After the leak of data without authorization from customers of Interbank occurred last Wednesday, there has been talk on social networks about a cyber attack, malware, hacker, passwords and a series of terms related to cybersecurity.
This word refers to the practice that protects computer systems, Internet servers, smartphones or mobile devices, social networks, etc., against malicious attacks.
It can also be known as computer security or information technology security, Kaspersky notes on its website. These measures allow us to take care of the information of a person or organization.
But violation constitutes a crime. In Peru we talk about cybercrime, within the framework of the Computer Crimes Law (Law No. 30171), which sanctions illicit conduct that affects computer systems and data through the improper use of information or communication technologies.
Now, there are a number of terms that are often used. Regarding threats, the computer security company Kaspersky indicates that there are three types of threats:
First, cybercrime includes individual actors or groups attacking systems for financial gain or causing disruption. Then, you have cyberattacks that involve the collection of information for political purposes. Finally, cyberterrorism is also counted, the objective of which is to weaken electronic systems to cause panic or fear.
Attack methods
In any of these cases, cybercriminals act by following some methods:
1) Malware: malicious software used to attack a computer system. This software can be downloaded to an email or shared file, etc. Kaspersky points out that the types of malware include the following:
– Virus: a program capable of reproducing itself, which embeds itself in a clean file and spreads throughout the computer system and infects the files with malicious code.
– Trojans: a type of malware that disguises itself as legitimate software. Cybercriminals trick users into uploading Trojans to their computers, where they cause damage or collect data.
– Spyware: a program that secretly records what a user does so that cybercriminals can use this information.
– Ransomware: malware that locks a user’s files and data, with the threat of deleting them, unless a ransom is paid.
– Adware: advertising software that can be used to spread malware.
– Botnets: malware-infected computer networks used for online tasks without the user’s permission.
-Emotet: a type of Trojan that takes advantage of unsophisticated passwords. He was warned in 2019.
2) SQL code injection: This method is used to take control and steal data from a database. What they do is insert malicious code into a database using an SQL (Structured Query Language) statement.
3) Phishing: This attack usually uses emails that pretend to be from a real company. That is how it requests personal or credit card information.
4) Ataque de tipo “Man-in-the-middle”: The attacker intercepts the communication between two subjects to steal data. You can use some Wi_Fi network that is not secure.
5) Denial of service attack: What is done is to overload a network or a service of some organization until it becomes unusable.
LOOK: Ai-Da is a humanoid robot artist and her painting will be auctioned for more than US$120 thousand
Other terms to know
1) Antispyware: tools that help protect a computer against unwanted, very stealthy software that is installed to spy on and obtain personal information from its victims.
2) Antivirus: is protection software that prevents the execution of malicious software on computer equipment and systems. Their job is to constantly analyze data within a team.
3) Captcha: It is a function to verify if a user is human or a bot (computer program), when you want to access an account. It may require identification of an image or text.
4) Password: security system by using a secret or personal code, by combining letters and numbers. Experts recommend that they be long and include capital letters, lowercase letters, numbers and special characters.
5) Hacker: It is the expert person, with knowledge in computing and who has the skills to violate systems or devices. It can have a positive or negative connotation depending on the actions you take.
6) Social engineering: It is the method that cybercriminals use to deceive users. It may include impersonation, persuasion, use of trust and other psychological methods to achieve the goal.
Group Health Insurance Dallas TX Faces Uncertainty Amid Healthcare Reforms – Columbus – WRDP
Cocktail Party in Washington, DC Becomes a Staple of Corporate Culture – NEWSnet Sioux Falls- K06QJ
Stock Market
Culture – Buzzing Asia
markets.financialcontent.com/clarkebroadcasting.mycentraloregon/news/article/marketersmedia-2024-10-10-party-entertainment-in-washington-dc-sees-shift-to-immersive-experiences
Lewisville Health Insurance Tackles Barriers to Health Care for Black Women
Group Health Insurance Dallas TX Faces Uncertainty Amid Healthcare Reforms – NEWSnet – News… at it used to be
Austin Health Insurance for the Self-Employed Expands with New Medicare Handbook – 24/7 Sports News and Highlights Channel
Frontal Report – World News, Commentary & Analysis
Sports – Buzzing Asia
Sports – Surat Khabar
Party Entertainment in Washington, DC Sees Shift to Immersive Experiences – SOUTHEAST – NEWS CHANNEL NEBRASKA
Dallas Small Business Health Insurance Faces Risks Amid Potential Policy Changes –
Austin Health Insurance for the Self-Employed Expands with New Medicare Handbook – NEWSnet Sacramento
What are several of the most popular spring festivals across the globe? | Women's Entrepreneur Network Business Listings
In The Headline – Exclusive, Impactive Journalism
Stock Market | User | thepilotnews.com
Stock Market | About Us – The San Diego Union-Tribune
markets.financialcontent.com/concordmonitor/news/article/marketersmedia-2024-10-4-lewisville-health-insurance-expands-access-to-care-for-black-women
503 Service Temporarily Unavailable
podcastaddict.com/episode/https%3A%2F%2Faudioboom.com%2Fposts%2F8587010.mp3%3Fmodified%3D1728449451%26sid%3D5124228%26source%3Drss&podcastId=4836436
Dallas Health Insurance Joins Value-Based Medicare Advantage Plans Expansion – WWZW
Massimizza il Tuo ROI: Il Ruolo Chiave del Consulente Facebook Ads
Party Entertainment in Washington, DC Sees Shift to Immersive Experiences – RIVER COUNTRY – NEWS CHANNEL NEBRASKA
Emporium Post – Daily Retailer & Wholesaler News
Technology – In The Headline
Cocktail Party in Washington, DC Becomes a Staple of Corporate Culture – Austin, TX
Money – Buzzing Asia
Stock Market | News | decaturdailydemocrat.com
travelleisuremag.com/news/health-insurance-lewisville-faces-major-impact-from-upcoming-us-election-changes/489820