AWARENESS OF CYBER SECURITY


Cybersecurity is the body of technologies, processes, and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context, security includes both cybersecurity and physical security.



Elements of cybersecurity include:


  • Application security
  • Information security                               
  • Network security
  • Disaster recovery/business continuity planning
  • Operational security
  • End-user education

Why is cybersecurity important to us: 


 Help in Understanding the risk and preventing harm:

Using the Internet has become an integral part of life in the modern world. From communicating via email and instant message to traveling, banking, and shopping, nearly every aspect of our life revolves around the cyber world. Because the Internet is so widely used, protecting vital information in the cyber world is not only our responsibility but a necessity to preserve our national security.



How am I at risk:


Unauthorized users that invade a system are commonly known as hackers, and hackers have a wide variety of tools to harm a computer system. Hackers usually gain access to systems by planting malicious logic (like a virus) somewhere on the net and waiting for users to encounter or open the virus.






Common ways a computer can become infected are:
  • Opening an email attachment that contains malicious logic.
  • Visiting a malicious website
  • Clicking on a dangerous link
  • Inadvertently downloading a harmful program.

         What kind of damages a hacker can do:


Infected computer systems may be affected and damaged in a variety of ways, sometimes without a user even noticing. Some hackers are “playing a prank,” while others may be attempting to steal personal information such as credit card numbers, Social Security numbers, or other personal information. Even worse, hackers can take control of an infected computer and use it to launch an attack on a larger system. Even if your computer has no stored sensitive data, it can still be used to infect other computers without your knowledge! This practice is so prevalent that access to vulnerable or infected computers is bought and sold by hackers.

How can I protect Myself:

Most hackers use malicious logic to exploit vulnerabilities in software and gain unauthorized
access to computer systems. For this reason, it is vitally important to install and update anti-virus, antispyware and firewall software. Because new vulnerabilities in computer systems are found everyday, computer companies “patch” these vulnerabilities by issuing a series of system updates.


To ensure your computer is safe from known vulnerabilities, make sure to install all updates on a regular basis. Some other basic security measures include:


  • Creating a strong password that has at least nine characters, contains a capital letter, uses a special character (such as #,! %,*) and includes a number.
  • Consistently track your credit information so that if your computer is infected, you can minimize damage.
  • Back up important information on your computer.
  • Scan your computer for viruses, spyware, and other vulnerabilities on a routine basis
  • Only visit websites you trust, and open emails only

If the website is being hacked or your phone has been lost so recovering the data is more important.so to recover any of the data which you have lost can be recover. just call Reverseng.com
contact: 9461455009
or mail us at info@reverseng.com





Comments