Sunday 29 May 2016

DIGITAL SECURITY

 
QUESTION 7:TOP 5 SOUTH AFRICAN CYBER SECURITY RISKS.
 
 
 
Both globally and in South Africa the top 5 Cyber security risks seem to be (Ellyatt, 2015) 
1. Ransom-ware:
 is a type of malware that infects computer systems and then demands a random for its removal.
2.Cyber – Espionage:
the use of computer networks to gain access to confidential information especially the information held by governments and other organisations.

3. The Internet of Things:
is the term that describes a society where physical appliance such as homes and cars are connect to the internet and can then be accessed from one device or application (Ellyatt, 2015).

4. Cyber Theft:
the online stealing of financial or personal information for the use of fraud and other illegal activities (Web Finance, Inc, 2016).

5. Insecure Passwords:
popular, generic passwords that well used and easy to decipher.



    How users enable hackers with this information:

Hackers receive information by users are constantly giving their personal, confidential information to trusted financial institutions and are put at risk when giving this information. Due to hackers being able to duplicate the emails that are sent by these trusted financial institutes, leading users to believe that they are a legitimate organisation whom they can trust. This is also known a phishing or spoofing. (Anon, 2014)

Another way hackers gain information is by a scheme know as Buffer overflow. This enables them to gain customer data via online forms. Hackers are able to create forms that for example ask for simple details such as postal address and from there they can further derive you to fill out any other information that they need, since to the user these “forms” seem legitimate. (Anon, 2015)

Fault injection is another way that hackers your information without knowing it, by stealing your information whilst a user surfing the internet. Fault injection is one of the more complicated web hacking techniques where criminals research ways to infiltrate your source code and then try inputting different code to see if they can crash the system. An example would be a hacker using a database query that could erase content, or typing in a Web URL that delivers a worm into your network. (Anon, 2015)
User should never download free software as this is most prone to having viruses or giving hackers a doorway to your information. (Anon, 2015)

By not making use of the privacy on social media platforms such as facebook gives hackers unlimited access to your information which could lead to identity theft
(Writer, 2016).

Ways to avoid this (Weissman, 2015):

1. Install anti-virus soft and firewalls onto your device
2. Change passwords often
3.Delete emails from unknown sources
4.Check link locations
5. Use two-factor authentication
6. Beware of the Cloud and other similar storage spaces
7. Don’t share personal data over public wifi facilities


references:
Anon, (2014). Common Threats. [online] Getcybersafe.gc.ca. Available at: http://www.getcybersafe.gc.ca/cnt/rsks/cmmn-thrts-en.aspx [Accessed 26 May 2016].
Anon, (2015). 5 Ways Hackers Gain Access To Your Data | My Digital Shield. [online] My Digital Shield. Available at: http://www.mydigitalshield.com/5-ways-hackers-gain-access-data/ [Accessed 26 May 2016].
Anon, (2016). Scareware Definition | Cybercrime.org.za | Safety & Security Guide. [online] Cybercrime.org.za. Available at: http://cybercrime.org.za/ransomware [Accessed 26 May 2016].
Ellyatt, H. (2015). Top 5 cybersecurity risks for 2015. [online] CNBC. Available at: http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html [Accessed 26 May 2016].
Web Finance, Inc, (2016). What is cybertheft? definition and meaning. [online] BusinessDictionary.com. Available at: http://www.businessdictionary.com/definition/cybertheft.html [Accessed 26 May 2016].
Weissman, C. (2015). 7 easy ways to avoid being hacked. [online] Business Insider. Available at: http://www.businessinsider.com/how-to-avoid-being-hacked-2015-4 [Accessed 26 May 2016].
Writer, C. (2016). How Hackers Can Steal Your Personal Information From Facebook. [online] Science.opposingviews.com. Available at: http://science.opposingviews.com/hackers-can-steal-personal-information-facebook-3381.html [Accessed 26 May 2016].





 







No comments:

Post a Comment