Page 357 - Web_Application_v2.0_C12_Fb
P. 357
Ð ÐExploitation of Vulnerabilities: Some DoS attacks exploit existing security weaknesses, causing the
system to crash or malfunction even with relatively lower traffic loads.
Ransomware
Ransomware is a form of malicious software (malware) designed to
restrict users’ access to their systems or files, often by encrypting data or
locking the system’s screen. This renders files inaccessible and unusable,
causing significant disruption. To regain access, victims are required to
pay a ransom, typically in exchange for a decryption key provided by the
attacker.
Hacking
Hacking refers to the act of gaining unauthorized access to a computer
system or network. It can be divided into two main categories:
Ð ÐMalicious Hacking: Involves illegal activities such as accessing
or exploiting computer systems or networks to steal data, disrupt
operations, spy, or cause harm. This is done without the consent of
the system owner and often for personal or financial gain.
Ð ÐEthical Hacking: A lawful and authorised activity where individuals,
often referred to as “white-hat hackers,” access computer systems or
networks to identify and fix vulnerabilities, preventing exploitation by
malicious hackers.
Data Breaches
Data Breaches refer to incidents where unauthorized individuals gain
access to sensitive or confidential information, such as financial records,
personal details, medical data, or passwords. These breaches can affect
both individuals and organisations and may occur due to either accidental
mistakes or intentional attacks.
The consequences of data breaches can be severe, leading to identity
theft, financial loss, reputational damage, or even legal ramifications for
the affected parties.
Cybercrime Awareness
To protect yourself from the rising threat of cybercrime, follow these key security practices:
Ð Ð Use Strong and Complex Passwords: Create passwords that combine uppercase and lowercase letters,
numbers, and special characters. Avoid using easily guessable information, like birth dates or names.
Ð Ð Install Antivirus Software: Ensure your devices are equipped with reliable antivirus programs to detect
and remove malware threats effectively.
Ð ÐCheck for Secure Websites (HTTPS): Before entering sensitive information, verify that the website URL
begins with HTTPS, indicating a secure connection. Avoid browsing unsecure websites.
Cyber Safety and Security 355

