• Thank you for your attention!
  • Internet security




    Download 1,62 Mb.
    Sana18.12.2023
    Hajmi1,62 Mb.
    #122864
    Bog'liq
    Internet security

    Internet security

    Reja: 1. What is meant by internet security? 2. Why is security important on the internet? 3. Why is internet security essential?

    What is internet security? - Definition and meaning Internet security is a term that describes security for activities and transactions made over the internet. It’s a particular component of the larger ideas of cybersecurity and computer security, involving topics including browser security, online behavior and network security. We spend a large proportion of our lives online, and some of the internet security threats we can encounter include

    Hacking, where unauthorized users gain access to computer systems, email accounts, or websites. Viruses or malicious software (known as malware) which can damage data or make systems vulnerable to other threats. Identity theft, where criminals can steal personal and financial information. Individuals and organizations can protect themselves from these kinds of threats by practicing internet security. What are the most common internet security threats? To ensure privacy and security on the internet, it’s important to be aware of different types of internet attacks. Common internet security threats include: Phishing

    Phishing Phishing is a cyber-attack involving disguised emails. Hackers try to trick email recipients into believing that a message is genuine and relevant – a request from their bank or a note from a co-worker, for example – so that they click on a link or open an attachment. The goal is to deceive people into handing over their personal information or downloading malware. Phishing is one of the oldest internet security threats, dating back to the 1990s. It has remained popular to this day since it is one of the cheapest and easiest ways for criminals to steal information. In recent years, phishing techniques and messages have become increasingly sophisticated.

    Hacking and remote access Hackers are always looking to exploit a private network or system's vulnerabilities so they can steal confidential information and data. Remote access technology gives them another target to exploit. Remote access software allows users to access and control a computer remotely – and since the pandemic, with more people working remotely, its usage has increased. The protocol which allows users to control a computer connected to the internet remotely is called Remote Desktop Protocol, or RDP. Because businesses of all sizes so widely use RDP, the chances of an improperly secured network are relatively high. Hackers use different techniques to exploit RDP vulnerabilities until they have full access to a network and its devices. They may carry out data theft themselves or else sell the credentials on the dark web.

    Thank you for your attention!


    Download 1,62 Mb.




    Download 1,62 Mb.