to you to use your common sense to be safe on the internet.

Cyber Security Is Everyone’s Responsibility.

Conclusions

The key to protecting yourself is being aware.

Do not take you online security and data for granted.  

There is a whole other world that exists in cyberspace… make sure that your information travels safely.

Technology is like a horse you have to ride it carefully.

Master it,have the reins in your hand, not the other way around.

Comments

Popular posts from this blog

Apple Marketing Philosophy | Steve Jobs

LEARN ADOBE PREMIERE PRO IN 10 MINUTES - Tutorial For Beginners

Tools for Trading