M
odern businesses require access to the Internet through computers and other hardware to function effectively. A standard business such as ASOS will have computer units, printers and scanners, network wiring, security software, Office software, an Internet Service Provider and an online website. Having access to the Internet and using this type of hardware and software comes with risks from viruses, which is where security software comes in. A virus is a program or file that is made to cause trouble by gaining access to your device and attacking your personal data. They may remove files from your computer and infect other files so that the virus can spread further along a network. Viruses are sometimes called “malware” or “spyware” but they have the same goal in common. You can avoid them by turning on your computers built in firewall but it is advisable to download an antivirus software such as MacAfee to keep on top of threats as they develop. You can buy antivirus software from the same place as you buy your computer but it is also available to download from the antivirus manufacturer website. Any personal information that you store on your computer should be password-‐protected including your email and Internet banking. You should use a password protect this information to stop hackers accessing your information and using it for themselves. The problem with passwords is that sometimes they can be very easy to guess and so it is recommended to use a password with both upper and lower case letters, numbers and symbols. A poor example of a password would be “puppy” whereas a strong example of a password would be “puPPy01!”. You should also be cautious about the information that you disclose online especially on social media websites or forums. Leaving details of your address or even your date of birth can be all a hacker needs to access other details about you. If you have to enter your information into a website that you have never used before, you should check that the website is secure and your information cannot be attacked. To do this you should look for a padlock in the address bar and the web address should always begin with https:. Your location can also affect your security for example if you use a public computer in a library. You should always close any open web pages and clear your NORTON IS ANOTHER POPULAR ANTIVIRUS SOFTWARE history. When using WIFI out and about such as in cafes and restaurants you need to check that the connection is secure. For my own security I use Norton Antivirus on my laptop. The package that I use allows you to use the same security on a few wireless devices too and so I am able to download the Norton app to my iPhone and iPad. I also have iCloud enabled on all of my devices which allows me to back up all of my data incase of loss or theft and also tract where the stolen item was last located. As technology develops, Internet security will have to adapt and keep up to protect its users against hackers and threats. The term cyber security began in 1988 as a result of one of the first ever-‐recorded online viruses called the Morris Worm. It caused 60,000 computers that were connected to the Internet at the time to slow down to the point that they were unusable. Cyber attacks have become much more sophisticated and much more dangerous over the years. Created in 2006, Wiki leaks is a website that publishes secret information, news leaks and classified information for public consumption. Due to the Information that they publish they have been investigated many times. Cloud storage is where digital data is stored on a server that is owned by a hosting company such as Dropbox and iCloud. It allows you to access your data anywhere and at any time on many devices. On August 2014, iCloud was hacked and over 200 private celebrity
photos were posted online. Famous people that were hacked include Rihanna and Kate Upton. The hackers who do this range from “white hat” hackers who try to highlight weaknesses in computer systems, lone hackers who try to steal personal information to use as blackmail, experienced criminals who are devoted to stealing banking information to teams of hackers looking to protest. A hacker may extract your user name and passwords, make WIKILEAKS WEBSITE EXAMPLE OF ARTICLES purchases online using your details and set up credit accounts in your name. Targets include citizens, corporations and large government agencies such as the CIA website on June 2011 by a group of hackers. Cybercrime can be split into two classifications, crimes that target computer networks and those that use computer networks to advance other ends. They include computer viruses, denial of service attacks and malware, spyware, adware, Trojans, and worms. Trojans are a downloadable threat that has been disguised as a safe and helpful program that once launched can extract personal files, download more threats and create access for external users to use your stored data. In the case of worms viruses can spread themselves, as all they need is a network to infect other computers. Spyware is a different type of virus as it is embedded into some software developer’s freeware programs. When you download the software from the Internet you may have to deal with adware that has promotional material embedded inside. The promotional material can be quite aggressive and can pass your information onto 3rd parties, display pop ups and banners, change your homepage without permission and can also create a profile about you based on your web activity.
EXAMPLE OF POP UP BANNERS
Governments around the world are working to protect the rights of people and businesses online and tackle the next threat to global security. They are creating new programs to protect our information and signing international treaties to deal with cybercrime. You can secure your online information by improving your password strength and making passwords long, strong and unique. Names of recent security bugs include Shellshock and Heartbleed. Shellshock was able to spy on computers and take complete control of them. The future of cyber security will require a cohesive, formalized international movement whereby law enforcement agents can go beyond cyberspace to prosecute those engaged in illegal cyber activity.