The crime that involves and uses computer devices and Internet, is known as cybercrime.
Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm.
Cybercrime can cause direct harm or indirect harm to whoever the victim is.
However, the largest threat of cybercrime is on the financial security of an individual as well as the government.
Cybercrime causes loss of billions of USD every year.
To quote the Department of Homeland Security:
“National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity, provide them with tools and resources needed to stay safe online, and increase the resiliency of the nation in the event of a cyber incident.”
Here are seven important safety tips for mobile device users as suggested by the Stop.Think.Connect. Toolkit:
Cybercrime can be committed against an individual or a group; it can also be committed against government and private organizations. It may be intended to harm someone’s reputation, physical harm, or even mental harm.
However, the largest threat of cybercrime is on the financial security of an individual as well as the government.
Cybercrime causes loss of billions of USD every year.
Types of Cybercrime
Let us now discuss the major types of cybercrime −Hacking
It is an illegal practice by which a hacker breaches the computer’s security system of someone for personal interest.Unwarranted mass-surveillance
Mass surveillance means surveillance of a substantial fraction of a group of people by the authority especially for the security purpose, but if someone does it for personal interest, it is considered as cybercrime.Copyright infringement
If someone infringes someone’s protected copyright without permission and publishes that with his own name, is known as copyright infringement.Money laundering
Illegal possession of money by an individual or an organization is known as money laundering. It typically involves transfers of money through foreign banks and/or legitimate business. In other words, it is the practice of transforming illegitimately earned money into the legitimate financial system.Cyber-extortion
When a hacker hacks someone’s email server, or computer system and demands money to reinstate the system, it is known as cyber-extortion.Cyber-terrorism
Normally, when someone hacks government’s security system or intimidates government or such a big organization to advance his political or social objectives by invading the security system through computer networks, it is known as cyber-terrorism.How Can You Youself?
It doesn’t matter who you are or what precautions you’ve taken, the cold hard fact is that if you’re on the Internet or networking in any fashion with any device you are vulnerable to attack by hackers, crackers and other malicious criminals. That’s just the way it is and you better plan accordingly.To quote the Department of Homeland Security:
“National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about cybersecurity, provide them with tools and resources needed to stay safe online, and increase the resiliency of the nation in the event of a cyber incident.”
Here are seven important safety tips for mobile device users as suggested by the Stop.Think.Connect. Toolkit:
- Use strong passwords. Change any default passwords on your mobile device to ones that would be difficult for someone to guess. Use different passwords for different programs and devices. Do not choose options that allow your device to remember your passwords.
- Keep software up to date. Install updates for apps and your device’s operating system as soon as they’re available. Keeping the software on your mobile device up to date will prevent attackers from being able to take advantage of known vulnerabilities.
- Disable remote connectivity. Some mobile devices are equipped with wireless technologies, such as Bluetooth, that can connect to other devices. Disable these features when they are not in use.
- Be careful what you post and when. Wait to post pictures from trips and events so that people do not know where to find you. Posting where you are also reminds others that your house is empty.
- Guard your mobile device. In order to prevent theft and unauthorized access, never leave your mobile device unattended in a public place and lock your device when it is not in use.
- Know your apps. Be sure to review and understand the details of an app before downloading and installing it. Be aware that apps may request access to your location and personal information. Delete any apps that you do not use regularly to increase your security.
- Know the available resources. Use the Federal Communications Commission’s Smartphone Security Checker.
Comments
Post a Comment