Cyber Security
Cyber Security
by Simon Moss
Introduction
Until their computer or accounts are breached, many people underestimate the significance
of cybersecurity. Unfortunately, many people, including research candidates and supervisors, are
often the victims of these breaches. For example
many people are duped by emails that banks or other legitimate organizations have purportedly
sent—and refer you to a website that looks authentic—but are actually designed to obtain
sensitive information about you, such as passwords. This act is called phishing. Analogous texts
are called smishing; analogous telephone calls are called vishing.
similarly, people may receive emails from addresses that include the name of a friend or
reputable company, but are actually sent from hackers, called email spoofing
when researchers click on links or attachments from these websites, their computer may
become infected with malware, such as computer viruses, worms, or Trojans. Even attachments
that seem innocuous, such as txt files, might not actually be txt files
some research candidates and supervisors receive emails in which they are informed that, if they
do not pay a specific ransom, their details will be publicized or their computer blocked—called
ransomware
Passwords
Hackers utilize a variety of software programs to crack passwords. These programs can
integrate many sources of information on the internet—such as the name, birthdate, postcode,
relatives, and interests of a person to guess passwords. The programs can then attempt many
variations of these guesses until they identify the right password, called brute force attacks.
Quality of passwords
passwords that comprise a mixture of upper and lower case letters as well as numbers are hard
to identify—especially if they include special characters
instead of passwords, pass phrases—a sequence of words—are even harder to identify and
sometimes easier to remember
but, if the program can access and utilize information about you—such as details you specified
on social media—passwords that comprise post codes, birth dates, pet names, or other personal
numbers and words are easy to identify
if you swap particular letters with numbers, such as an l with a !, the password is hard to
identify.
Password practices
Besides suitable passwords, you might also need to abstain from practices that could
increase the likelihood that passwords are hacked. The following table illustrates some examples
Practice Justification
Do not permit computers to Sometimes, people might choose “Remember me”
remember passwords, such as when using a friend’s computer.
“Remember me”, unless you are Unfortunately, if someone else later borrows or
using a computer that nobody else purchases this computer, problems can unfold
uses
Refrain from sharing your password Unforeseen problems can unfold.
with other people They might inadvertently expose your password to
someone else, for example.
Do not use the same password for If one site is compromised, all your computer
every site. accounts might be hacked
Instead, perhaps record all your passwords in one
secure file—so you need to remember only one
password
Even in this file, use codes to obscure passwords, such
as “first_pet” instead of the actual name of this pet
If you forget your password, some For example, rather than “Smith”, you might always
websites will also present security begin with your initials, such as ABSmith
questions, such as “What is your Otherwise, hackers can utilize online information,
mother’s maiden name”. You such as your Facebook friends, to determine answers
should adapt the answers like maiden names.
Whenever possible, opt in to a 2 Sometimes, for example, to access a site, after you
phase or multiple phase enter a password, you need to a code that appeared
authentication on your phone
This 2 phase or multiple phase authentication tends to
enhance security
If granted the choice to opt in or opt out of this
security option, you should opt in
Change your passwords every 2 to 3
months if possible
Occasionally, researchers may receive emails from a bank or other renowned companies—
such as Apple, Google, Paypal, Yahoo, and Netflix—in which they are informed that some problem
has arisen. To solve the problem, the bank or company needs specific information, such as a
password or another personal detail. Although the website, email, voice message, or text might
seem legitimate, the message was actually designed to collect your personal details and to hack your
accounts. Sometimes, the website, email, text, or voice message is immediate suspicious because
Websites that present sexual content, support gambling, or offer free downloads are especially
likely to infect computers with malware. Nevertheless, many websites or emails that infect
computers do not appear to be suspicious. Because you cannot readily ascertain whether the
request is legitimate, you should apply the practices that appear in the following table to protect
your identity.
Avoiding malware
The following table outlines some, but not all, of the main variants of malware—software
that is designed to damage computers or computer systems. Malware is often downloaded onto
your computer after you press a specific link or email attachment.
Term Definition
Computer virus Malware that replicates and thus modifies other computer
programs, usually by inserting specific code
Computer worms Malware that replicates and spreads to other computers on a
network—in contrast to viruses that primarily spread to other
programs on one computer
Trojan horses Malware that appears to provide a useful function but actually
provides a harmful function to the computer or network
Keylogging malware Malware that records every key that someone enters and sends this
information to a hacker
Some malware will even activate your video to record your behavior
or voice.
Rootkits A collection of software programs that enable someone to access a
computer or software to which they are not permitted to access
To prevent malware or to diminish the effect of malware, you should
purchase anti-virus software; the software needs to be updated regularly to prevent recent
advances in malware, but these updates might cost some money
update your software when prompted, especially updates that relate to security.
Hackers often exploit children as well. To contain the likelihood and consequences of this
problem, children should be informed that
websites or emails in which individuals can earn free coins or tokens for a specific games are
often designed to install malware or collect personal information
entries on social media platforms are usually permanent; even if these entries are deleted, they
can be retrieved by some programmers and hackers
if you would not perform some act in person, do not perform this act online—such as begin a
conversation with a stranger
Even responsible children, however, can experience a range of problems online. They might,
for example, inadvertently violate copyright laws—a violation that can attract hefty fines. Thus, to
help parents monitor the online behaviour of their younger children, software developers have
introduced many parental control devices. The following table outlines some of these options. In
addition, you can use the search filters in most browsers.
Sometimes, people nearby can hack into your Wifi and thus install malware, culminating in a
range of complications. To diminish the likelihood of this problem, consider the following practices.
Physical breaches
Reporting spam
If you receive an email or message that may be spam but want to check, email report-
[email protected].