Sunday 29 May 2016

DIGC POE Question 7



“From identity theft and fraud to corporate hacking attacks, cyber security has never been more important for businesses, organizations and governments” (Ellyatt, 2015).
There are many ways in which hackers obtain one’s details.

The first one is ransomware, this is a destructive new trend of malware, could lead to the ability for hackers to infiltrate systems, gather data and then wipe out the information to on systems and hard drives to cover tracks and thwart forensics.
The second one is when the Internet of thing becomes the internet of threats,
Hackers will continue to follow the path of least resistance as more and more devices are connected to the network.
The third one is social media attacks, this happened a because of the large number of users who spend their time in social networking regularly. This attract hackers and enable them to steal customer data by disguise themselves.
The fourth one is the Third-Party attacks. “Cyber criminals generally take the path of least resistance, and they’ve learned that contractors and other third-party providers can provide an opening into otherwise-secured corporate networks” (Bradley, 2015)
The fifth one is the Sophisticated DDoS Attacks. Here hackers do not still information but they simple overwhelmed your one’s site so that it keeps users from connecting.
One should be careful whilst using the Internet. By enforcing password policy, this will keep hackers from infiltrating in your details, one must secure his/her browsers by setting passwords to permit accesses only to authorised users and use an effective web security solution, this will protect one from trusted sites that he/she visits daily that may become hijacked at any time.

No comments:

Post a Comment