Skip to main content

Cyber-Security and its importance in Modern Life of 2020


Cyber-Security and its importance in modern Life of 2020

Cyber-Security and its importance in Today`s Life



Computer has made our work too much easy. It has boosted our daily life routine by helping us in completing different kinds of task. It has helped us much in business, Education, Industrial Sector, Defense and Media. But when data increases it’s the responsibility of its protection also increasing with time. In past few cyber-crime has much increased now. There are thousands of cyber-attacks daily and even hundreds of different malwares are created daily. The number of black hat hackers has also been increasing so it is important for every computer user to must have the basic knowledge of cyber-security.
·      Why everyone must have basic knowledge of cyber-security?
It is important for every person to have basic knowledge of cyber-security. In Today`s life Computer Experts are creating different kinds of malware daily. There are hundreds of reason that you should know basics of cyber-security but some of these are enlisted below. If a user does not know the basics of computer security:
    1. His/her computer system can easily get infected with malware.        His / Her Privacy will be invaded easily.
    2. Their computer system can be easily hacked by black hat hackers.
    3. Their System can be used to harm other peoples.
    4. Their identity can be used to misguide others.
    5. Their system can be used for hacking and other type of cyber-crimes as a slave.
    6.  Their System can be used as a Zombie Drone for DDoS Attack(Distributed denial of service attack) or botnet. These are some reasons that you should know the basics of cyber-security for protection of their privacy.
·      How to create a strong Password?
For creating a strong password you should use combination of upper case letters, Lower case letters, Symbols and numbers. Because if you user only numbers or numbers with symbols they can be easily hacked with brute force attack or dictionary attack or if you use upper case letters or lower case letters only they are easy to hack with dictionary attacks. A strong password look like this:
                              (( `{[Tech 999” 111```Art’222]} ))
Hackers mainly use dictionary attack or brute force attack first to crack your password and if they are failed in both attacks they use Phishing attack which hacks your mind. Human mind is the weakest system in the world because there is no password on human brain. If you watch anything it is directly stored in your mind and you can`t delete because there is no option of delete in your mind. In Phishing attack hacker play a tricks on you to hack your password.
You should change your password once a weekly to ensure that your accounts are secure and if you can`t please try to change your password once a monthly.
Malware and Its types
Ø Malware
Malware is malicious software that is harmful for computer system. It is threat to computer user. It is created for blackmailing, spying, hacking systems.
The following are some its common types:
1.   Computer Virus
2.   Spyware
3.   Adware
4.   Worm
5.   Trojan
6.   Ransomware
i.                 Computer Virus:
It is dangerous computer program that disturbs the normal functioning of computer. Some viruses are not very harmful they are annoying while other can seriously damage the software/hardware of System. There are also viruses that destroyed nuclear equipment such as stuxnet and Triton. Most of the viruses are attached to executable (.exe) files. Thousands of viruses are created daily and ethical hackers fight with them and stop them from spreading.
ii.        Adware:
      Adware is type of malware that enters into   the system        when user downloads and uses pirated software. It show      ads on screen.
iii.          Spyware:
Spyware is a type of malware that are developed to spy on other users computer systems. There are many companies that creates spyware and put them in their client’s computers to see what they are doing? Most of the spywares are difficult to detect and remove from computer.
iv.             Trojan:
The working of Trojan is same as Trojan horse that was used in battle of Troy. Trojan is a type of malware that allow the attacker to control the working of victims system. It is one of the most dangerous type of malware. They are mainly used by black hat hackers for creating botnet
v.              Worm:
Worm is a type of malware that repeat itself again and again over internet. It can travel from one computer to another without any human action. It can be harmful.



vi.           Ransomware:
Ransomware is a type of malware that encrypts the file stored on computer of a victim. It is the most dangerous type of malware. It can enter into the computer from internet, through an E-mail etc. When it encrypts your file the attacker ask you send him/ her a money in bitcoins or any other cryptocurrency. When victim sends them a money which an attacker have demanded then attacker decrypt their files and give them their data back. A Ransomware named shade was started in nearly 2014 and shutdown in April 2020. When it shutdown it releases 750K decryption keys.
·      How malware can infect your Computer?
Malware enters into a system through a vulnerability in your Operating System. User should install anti-malware software`s to make sure that system is safe and secure. Viruses enters into the computer from infected external storage devices. It can enter into the computer from internet if user downloads infected software or serve an unsecure websites. Malware can infect your computer if you downloads an extension from chrome browser or any other. E-mail from strangers or anonymous address can infect your computer if you download them or open an attachment.
·      How to surf internet safely (Anonymous)?
You should surf internet anonymously so you will be safe & secure and it ensure that your privacy is protected. No one is able to track you and you should not post your personal information on Internet because internet is a public place. There are many advantages of staying anonymous. For staying anonymous you need to use a VPN (Virtual Private Network) which hides you and I would suggest you to use Tor Browser instead of Chrome Browser because tor browser hides your identity over internet by using proxies. If you want to use a paid VPN you can use Nord VPN otherwise if you want to use a free one you should use Proton VPN because it is best free VPN.

Comments

Popular posts from this blog

Why there is no Place like 127.0.0.1? | Explained

          Why Hackers say that there is no place like 127.0.0.1? 1.What is 127.0.0.1? It is IPv4 address(127.0.0.1) called localhost or loop back address. It does not allow you to communicate with other computers like your real IP address.It is also known as IIS(Internet Information service). The peoples say that their is no place like home in world same as Hackers  say that there is no place like 127.0.0.1.It means your own computer where you can test all your hacking attacks safely and testing something on localhost is totally legal.It is legal because you are not harming others. 2.How to Activate it? The following are the steps: Go to Control Panel Click on ``Programs and Features`` Then on left side you will see option ``Turn Windows Features on or off `` Click on it Scroll down and You will see option ``Internet Information services `` and then enable it. Now open chrome and search 127.0.0.1. Your localhost is enabled now and you ca...

Top 5 Best Microphones for Recording YouTube videos and Gaming

Top 5 Microphones for Gamer`s and New YouTubers The following are some best microphones with great audio recording capability available on amazon for YouTubers and Gamers under 50$. ZekPro USB Computer Microphone [Plug & Play] for Podcast Vocal Voice Studio Recording - 5ft -Mic Gaming PC YouTube Skype Desktop Laptop Omnidirectional Condenser Mute Button with LED [w/Travel Bag].($23.99) ENJOY SMOOTH RECORDING AND CLEAR SOUND WITH ZEKPRO USB COMPUTER MICROPHONE - are you looking for a computer microphone with a noise-canceling feature? Get this USB microphone with built-in advanced noise-canceling technology perfect for voice recording, podcasting, and chatting. It even comes with 2 wind muffs to filter wind noise, giving your money’s worth. INSTALL YOUR ZEKPRO USB MICROPHONE HASSLE-FREE - are you having a hard time installing drivers on your computer or laptop? Not anymore! This plug&play USB computer microphone has a built-in sound card. No need to install any ...

SpyMax malware that targeted Libyan Individuals

Spy Max (Spyware) || Newly found malwares in 2020 || Explained SpyMax: It belongs to surveillance ware family, SpyMax was found targeting Libyan Individuals. It masqueraded as “Corona Live 1.1” to steal photos, media, files, Device location, as well as permission to take pictures and record videos of individuals from infected phone.