Sie sind auf Seite 1von 3

Cybersecurity

Cybersecurity or IT security, is the protection of information systems from theft or damage to


the hardware, the software, and to the information on them, as well as from disruption or
misdirection of the services they provide. It includes controlling physical access to the
hardware, as well as protecting against harm that may come via network access, data and
code injection, and due to malpractice by operators, whether intentional, accidental, or due
to them being tricked into deviating from secure procedures.
Computer systems now include a very wide variety of "smart" devices, including smartphones,
televisions and tiny devices as part of the Internet of Things( IoT is the network of physical
objectsdevices, vehicles, buildings and other itemsembedded with electronics, software,
sensors, and network connectivity that enables these objects to collect and exchange data),
so they could suffer vulnerabilities and attacks.

Vulnerabilities and attacks

Backdoors = A backdoor in a computer system, an algorithm, is any secret method of


bypassing (avoid) normal authentication or security controls.

Phishing: Phishing is the attempt to acquire sensitive information such as usernames,


passwords, and credit card details directly from users. Phishing is typically carried out by
email spoofing or instant messaging and it often directs users to enter details at a fake
website whose look and feel are almost identical to the legitimate one.

Clickjacking : Clickjacking is a malicious technique in which an attacker tricks a user


into clicking on a button or link on another webpage while the user intended to click on
the top level page. The attacker is basically "hijacking" the clicks meant for the top level
page and routing them to some other irrelevant page, most likely owned by someone
else.

Systems at risk

Financial systems= Web sites that accept or store credit card numbers and bank account
information are prominent hacking targets, because of the potential for immediate financial gain
from transferring money, making purchases, or selling the information on the black market.
Utilities and industrial equipment = Computers control functions at many utilities, including
coordination of telecommunications, the power grid (electrical grid), nuclear power plants,
and valve opening and closing in water and gas networks.
Consumer devices = Desktop computers and laptops are commonly infected with malware
either to gather passwords or financial account information. Smart phones, tablets, smart
watches have also become targets and many of these have sensors such as cameras,
microphones, GPS receivers, compasses, and accelerometers which could be exploited, and
may collect personal information, including sensitive health information.
Government = Government and military computer systems are commonly attacked by activists
and foreign powers.

Top 10 safe computing tips


1. Patch, Patch, PATCH!
Set up your computer for automatic software and operating system updates. An
unpatched machine is more likely to have software vulnerabilities that can be exploited.

2. Install protective software.


Set up an antivirus. When installed, the software should be set to scan your files and
update your virus definitions on a regular basis.
3. Choose strong passwords.
Choose strong passwords with letters, numbers, and special characters to create a
mental image or an acronym that is easy for you to remember. Create a different
password for each important account, and change passwords regularly.

4. Backup, Backup, BACKUP!


Backing up your machine regularly can protect you from the unexpected.

5. Control access to your machine.


Don't leave your computer in an unsecured area, or unattended and logged on,

especially in public places. The physical security of your machine is just as important as
its technical security.

6. Use email and the Internet safely.


Ignore unsolicited emails, and be wary of attachments, links and forms in emails that
come from people you don't know, or which seem "phishy.

7. Use secure connections.


When connected to the Internet, your data can be vulnerable while in transit. Use remote
connectivity and secure file transfer options when off campus.

8. Protect sensitive data.


Reduce the risk of identity theft. Securely remove sensitive data files from your hard
drive, which is also recommended when recycling or repurposing your computer. Use
the encryption tools built into your operating system to protect sensitive files you need to
retain.

9. Use desktop firewalls.


Macintosh and Windows computers have basic desktop firewalls as part of their
operating systems. When set up properly, these firewalls protect your computer files
from being scanned.

10. Most importantly, stay informed.


Stay current with the latest developments for Windows, Macintosh Linux, and Unix
systems.

Das könnte Ihnen auch gefallen