Monday, 24 October 2016

Question 7: Digital Security {POE}


How users, enabled hackers obtain to the details more easily by providing known companies with our data and an overview how they can be avoided or mitigated.



2015’s to five (5) cybersecurity risks in South Africa

Hackers are able to exploit certain security flaws in the coding, in order to benefit themselves or for personal satisfaction. Hackers create systems such as:



1.    Phishing scams

Email phishing is a common web hacking technique. Hackers send mass emails which legitimately appear to be from bank or a payment, which requires one to very their account information.

Adware which creates an advert by using your previously viewed sites. This can also be linked with spyware which can memorize your password and a hacker can abuse this system.



2.    Password hacking

One of the easiest way to fall into a trap of being hacked, is when simply failing to change their password which can elapse between 30-60 days. Bots are created by hackers to distribute malware or even crack passwords.



3.    Downloading free software's

By downloading free software’s, you are potentially put your business at risks to malicious viruses or malware. This can link to ransomware which is created to corrupt and encrypt your files so you can't access them unless certain procedures are followed.



4.    Buffer overflow

Hackers use techniques to gain access to customers’ information using online forms. Modern subscription-based cloud security services have been put to help identity and avoid such attacks. However, even the rootkits are able to remotely control your device and thus can prove an incredibly useful tool to hackers.



5.    Fault injection

This technique involves hackers whom search ways to infiltrate one source and code to try inputting different code in an attempt to crash the system and this can cause viruses which is able to spread at an incredible rapid rate and corrupt your hard-drive.



An overview how they can be avoided or mitigated;

According to Thomson, 2015 stated that; the risks can be avoided first by installing anti-virus software's and update them weekly, they could also avoid these risks by securing their network connection, personal information and making use of strong passwords.



Users are able to avoid hackers by:
ë  Not downloading any unlicensed files.
ë  Use antimalware software which reduces the risk of any malware being downloaded.
ë  Password inscriptions which will make it harder for hackers to acquire your password.
ë  Deleting all browser cookies which will reduce the amount of information spyware is able to acquire if your device does get infected.
ë  Don't give out personal information by giving out personal information hackers are able to work out passwords and other information.

No comments:

Post a Comment