test

15

Nov, 2021

     Isn\'t it attractive that with a quick click, you can book a vacation, you can order anything and have it delivered to your place? No one can deny that the internet makes life more accessible, and many dreams may become realizable. However, it can manifest someone\'s worst nightmares. Imagine the idea that whenever you connect to the internet, there is probably someone out there who sneaks a peek. And your privacy is ready to be exposed anytime. Well, convenience always comes with a price. Multiple research shows the ease with which cybercriminals reveal data and people\'s privacy. Therefore, people often put a sticker on their webcam because they only trust that physical paper between the lens and them. And, that is not paranoid; it is rational. Neither the security of your systems nor the security of your devices can be trusted. As Marcus J.Ranum states that one person\'s \"paranoia\" is another person\'s engineering redundancy.

 

1- Common Types of Cyberattacks

With cyber-attacks on the rise, everyone should be aware of their types and how to tackle them. There are dozens of cyberattacks, and these three that follow are the most common types.

a) Malware attack

In other terms, it is called malicious software. You must be aware that multiple and unwanted software can be installed in your system without knowing it. Therefore, your data can be stolen or destroyed. You should always verify all the sites and the links and never click on suspicious ones. Also, using antivirus software is necessary; it helps you detect and prevent any malware threat. For instance, Avast Antivirus is the popular one www.avast.com

b) Phishing Attack

It is a combination of social engineering and technology. An attacker appears to send emails from trusted, legitimate sources. Once the victim opens the mail and clicks on the link, the hacker succeeds in grabbing confidential information and gaining access to data. To avoid this attack, you should always analyze email headers and ensure that the parameters for \"Reply-to\" and \"Return-path\" lead to the same domain presented in the email.

c) Men in the middle attack

In this attack, the attacker positions himself between two-party communication, the victim and the network server. You get disconnected from the server, then your IP will be replaced with the attacker\'s IP, and the server network continues to believe that the communication is still with the actual customer. The messages can also be edited before they reach their destinations. The only prevention from this attack is using encryption on your devices and adopting Virtual Private Networks. It is worth noting that that one attack may lead to other attacks.

 

2- How to be secure online?

James Scott says that there is no silver bullet solution with cyber security; a layered defence is the only viable defence. Although cybercrime can not be eliminated, being aware of the steps that should be taken, a safe passage through the Web can be ensured.

a) Adopt Multiple Factor Authentication

Multiple factor authentication is an extra layer of security. Even if the password is hacked, nothing can be done unless access to another factor authentication is obtained. Whenever someone tries to log in to a new device, a security code will be sent to you in order to allow access. There are several authentication methods, among them: a knowledge factor ( PIN ), a possession factor ( ID card ), biometric factor ( fingerprint ), etc. You can download the application Google Authenticator, available for both android and iOS.

b) Always Use a VPN

A virtual private network is a barrier between you and the hacker. While using a VPN, your online identity is masked, your data, IP address, and location are encrypted. For instance, many people use VPN to surf on sites that are banned in their countries, so they use VPN to access geolocation-blocked content. Some employees use VPS for work, especially those who work from home during covid 19. It is evident that paid VPNs are more trustworthy; if you use a free VPN, this freedom may come at the cost of security.

c) Choose your Passwords Wisely

Using a hard-to-guess password is the first line of defence. Instead of using a loved one\'s name, it is more clever to use a quote from a book that you have read or a lyric from a song that you have heard with both uppercase and lowercase letters, also by making a combination of numbers and special characters. Using the same password for all accounts because you have a bad memory is not a smart move. Passwords need to be changed often, and bear in mind that any word found in the dictionary is easily crackable, so do not refer to the dictionary for inspiration; choose random passwords. If you want to know your password\'s strength, you can check this link www.howstrongismypassword.net

d) Practice Safe Purchasing.

Before shopping online, it is indispensable to check the site\'s address. the website\'s URL should always start with \"HTTPS://\" instead of just \"HTTP://\" the \'s\' at the end makes all the difference. This indicates that the website is secure and your connection is encrypted. Also, before any financial transaction, it is necessary to ensure that the website is devoided grammar errors and misspellings.

e) Stay Updated

Every system and each application needs to be updated regularly. In addition to adding new features, any violation of security can be avoided, and vulnerabilities will be removed. There is an infinite challenge between companies and hackers. Whenever an update is released, bugs and holes are exploited by cybercriminals. Therefore, Make sure that you always get alerted and notified of new releases of updates. A good defence requires a good offence. Indeed, understanding the risks that we are exposed to helps us avoid potential threats.

 

Conclusion

 

\"If you think that your small computer could not become an object of offence because it is very small, then you are mistaken. Even if it doesn\'t contain anything worthwhile, it could be perfectly used for breaking in other, more significant systems.\" (A. Zaharchenko, Futurology without future [Computerra], 2002). Indeed, you may be a regular person who has nothing to hide. However, with the continued warning about technology and alarming statistics, you need barriers while surfing the Web, just as you need curtains in front of your windows. Cyber security has become vital for everyone. Once the internet is introduced to your life, a record of each and every click is left behind you. Thus, security must always be kept beside.

Transat Télecom Blog Team Auteur

S'incrire à la lettre d'information