The Internet: Cybersecurity

What is Cybersecurity

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks, damage, and unauthorized access.

What are some of the most common cyber attacks

Malware: Malicious software such as viruses, worms, ransomware, and trojans that are designed to damage or gain unauthorized access to systems. Phishing is a fraudulent attempt to obtain sensitive information like login credentials or financial details by pretending to be trustworthy websites and sending emails to people in the hope they enter their login credentials for that website by making a website that looks like another trustworthy site. Distributed Denial of Service (DDoS) Attacks are designed to overwhelm a system, network, or website, making it unavailable to legitimate users by overloading the requests sent to the website.

What are some of the preventive methods used to prevent attacks

Having a firewall up (software or hardware designed to monitor and control incoming and outgoing network traffic based on predefined security rules).Downloading antivirus software (tools that are designed to detect, prevent, and remove malware and other malicious software from a system).Using strong passwords for the websites you log into and using alternate ones for each website so hackers do not get access to every one of your accounts if one gets leaked.Check for authentic web addresses and make sure the emails you get are from the actual sender and not a scam.

DDoS Attacks (and Bot Nets)

Bot nets an army of sorts that hackers get when they use computer viruses to take over millions of computers worldwide to take down a website by overloading it (DDos) Denial of Service is when hackers overwhelm a website with too many requests at the same time it becomes a Distributed Denial of Service when the attacks come from many different computers at the same time.

Cyber warfare

A war where instead of physical actions like bombing and attacking civilians but instead using computers to shut down national water supplies, energy girds, transportation systems and anything that operates by a computer

Viruses and Anti-Virus Software

Viruses are malicious programs that infect and spread across devices, often damaging files or stealing data. They attach to files or applications and activate when those are opened or run.Antivirus Software is a security tool that detects, removes, and protects devices from viruses and malware. It scans files for known threats and monitors for suspicious behaviour in real time.

Phishing Scams

Phishing is a fraudulent attempt to obtain sensitive information like login credentials or financial details by pretending to be trustworthy websites and sending emails to people in the hope they enter their login credentials for that website by making a website that looks like another trustworthy site.

Credit Card Theft

Theft of your credit card information, whether by taking your physical card or using phishing scams to get the information online and log in to your actual account, using that info to steal your money.

What is a Caesar Cipher

A Caesar Cipher is a simple encryption technique where you shift each letter of a message by a certain number of letters so if you wanted to say HELLO you would instead say KHOOR by moving the letter 4 letters ahead.

Types of people who commit cybercrimes

They don't fit any certain type of profile or motivation they have; they can be anyone from a terrorist to just a teenager that does it to flex to their friends.