Web world of Cyber Crime & Cyber security

Author :- Awez Khan

Introduction.

The term Cyber-crime is also called computer technology crime the practice done by the computers and various types of networks to accomplish illegal activities such as spreading innumerable kinds of computer viruses, online harassment, thieving identities, violating privacy of the particular individuals, performing unauthorized electronic fund transfers, etc. Cyber-crime especially through the Internet, has grown rapidly in importance as the computer has become central to commerce, entertainment, and also to the government.

Types of cyber-crimes

Cyber-crime has vast ranges across a variety of activities at one end there are crimes that breaches the vital of personal or corporate privacy, such as muggings on the reliability of information held in digital depositories via online transferring and the use of illegally obtained digital information to  bribery for a firm or an individual. It also at this end of the range is the growing time of crime such as identity theft. The other range lie transaction based on crimes such as fraud, trafficking in digital piracy of the data, money laundering, and copying. These are specific crimes with specific victims, all this practices controlled by an individual or small and large group members behind from the “INTERNET”

How to get to know that you are trapped or not?

 As we know that sometimes it is so hard to recognize if you have been trapped in the cybercrime, some crimes that shows and leave clear symptoms and sign. 

  • Malware infection: Your system might be start running slowly and sending you various error and messages.
  • Phishing or pharming attacks: You’ll find apprehensive charges on your credit card or other negotiated accounts.
  • Key-loggers: You may see the strange icons or your messages might start adding duplicate text.
  • Botnet: If your computer becomes involved in a botnet, it may be hard to recognize at all.
  • Crypto-jacking: You’ll see that your electricity bills are increased with huge unexpected amount.

As you may see or fell that there is some unknown person who tries to intervene in your system and sudden decreases in performance in your PC, tablet, or mobile indicates that you may have been the target of a cyber-crime.

How to prevent yourself from cyber-crime

Now as in this situation the best and suitable way to protect yourself against this practice of cybercrime is to use functional digital habits. Here are some common-steps of browsing habits that will help you to defend on daily basis:

  • Beware of emails with sketchy links or attachments you didn’t expect and don’t know.
  • Don’t download anything from unknown sources.
  • Always do the regular software updates immediately (they fix security vulnerabilities)
  •  Don’t use any unencrypted public Wi-Fi (in coffee shops, airports, etc.) without a VPN.
  • Don’t share any password with anyone.
  • Change the password according to you with in the period of 3 months.

 

How to stop cyber-criminals?

There are some cyber-crooks and thieves it is not easy to catch them they can be very hard to stop, making wide solutions to cyber-crime. For specific cases of cyber-fraud, the people generally rely on the police, national security departments, and commercial cyber-security firms to fight with the bad guys. Let’s take the average of the computer user, it’s quite hard to go up against a cyber-crook. The best approach is to follow some common best practices. If you want to you can block the cyber-criminals from getting access into your devices, you will easily block them from making money off of to you this barricade helps to you as a safeguard.

Cyber Security

The term cyber security it is a type of security that provide protection to the computers and various networking nodes from the thefts that gives damage to the specially software, Hardware and made a stoppage for an unauthorized access. Implementation of the effective cyber security measures it is particularly challenging day to day because there are more E-devices than peoples, and the attackers are becoming more innovative and advanced in their fields by using the high-tech technologies to do the harm.

An effective cyber security has an approach to the multiple layers of protection that spread across the various Computers, Networks, Nodes, Programs, or Data that one intends to keep safe but in an organization, the peoples, processes, and technologies must all pair one another to create an effective shield from cyber-attacks. A integrated threat management system that can do the automate assimilations across select Cisco Cyber Security products and speed up the key security operations that performs various functions like Detection, Investigation, and Remediation from these we are easily get to know that we are suffering from cyber bullies or not. It’s not easy trap the location of the cyber-criminals but the security denied the access of the criminal whose intention is to provide harm to the users.

Types of Cyber securities

  • Critical infrastructure security: – It may consist of the cyber-physical systems that modern societies rely on. Common examples of critical infrastructure:
  • Electricity mesh
  • Water purification
  • Traffic lights
  • Shopping centers
  • Hospitals

Having the infrastructure of an electricity mesh on the internet makes it vulnerability to cyber-attacks. Many organizations that they have their responsibility for any critical infrastructures should perform due carefulness to understand the vulnerabilities and protect their business against them. The security and flexibility of this critical infrastructure is play vital towards our society’s safety and well-being.

  • Application security: – This application security as one of the several must-have security measures adopted to protect your systems. Application security uses software and hardware methods to tackle the external threats that can arise in the development stage of an application. Applications are much more available over networks, causing the adoption of security measures during the development phase to be a vital phase of the project.

Types of application security are available:

  • Paid Antivirus programs
  • Firewalls
  • Paid Encryption programs

These application help to ensure that unauthorized access is prevented from the attackers. Companies can also detect sensitive data properties and to protect them through specific application security procedures attached to these data sets.

Ø  Network Security: – In this practice of cyber security it is mainly concerned with outside extortions, network security guards against unauthorized invasion of your internal networks due to malicious intent. Network securities ensure that the internal networks are secure by protecting the infrastructure and inhibiting access to it. To help better it manage various network security monitoring, security teams are now using machine learning to flag abnormal circulation and alert to threats in real time. Network administrators continue to implement the numerous policies and procedures to prevent unauthorized access, modification and exploitation of the network

 

Types of network security implementation:

  • Extra logins
  • New passwords
  • Application security
  • Cloud Security: – Cloud security is a software-based security tool that protects and monitors the data in your cloud resources. Cloud providers are constantly creating and executing new security tools to help the enterprise or an individual user to better secure their data. People tend to believe that your data is more secure when it stored on physical servers and in systems also you own and control. However, it has proven that through cloud security that control does not mean security and accessibility matters more than physical location of your data. Cloud computing security is similar to traditional on premise the data centers, only without the time and costs of maintaining huge data facilities, and the risk of security breaches the minimal.

Types of cyber-security threats

  • Phishing: – This is an un-lawful and most commonly used practice that entertained by some cyber-criminals to try the users to trap via send a fraud Emails that look like emails come from reputable sources. The main aim is to steal the sensitive and confidential data like credit card numbers, passwords, login information and many more things.
  • Malware: – Malware it is a type of software that gain unauthorized access from the users.
  • Ransomware: – It is a type of malicious software. It is designed to extract the money by doing blocking access to files or the whole computer system until the ransom is to be paid. Paying the ransom does not guarantee that the files will be recovered or the system are get restored.
  • Birthday Attacks: – Birthday attacks are made against to the hash procedures that are used to verify the honesty of a messages, software or digital signature. A message processed by a hash function produces a message digest of by a fixed length, independent of the length of the input message; this use of false message digest uniquely characterizes by the message. This attack refers to the probability of finding two random messages that generate the same Message Digest when processed by a hash function. If an attacker calculates same Message Digest for his message as the user has, he can safely replace the user’s message with his, and the receiver will not be able to detect the additional even if he compares Message digests.