Page 357 - Web_Application_v2.0_C12_Fb
P. 357

Ð ÐExploitation  of Vulnerabilities: Some DoS attacks exploit existing security  weaknesses, causing the
                    system to crash or malfunction even with relatively lower traffic loads.


                                                   Ransomware

                                                  Ransomware  is a  form of  malicious software (malware)  designed to
                                                  restrict users’ access to their systems or files, often by encrypting data or
                                                  locking the system’s screen. This renders files inaccessible and unusable,
                                                  causing significant disruption. To regain access, victims are required to
                                                  pay a ransom, typically in exchange for a decryption key provided by the
                                                  attacker.



                 Hacking
                 Hacking refers to the act of gaining unauthorized access to a computer
                 system or network. It can be divided into two main categories:

                 Ð ÐMalicious Hacking: Involves illegal activities such as accessing
                    or  exploiting computer  systems or  networks  to  steal data,  disrupt
                    operations, spy, or cause harm. This is done without the consent of
                    the system owner and often for personal or financial gain.

                 Ð ÐEthical Hacking: A lawful and authorised activity where individuals,
                    often referred to as “white-hat hackers,” access computer systems or
                    networks to identify and fix vulnerabilities, preventing exploitation by
                    malicious hackers.

                                                   Data Breaches
                                                   Data  Breaches refer  to incidents where unauthorized  individuals gain
                                                   access to sensitive or confidential information, such as financial records,
                                                   personal details, medical data, or passwords. These breaches can affect
                                                   both individuals and organisations and may occur due to either accidental
                                                   mistakes or intentional attacks.

                                                   The consequences of data breaches can be severe, leading to identity
                                                   theft, financial loss, reputational damage, or even legal ramifications for
                                                   the affected parties.

                 Cybercrime Awareness
                 To protect yourself from the rising threat of cybercrime, follow these key security practices:

                 Ð Ð Use Strong and Complex Passwords: Create passwords that combine uppercase and lowercase letters,
                    numbers, and special characters. Avoid using easily guessable information, like birth dates or names.

                 Ð Ð Install Antivirus Software: Ensure your devices are equipped with reliable antivirus programs to detect
                    and remove malware threats effectively.

                 Ð ÐCheck for Secure Websites (HTTPS): Before entering sensitive information, verify that the website URL
                    begins with HTTPS, indicating a secure connection. Avoid browsing unsecure websites.




                                                                                          Cyber Safety and Security  355
   352   353   354   355   356   357   358   359   360   361   362