Contact for more information..... Subscribe to You tube: kollururao_fraudsdetection
Contact:+91 7674838202- kollururao@gmail.com;.
Contact for more information..... Subscribe to You tube: kollururao_fraudsdetection
Contact:+91 7674838202- kollururao@gmail.com;.
The personal data security can be better explained with the following :
1-Availability
2.Confidentiality
3. Integrity
Thus, security is always “dealing” with the above aspects of “Data” with any organisation or individuals:
“Data security” is most critical and important in the present-day context of inter-net, mobile applications, online banking, cloud computing etc where data is easily accessible to one and all.
Data is vulnerable to cyber attacks and Hacking and misuse by fraudsters.
As such, security of data has now become not a one-time protection but continuous monitoring and control.
Security of data has become core business operations of all organisations irrespective of the type of businesses or operations.
It is of highest importance in the case of banks, financial institutions, cab services etc where personal information and data of thousands of individuals is kept in store during the routine business operations and where any lax in the system or controls will give way to data breaches and hacking and misuse of the personal data and causing millions of dollars of losses to one and all.
Cryptographic protocols or encryption protocols are being used for data protection.
These security tools protect the data passing through the web browsing and other where credit/debit card details are used online for various purposes.
Cryptography is method where data exchanged between two persons remains confidential only between the two and only by whom it is intended to be read only can see it.
The following are the various computer security threats-some are pretty harmful some are pretty annoying but harmless, Malwares:
Let us first understand the definition of Malware is, which is defined as:
“Software which is specifically designed to disrupt, damage or gain authorized access to a computer system.”
1.Trojan 2. Virus 3. Worms 4. Spyware 5. Scare ware 6. Key logger 7. Adware 8. Back door 9. Wabbits 10. Exploit 11. Bot net 12. Dialer 13. Dropper 14. Fake AV 15. Phishing 16. Cookies 17. Blue snarfing 18. Blue Jacking 19. DDoS 20. Browser Hijackers 21. Boot sector virus 22. Virus document 23. Mouse trapping.24. Chain letters.
Some of the above Malwares are explained in brief:
1.Trojan: Malware effect mostly banks and complicated. If they are strong can cause major damage starting from the systems to online accounts.
2.Virus: is a malicious programme that replicates itself and ultimately destroys your computer. Thus, it is used to revenge purposes.
3. Worms: are less harmful though they too replicate and move from computer to computer with in a network or even the internet. It takes lot of space on the hard disk of computer and as well replicates and also slows down the bandwidth.
4. Spyware: Is a Malware which spies on your activities on the computer and watches what all sites are visited. The attacker will know all your activity and can trap you into one of his websites used by you.
5. Scareware: It is a Malware that is infected into your system where it shows that the system is infected with many viruses and bugs which in fact is not true but make you buy and thus lose money. There by to remove “Viruses” they recommend an anti-virus which itself is another Malware and the Victim may end up buying it.
6.Key logger: Keylogger is a very dangerous Malware where by the fraudsters can access to what all is typed and thus pass words are stolen and other valuable information. It is thus a very powerful threat at stealing passwords and other data as it is typed.
7. Adware: It is not a harmful Malware whereby the system encounters unwanted popup advertisements causing annoying to the user.
8.Backdoor: Backdoor is essentially not a Malware but a method where by the attacker by passes all systems and anti-virus and enters into the systems by back door specially if the systems are vulnerable. It is installed before any Trojan or Virus is infected.
9.Wabbits: Is another threat that is not harmful like a virus or worm but is another self-replicating threat.
10.Phishing: Is a dangerous way of luring Victims to a look alike web page of say a Bank etc whereby if the Victim parts with his personal details they will be misused by the fraudsters. So, all the information shared on such Phishing page will not go the intended party but goes to the fraudster servers. Thus, the identity of the Victim is stolen.
11. Cookies: Cookies are not real Malware but are used by most of the websites where by the data of that website browsed by the user is stored in the computer for future use and thus the activity can be tracked by the intended fraudster.
Hence it is advisable to disable the cookies and also clean up the cookies stored in the system regularly.
The following are some of the symptoms of computer infected Malware:
1.When you notice that your computer is extremely slow even though you are using it for simple usage like for example playing a card game, where for one card to shift to another place it takes painfully 20-30 seconds instead of in a flash.
2. When though the bandwidth is good and it takes a second for google page to open an infected computer will take 10-20 seconds to open.
3.When some error messages keep coming which you do not understand and looks unfamiliar.
4.When you find that your home page keeps on changing despite keeping a specific page like yahoo or google as the home page, for example.
5.If you notice usage of your CPU at high performance though it is not or in fact in idle position.
6. When you find that Anti-Virus and Fire wall protection suddenly turn disabled.
7. At times unnecessary files keep on duplicating.
Some of the remedies to remove the virus are:
1. First and foremost a strong and reliable anti-virus software must be installed and the whole system should be scanned to identify the viruses and kill them or disable them.
2. Keep updating the Anti-Virus at regular intervals.
3. Go to safe mode and apply Malwarebytes. It is an anti-malware software that finds and removes Malware in Microsoft windows, Android, Mac Os etc released in 2006.
4. If the Malware still persists and can’t be cleaned final option is to format the hard disk or replace.
Precautions:
1.Keep changing passwords on various sites etc browsed at regular intervals to avoid password theft.
2.Regular anti-virus scan and updating the anti-virus.
3. Avoid using flash drives from peers and others as they may be infected or scan them fully for any virus before opening the flash drives.
4. Do not open suspicious web sites and browse.
5.Beware of unsolicited E-Mails and text messages.
6. Put in place different layers of security and Firewalls so penetration of Malwares or by Hackers will become impossible or at least it becomes very difficult.
7. In a larger Organisation there should be in place a competent IT Department with competent professionals to deal with various issues arising out of multitudes of systems.
8.Data storage and update at two or more different servers at different places is a must in a large organisation.
Always remember, it is not the Malware by itself, that is affecting, your systems but there are humans behind that who are responsible for breaching your security levels and inject the various Malware to corrupt data or get your details for misuse or to crash your systems.
The following references of website gives a classic example of Data Breaches with poor controls:
1.Equifax.
https://www.lifelock.com/education/equifax-data-breach-2017/?promocode=LLART10
http://clark.com/personal-finance-credit/credit-freeze-and-thaw-guide/
2.Uber:
https://www.nytimes.com/2017/11/21/technology/uber-hack.html
3. 30 Biggest Data Breaches:
https://www.techworld.com/security/uks-most-infamous-data-breaches-3604586/
Copyright © 2017 Frauds ,Detection ,Prevention - All Rights Reserved.
Powered by GoDaddy Website Builder
This website uses cookies. By continuing to use this site, you accept our use of cookies.