CYBERSECURITY
Until their computer or accounts are breached, many people underestimate the significance of
cybersecurity. Unfortunately, many people, including research candidates and supervisors, are often
the victims of these breaches. For example,
• Many people are duped by emails that banks or other legitimate organizations have
purportedly sent and refer you to a website that looks authentic but are designed to obtain
sensitive information about you, such as passwords. This act is called phishing. Analogous
texts are called smishing; analogous telephone calls are called vishing.
• Similarly, people may receive emails from addresses that include the name of a friend or
reputable company, but are sent from hackers, called email spoofing
• When researchers click on links or attachments from these websites, their computer may
become infected with malware, such as computer viruses, worms, or Trojans. Even
attachments that seem innocuous, such as txt files, might not actually be txt files
• Some research candidates and supervisors receive emails in which they are informed that, if
they do not pay a specific ransom, their details will be publicized or their computer blocked—
called ransomware
PASSWORD
Hackers utilize a variety of software programs to crack passwords. These programs can integrate
many sources of information on the internet such as the name, birthdate, postcode, relatives, and
interests of a person to guess passwords. The programs can then attempt many variations of these
guesses until they identify the right password, called brute force attacks.
QUALITY OF PASSWORDS
The website https://howsecureismypassword.net can be used to test the quality of your passwords.
You merely enter a password. The website then estimates how long before a brute force attack would
uncover the right password. For example, if your password was secure11, most programs could
uncover your password within about 1 minute. The following table presents estimates for other
passwords.
Password Estimate of time before
the password is identified
Password Estimate of time before the
password is identified
hello Instant hellofriends 4 weeks
hello11 2 seconds hellofriends11 5 thousand years
Hello11 1 minute Hellofriends11 10 million years
Hello11! 9 hours
Hello11!1 4 weeks
Hello11!5 4 weeks
AS THESE ILLUSTRATIONS SHOWS
• Passwords that comprise a mixture of upper- and lower-case letters as well as numbers are hard
to identify, especially if they include special characters
• Instead of passwords, pass phrases and a sequence of words are even harder to identify and
sometimes easier to remember
• But, if the program can access and utilize information about you such as details you specified on
social media, passwords that comprise post codes, birth dates, pet names, other personal
numbers and words are easy to identify
• If you swap letters with numbers, such as an “l” with a “!” the password is hard to identify.
PASSWORD PRACTICES
• Besides suitable passwords, you might also need to abstain from practices that could increase
the likelihood that passwords are hacked. The following table illustrates some examples
• Do not permit computers to remember passwords, such as “Remember me”, unless you are
using a computer that nobody else uses, Sometimes, people might choose “Remember me”
when using a friend’s computer. Unfortunately, if someone else later borrows or purchases
this computer, problems can unfold
• Refrain from sharing your password with other people, Unforeseen problems can unfold. They
might inadvertently expose your password to someone else, for example.
• Do not use the same password for every site. If one site is compromised, all your computer
accounts might be hacked. Instead, perhaps record all your passwords in one secure file so
you need to remember only one password. Even in this file, use codes to obscure passwords,
such as “first_pet” instead of the actual name of this pet
• If you forget your password, some websites will also present security questions, such as “What
is your mother’s maiden name”. You should adapt the answers for example, rather than
“Smith”, you might always begin with your initials, such as “ABSmith”, Otherwise, hackers can
utilize online information, such as your Facebook friends, to determine answers like maiden
names.
• Whenever possible, opt in to a 2 phase or multiple phase authentication, Sometimes, for
example, to access a site, after you enter a password, you need to code that appeared on your
phone
• These 2 phase or multiple phase authentication tends to enhance security, if granted the
choice to opt in or opt out of this security option, you should opt in
• Change your passwords every 2 to 3 months if possible
PROTECTING YOUR IDENTITY
Occasionally, researchers may receive emails from a bank or other renowned companies such as
Apple, Google, PayPal, Yahoo, and Netflix in which they are informed that some problem has arisen.
To solve the problem, the bank or company needs specific information, such as a password or another
personal detail. Although the website, email, voice message, or text might seem legitimate, the
message was designed to collect your personal details and to hack your accounts. Sometimes, the
website, email, text, or voice message is immediate suspicious because
• The grammar is poor
• Some unexpected names or words appear in the email address or web address
• The email address, web address, or hyperlinks entail misspellings or slight deviations from
common words, such as wikipedio
• The message was unexpectedly sent at a time outside usual business hours
• The message in stills a sense of urgency to prevent some problems
• The message refers to a common friend, or some other shared interest, but with limited
context
• The individual utilized a medium you did not expect; for example, a person who telephones
you maintains he is a member of the IT TEAM, yet the IT TEAM usually emails.
Websites that present sexual content, support gambling, or offer free downloads are especially likely
to infect computers with malware. Nevertheless, many websites or emails that infect computers do
not appear to be suspicious. Because you cannot readily ascertain whether the request is legitimate,
you should apply the practices that appear in the following table to protect your identity.
SUITABLE PRACTICES
• Never press a link in an email that a company has sent you. Instead, open a separate tab, and
visit the website directly, if a bank or another website has asked you to send personal
information, open a new tab and proceed to the website of this bank rather than click a link.
If the bank needs personal information, you should receive another request after you log in.
Never enter personal information into a website, unless you have accessed the website
yourself rather than merely responded to a link
• When you do utilize a website, check the web address begins with HTTPS - HTTPS implies the
website is more secure; that is, the information is encrypted using TLS or Transport Layer
Security. Nevertheless, not all HTTPS websites are legitimate
• Whenever you enter sensitive data, such as passwords to banks, do not use public Wi-Fi You
could wait until you return home, you could use your mobile hotspot
• Contact your bank, or peruse the bank policies, to assess how the organization protects you
from breaches to security, clarify your liability in response to these breaches, Clarify whether
you are insured against fraud
• In social media sites, withhold some personal information, do not include too many details
that hackers can use. For example, hackers might use this information to feign they know a
common friend or a representative of a relevant organization. The use of such information is
called spear phishing
• Be alert to psychological manipulations, for example, to gain access to a building, people
might pretend they have forgotten their swipe card and look embarrassed. Naturally, you
might want to help but you should be aware this person might be attempting to access some
information they could use nefariously
• Protect key numbers, Bank numbers and license card numbers, for example, should be
concealed and protected whenever possible
AVOIDING MALWARE
The following table outlines some, but not all, of the main variants of malware software that is
designed to damage computers or computer systems. Malware is often downloaded onto your
computer after you press a specific link or email attachment.
• COMPUTER VIRUS: Malware that replicates and thus modifies other computer programs,
usually by inserting specific code.
• COMPUTER WORMS: Malware that replicates and spreads to other computers on a network
in contrast to viruses that primarily spread to other programs on one computer.
• TROJAN HORSES: Malware that appears to provide a useful function but provides a harmful
function to the computer or network
• KEYLOGGING MALWARE: Malware that records every key that someone enters and sends this
information to a hacker. Some malware will even activate your video to record your behaviour
or voice.
• ROOTKITS: A collection of software programs that enable someone to access a computer or
software to which they are not permitted to access
To prevent malware or to diminish the effect of malware, you should
• Purchase anti-virus software; the software needs to be updated regularly to prevent recent
advances in malware, but these updates might cost some money
• Update your software when prompted, especially updates that relate to security.
PROTECTING CHILDREN ONLINE
Hackers often exploit children as well. To contain the likelihood and consequences of this problem,
children should be informed that
• Websites or emails in which individuals can earn free coins or tokens for specific games are often
designed to install malware or collect personal information
• Entries on social media platforms are usually permanent; even if these entries are deleted, they
can be retrieved by some programmers and hackers
• If you would not perform some act in person, do not perform this act online such as begin a
conversation with a stranger
Even responsible children, however, can experience a range of problems online. They might, for
example, inadvertently violate copyright laws a violation that can attract hefty fines. Thus, to help
parents monitor the online behaviour of their younger children, software developers have introduced
many parental control devices. The following table outlines some of these options. In addition, you
can use the search filters in most browsers.
• TEENSAFE: Enables parents to discreetly monitor the phone location, phone calls, texts, and
social media interactions of their children
• LIMITLY: Enables parents to block specific apps, set time limits on these apps, and review
which apps your child is accessing A free program
• BARK: Notifies parents when messages contain cyberbullying, sexting, and signs of depression
or suicidal thoughts. The program does not monitor or interfere with safe behaviors
• ESET PARENT CONTROL: Determines which apps and websites your child can and cannot
access, partly depending on the age of this child.
• OPENDNS: Options on your Wi-Fi that can prevent phishing and filter unsuitable content
SECURING YOUR HOME NETWORK
Sometimes, people nearby can hack into your Wi-Fi and thus install malware, culminating in a range
of complications. To diminish the likelihood of this problem, consider the following practices.
• Change your SSID or Surface Set Identifier, the SSID is the ID associated with your Wi-Fi and
often includes the manufacturer of your router or ISP, such as NETGEAR1424. If you Google
this manufacturer or ISP, you might be able to access information on how to change this name.
If you do not change the name, hackers know the router’s manufacturer and can use this
information to hack your network.
• Adjust the security options of the configuration settings of your router, for example, one
option might be to permit a password under WPA2 to enable encryption. You may also be
able to set up a firewall.
• If guests are staying in your house, activate the guest network, if available, they can then use
the internet but without access to anything else.
PHYSICAL BREACHES
Cybersecurity is not limited to emails, websites, or mobile telephones. To illustrate, individuals may
utilize physical encounters to breach security. The following table outlines some examples.
USE OF PHYSICAL ENCOUNTERS
TAILGATING:
• Individuals might follow you as you enter a secure building
• Individuals might loiter with a group of people such as a group of smokers and then enter the
building with this collective
• Individuals might pretend they have misplaced their security card and ask you to open a door
for them
• Individuals might wear a uniform to feign legitimacy
• Individuals might instead ask about the organization while loitering in the café
• Once they can access a network such as a computer at reception, they might instill a device
that monitors the network, called a sniffer
SHOULDER SURFING
Individuals may watch someone from behind type a password or some other information
USB
• Individuals might deliberately misplace a USB in a conspicuous location
• The USB, when inserted into a computer, could then infect this network.
• The USB might be labelled, such as “Payroll”, to elicit a sense of urgency or importance
• The USB could be sent from a purported vendor
• Even after individuals attempt to reformat and thus delete the files using right click, format,
and start the malware will tend to persist

More Related Content

PPTX
TheCyberThreatAndYou2_deck.pptx
PPTX
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
PPTX
Hyphenet Security Awareness Training
PPTX
Cyber Security Training Module 2025.pptx
PPTX
Hyphenet Security Awareness Training
PPTX
Cyber security-1.pptx
PPTX
Protect Your Computer From Viruses, Hackers,.pptx
PPTX
Internet Security
TheCyberThreatAndYou2_deck.pptx
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
Hyphenet Security Awareness Training
Cyber Security Training Module 2025.pptx
Hyphenet Security Awareness Training
Cyber security-1.pptx
Protect Your Computer From Viruses, Hackers,.pptx
Internet Security

Similar to The Significance of Cybersecurity and securing your system (20)

PPT
Unit-4 Cybercrimes-II Mobile and Wireless Devices.ppt
PDF
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
PPTX
securitya wareness dont miss it .pptx
PPTX
Cybersecurity Awareness Training for Employees.pptx
PPTX
Home and Business Computer Security 2014
PDF
Why is password protection a fallacy a point of view
PPTX
Computer / Internet Security
PPTX
Securityawareness
PPTX
securityawareness.pptx
PPTX
securityawareness.pptx
PPTX
Password protection
PDF
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
PPT
It security in healthcare
PPTX
Rules of Netiquette Empowerment Technologies Lesson
PPTX
Cyber privacy and password protection
PPTX
Identity Theft - by LINKS Technology
PPTX
Cybersecurity-Awareness-Month-2024-Cyber-101-PPT.pptx
PPTX
Cybersecurity-Awareness-Month-2024-Cyber-101-PPT.pptx
PPTX
Cyber security
Unit-4 Cybercrimes-II Mobile and Wireless Devices.ppt
Onlinesecurityrecomendations2014 141230081030-conversion-gate02
securitya wareness dont miss it .pptx
Cybersecurity Awareness Training for Employees.pptx
Home and Business Computer Security 2014
Why is password protection a fallacy a point of view
Computer / Internet Security
Securityawareness
securityawareness.pptx
securityawareness.pptx
Password protection
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
It security in healthcare
Rules of Netiquette Empowerment Technologies Lesson
Cyber privacy and password protection
Identity Theft - by LINKS Technology
Cybersecurity-Awareness-Month-2024-Cyber-101-PPT.pptx
Cybersecurity-Awareness-Month-2024-Cyber-101-PPT.pptx
Cyber security
Ad

More from Mahmud Hasan Tanvir (20)

PDF
A Web Based Application for Online Jewelry Shopping System
PPTX
Mastering Web-E Framework and Agile Process Principles, Activities, and Benef...
PPTX
Inside the Microprocessor Exploring Architecture, ALU, Control Unit, and Key ...
PPTX
Web Applications and Web Engineering.pptx
PPTX
Understanding Assembly Language Syntax, Advantages, and Comparison with Machi...
PPTX
Maximizing Network Efficiency: Exploring Shannon's and Nyquist Theorems, Band...
PPTX
Understanding Data Communication and Network Topologies for Effective Network...
PPTX
Understanding Transactions in Databases.pptx
PPTX
Introduction to C Programming: History, Applications, Variables, and Operator...
PPTX
System Development Life Cycle - Understanding the Design Phase.pptx
PPTX
Understanding Signal Conversion - Digital and Analog Conversion
PPTX
Understanding E-commerce: Online Shopping, Benefits, and Challenges in the Di...
PPTX
Atomic Structure: Fundamental Particles, Atomic Models, Quantum Numbers, and ...
PPTX
Key Programming Concepts: Delete and New Operators, Applications, Default Arg...
PPTX
Exploring the Internet Advantages, Disadvantages, and Cybercrime Awareness.pptx
PPTX
Linear Arrays in Programming: Array Length, Benefits, Drawbacks, and Memory L...
PPTX
Java Access Modifiers - Public, Private, Protected & Default
PPTX
Understanding Logical Equivalence in Discrete Mathematics with Examples
PPTX
Comprehensive Guide to Magnetic Quantities: Induction, Flux, Force, and More ...
PPTX
Diverse Applications of Radioisotopes - Overview and Importance
A Web Based Application for Online Jewelry Shopping System
Mastering Web-E Framework and Agile Process Principles, Activities, and Benef...
Inside the Microprocessor Exploring Architecture, ALU, Control Unit, and Key ...
Web Applications and Web Engineering.pptx
Understanding Assembly Language Syntax, Advantages, and Comparison with Machi...
Maximizing Network Efficiency: Exploring Shannon's and Nyquist Theorems, Band...
Understanding Data Communication and Network Topologies for Effective Network...
Understanding Transactions in Databases.pptx
Introduction to C Programming: History, Applications, Variables, and Operator...
System Development Life Cycle - Understanding the Design Phase.pptx
Understanding Signal Conversion - Digital and Analog Conversion
Understanding E-commerce: Online Shopping, Benefits, and Challenges in the Di...
Atomic Structure: Fundamental Particles, Atomic Models, Quantum Numbers, and ...
Key Programming Concepts: Delete and New Operators, Applications, Default Arg...
Exploring the Internet Advantages, Disadvantages, and Cybercrime Awareness.pptx
Linear Arrays in Programming: Array Length, Benefits, Drawbacks, and Memory L...
Java Access Modifiers - Public, Private, Protected & Default
Understanding Logical Equivalence in Discrete Mathematics with Examples
Comprehensive Guide to Magnetic Quantities: Induction, Flux, Force, and More ...
Diverse Applications of Radioisotopes - Overview and Importance
Ad

Recently uploaded (20)

PDF
Unlock new opportunities with location data.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPT
Geologic Time for studying geology for geologist
PDF
August Patch Tuesday
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Five Habits of High-Impact Board Members
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Architecture types and enterprise applications.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Getting Started with Data Integration: FME Form 101
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Tartificialntelligence_presentation.pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Unlock new opportunities with location data.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Geologic Time for studying geology for geologist
August Patch Tuesday
Assigned Numbers - 2025 - Bluetooth® Document
A contest of sentiment analysis: k-nearest neighbor versus neural network
Zenith AI: Advanced Artificial Intelligence
Five Habits of High-Impact Board Members
observCloud-Native Containerability and monitoring.pptx
Architecture types and enterprise applications.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
STKI Israel Market Study 2025 version august
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A comparative study of natural language inference in Swahili using monolingua...
Getting Started with Data Integration: FME Form 101
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
Tartificialntelligence_presentation.pptx
A review of recent deep learning applications in wood surface defect identifi...
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf

The Significance of Cybersecurity and securing your system

  • 1. CYBERSECURITY Until their computer or accounts are breached, many people underestimate the significance of cybersecurity. Unfortunately, many people, including research candidates and supervisors, are often the victims of these breaches. For example, • Many people are duped by emails that banks or other legitimate organizations have purportedly sent and refer you to a website that looks authentic but are designed to obtain sensitive information about you, such as passwords. This act is called phishing. Analogous texts are called smishing; analogous telephone calls are called vishing. • Similarly, people may receive emails from addresses that include the name of a friend or reputable company, but are sent from hackers, called email spoofing • When researchers click on links or attachments from these websites, their computer may become infected with malware, such as computer viruses, worms, or Trojans. Even attachments that seem innocuous, such as txt files, might not actually be txt files • Some research candidates and supervisors receive emails in which they are informed that, if they do not pay a specific ransom, their details will be publicized or their computer blocked— called ransomware PASSWORD Hackers utilize a variety of software programs to crack passwords. These programs can integrate many sources of information on the internet such as the name, birthdate, postcode, relatives, and interests of a person to guess passwords. The programs can then attempt many variations of these guesses until they identify the right password, called brute force attacks. QUALITY OF PASSWORDS The website https://howsecureismypassword.net can be used to test the quality of your passwords. You merely enter a password. The website then estimates how long before a brute force attack would uncover the right password. For example, if your password was secure11, most programs could uncover your password within about 1 minute. The following table presents estimates for other passwords. Password Estimate of time before the password is identified Password Estimate of time before the password is identified hello Instant hellofriends 4 weeks hello11 2 seconds hellofriends11 5 thousand years Hello11 1 minute Hellofriends11 10 million years Hello11! 9 hours Hello11!1 4 weeks Hello11!5 4 weeks AS THESE ILLUSTRATIONS SHOWS • Passwords that comprise a mixture of upper- and lower-case letters as well as numbers are hard to identify, especially if they include special characters
  • 2. • Instead of passwords, pass phrases and a sequence of words are even harder to identify and sometimes easier to remember • But, if the program can access and utilize information about you such as details you specified on social media, passwords that comprise post codes, birth dates, pet names, other personal numbers and words are easy to identify • If you swap letters with numbers, such as an “l” with a “!” the password is hard to identify. PASSWORD PRACTICES • Besides suitable passwords, you might also need to abstain from practices that could increase the likelihood that passwords are hacked. The following table illustrates some examples • Do not permit computers to remember passwords, such as “Remember me”, unless you are using a computer that nobody else uses, Sometimes, people might choose “Remember me” when using a friend’s computer. Unfortunately, if someone else later borrows or purchases this computer, problems can unfold • Refrain from sharing your password with other people, Unforeseen problems can unfold. They might inadvertently expose your password to someone else, for example. • Do not use the same password for every site. If one site is compromised, all your computer accounts might be hacked. Instead, perhaps record all your passwords in one secure file so you need to remember only one password. Even in this file, use codes to obscure passwords, such as “first_pet” instead of the actual name of this pet • If you forget your password, some websites will also present security questions, such as “What is your mother’s maiden name”. You should adapt the answers for example, rather than “Smith”, you might always begin with your initials, such as “ABSmith”, Otherwise, hackers can utilize online information, such as your Facebook friends, to determine answers like maiden names. • Whenever possible, opt in to a 2 phase or multiple phase authentication, Sometimes, for example, to access a site, after you enter a password, you need to code that appeared on your phone • These 2 phase or multiple phase authentication tends to enhance security, if granted the choice to opt in or opt out of this security option, you should opt in • Change your passwords every 2 to 3 months if possible PROTECTING YOUR IDENTITY Occasionally, researchers may receive emails from a bank or other renowned companies such as Apple, Google, PayPal, Yahoo, and Netflix in which they are informed that some problem has arisen. To solve the problem, the bank or company needs specific information, such as a password or another personal detail. Although the website, email, voice message, or text might seem legitimate, the message was designed to collect your personal details and to hack your accounts. Sometimes, the website, email, text, or voice message is immediate suspicious because • The grammar is poor • Some unexpected names or words appear in the email address or web address • The email address, web address, or hyperlinks entail misspellings or slight deviations from common words, such as wikipedio • The message was unexpectedly sent at a time outside usual business hours
  • 3. • The message in stills a sense of urgency to prevent some problems • The message refers to a common friend, or some other shared interest, but with limited context • The individual utilized a medium you did not expect; for example, a person who telephones you maintains he is a member of the IT TEAM, yet the IT TEAM usually emails. Websites that present sexual content, support gambling, or offer free downloads are especially likely to infect computers with malware. Nevertheless, many websites or emails that infect computers do not appear to be suspicious. Because you cannot readily ascertain whether the request is legitimate, you should apply the practices that appear in the following table to protect your identity. SUITABLE PRACTICES • Never press a link in an email that a company has sent you. Instead, open a separate tab, and visit the website directly, if a bank or another website has asked you to send personal information, open a new tab and proceed to the website of this bank rather than click a link. If the bank needs personal information, you should receive another request after you log in. Never enter personal information into a website, unless you have accessed the website yourself rather than merely responded to a link • When you do utilize a website, check the web address begins with HTTPS - HTTPS implies the website is more secure; that is, the information is encrypted using TLS or Transport Layer Security. Nevertheless, not all HTTPS websites are legitimate • Whenever you enter sensitive data, such as passwords to banks, do not use public Wi-Fi You could wait until you return home, you could use your mobile hotspot • Contact your bank, or peruse the bank policies, to assess how the organization protects you from breaches to security, clarify your liability in response to these breaches, Clarify whether you are insured against fraud • In social media sites, withhold some personal information, do not include too many details that hackers can use. For example, hackers might use this information to feign they know a common friend or a representative of a relevant organization. The use of such information is called spear phishing • Be alert to psychological manipulations, for example, to gain access to a building, people might pretend they have forgotten their swipe card and look embarrassed. Naturally, you might want to help but you should be aware this person might be attempting to access some information they could use nefariously • Protect key numbers, Bank numbers and license card numbers, for example, should be concealed and protected whenever possible AVOIDING MALWARE The following table outlines some, but not all, of the main variants of malware software that is designed to damage computers or computer systems. Malware is often downloaded onto your computer after you press a specific link or email attachment. • COMPUTER VIRUS: Malware that replicates and thus modifies other computer programs, usually by inserting specific code.
  • 4. • COMPUTER WORMS: Malware that replicates and spreads to other computers on a network in contrast to viruses that primarily spread to other programs on one computer. • TROJAN HORSES: Malware that appears to provide a useful function but provides a harmful function to the computer or network • KEYLOGGING MALWARE: Malware that records every key that someone enters and sends this information to a hacker. Some malware will even activate your video to record your behaviour or voice. • ROOTKITS: A collection of software programs that enable someone to access a computer or software to which they are not permitted to access To prevent malware or to diminish the effect of malware, you should • Purchase anti-virus software; the software needs to be updated regularly to prevent recent advances in malware, but these updates might cost some money • Update your software when prompted, especially updates that relate to security. PROTECTING CHILDREN ONLINE Hackers often exploit children as well. To contain the likelihood and consequences of this problem, children should be informed that • Websites or emails in which individuals can earn free coins or tokens for specific games are often designed to install malware or collect personal information • Entries on social media platforms are usually permanent; even if these entries are deleted, they can be retrieved by some programmers and hackers • If you would not perform some act in person, do not perform this act online such as begin a conversation with a stranger Even responsible children, however, can experience a range of problems online. They might, for example, inadvertently violate copyright laws a violation that can attract hefty fines. Thus, to help parents monitor the online behaviour of their younger children, software developers have introduced many parental control devices. The following table outlines some of these options. In addition, you can use the search filters in most browsers. • TEENSAFE: Enables parents to discreetly monitor the phone location, phone calls, texts, and social media interactions of their children • LIMITLY: Enables parents to block specific apps, set time limits on these apps, and review which apps your child is accessing A free program • BARK: Notifies parents when messages contain cyberbullying, sexting, and signs of depression or suicidal thoughts. The program does not monitor or interfere with safe behaviors • ESET PARENT CONTROL: Determines which apps and websites your child can and cannot access, partly depending on the age of this child. • OPENDNS: Options on your Wi-Fi that can prevent phishing and filter unsuitable content SECURING YOUR HOME NETWORK
  • 5. Sometimes, people nearby can hack into your Wi-Fi and thus install malware, culminating in a range of complications. To diminish the likelihood of this problem, consider the following practices. • Change your SSID or Surface Set Identifier, the SSID is the ID associated with your Wi-Fi and often includes the manufacturer of your router or ISP, such as NETGEAR1424. If you Google this manufacturer or ISP, you might be able to access information on how to change this name. If you do not change the name, hackers know the router’s manufacturer and can use this information to hack your network. • Adjust the security options of the configuration settings of your router, for example, one option might be to permit a password under WPA2 to enable encryption. You may also be able to set up a firewall. • If guests are staying in your house, activate the guest network, if available, they can then use the internet but without access to anything else. PHYSICAL BREACHES Cybersecurity is not limited to emails, websites, or mobile telephones. To illustrate, individuals may utilize physical encounters to breach security. The following table outlines some examples. USE OF PHYSICAL ENCOUNTERS TAILGATING: • Individuals might follow you as you enter a secure building • Individuals might loiter with a group of people such as a group of smokers and then enter the building with this collective • Individuals might pretend they have misplaced their security card and ask you to open a door for them • Individuals might wear a uniform to feign legitimacy • Individuals might instead ask about the organization while loitering in the café • Once they can access a network such as a computer at reception, they might instill a device that monitors the network, called a sniffer SHOULDER SURFING Individuals may watch someone from behind type a password or some other information USB • Individuals might deliberately misplace a USB in a conspicuous location • The USB, when inserted into a computer, could then infect this network. • The USB might be labelled, such as “Payroll”, to elicit a sense of urgency or importance • The USB could be sent from a purported vendor • Even after individuals attempt to reformat and thus delete the files using right click, format, and start the malware will tend to persist