Digital Citizenship POE 16003302

Sunday, 6 November 2016

Q .7 Cyber security risks range from ID theft and fraud to corporate hacking attacks (Sony Attacks). cyber security has never been more important fo individuals, business, organisations and governments. Reseacrh 2015's top 5 cyber security risks in south africa. critically discuss about how users, enabled hackers to obtain these details more easily by providing known companes with our data and an overview how they can be avoided or mitigated

 Digital Security


Top 5 cyber security in South Africa

  • Ransomware- is a type of malware which restricts access to the computer system that if infects. Ransomware encrypts data and McAfee thought attacks on mobile devices and cloud-backed data would increase.
  • The internet of things- Refers the connection of physical devices such as home appliances and cars to the internet.
  • Cyber-espionage- is becoming the weapon of choice for many national governments no matters how tight lipped they may be about any involvement in such activities to undermine their enemies.
  • Cyber theft increases- The stealing of financial information is nothing new, with stolen credit or debit card data on the black market a well-established and lucrative business for criminals.
  • Insecure passwords – Easy to crack passwords will continue to be a big risk 2015.
 Hackers phish pages, where a hacker will send a login page of Gmail or Facebook and it will look exactly the same as the real Facebook login page. Most of the time they use Social engineering skills like, they will send message saying “This person has posted your bad picture on Facebook, click here to check your photo”, and once you click on the link, you will be taken to login page, as soon as you enter your password, it will be sent to hacker, and your page will reload to take you to the real page.

 Most of the time, victim don’t even realize his password is gone. 

Many of them will use your Email account to send spam links to your contact list or use your Facebook account to send spam application link. Though, the major problem comes when hackers get hold of your private and sensitive data and blackmail starts.




To way to solve this is by enforcing stricter passwords. Users should be encouraged to stop replying to emails that are not reliable and safety . They should check if the email relates to the financial institutions.
Not only can users be at risk on the internet but when receiving phone calls as well. People may ask personal questions in order to determine their potential password.

This can be easily avoided by not giving out personal information over the phone. If an institution needs information they will often tell you to go in and resolve the issue.
Users should always keep on guard when online and always check what links they are clicking on and what files they are downloading. In order to protect your self, users are advised to download anti-virus software in order to protect your computer and confidential information.

References 
CNBC. 2015. Top 5 cyber security risks for 2015. [ONLINE] Available at:http://www.cnbc.com/2014/12/19/top-5-cyber-security-risks-for-2015.html. [Accessed  25 October 2016].
Mahesh. 2015. How do hackers hack your passwords . [ONLINE] Available at:http://www.shoutmeloud.com/how-do-hackers-hack-your-passwords.html. [Accessed  25 October 2016

Post navigati

Nex
Posted by Karabo Maphoto Digital Citizenship POE 16003302 at 22:10
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

Karabo Maphoto Digital Citizenship POE 16003302
View my complete profile

Blog Archive

  • ▼  2016 (12)
    • ▼  November (12)
      • Q 1.3Primary school children are the most vulnera...
      • Q .6 Create an online poster for your institute of...
      • Q ,8 Digital Health and Well Being Navigate to htt...
      • Q ,8 Digital Health and Well Being Navigate to htt...
      • Q .7 Cyber security risks range from ID theft and ...
      • Q.5 Create one Thinglink image that representing t...
      • Q.4 Create a Digital Code of Conduct for education...
      • Q .3 Create a blog post titled: The social economy...
      • Q,2.1 Use the information fluency process, ask, ac...
      • Q,2.1 Use the information fluency process, ask, ac...
      • Q 1 ,2 What is the techno-economic paradigm and ho...
      • Q1.1 Research the issues surrounding access; note ...
Simple theme. Powered by Blogger.