Issues With Online Services

Personal Security

OnlineSecurity Ever since the internet launched a couple decades ago, it revolutionized the way we live our lives. It can be used for fun and games but there are also issues associated with accessing online services, like personal security, which includes protecting your personal security at all costs. Nowadays society has floated away from the physical components in life to cloud-based services, surfing, and online accessing from nearly every country on the planet, but in doing so they created new problems, problems that risk your personal security. Personal security online is just as important as physical security, but not many people are informed or aware of the risks that lie on the Interweb. Think about this, would you be able to sleep knowing that others have the key to your home? or if you knew that you were being watched at all times would you feel safe? Although it seems very scary it is actually very simple to prevent this from ever happening to you or anyone you know. (3)

Online Security

Web Skull

Actions to make sure that sensitive information doesn't get into the hands of cyber criminals which are used for malicious purposes. Online security can vary slightly from a very complex system to protect credit and banking information to a simple Anti-virus application used to prevent malicious programs from entering your device and corrupting it. Online security is the process of staying safe on the internet, making sure you are never put at risk when surfing the web. Although there many threats to your online security here are some of the most common and dangerous ones out there. (3)

Malware

Malware is a malicious software program or file that is designed to infect your personal devices. Malware has recently been on the rise, so Malware is currently one of the most dangerous. These programs work by stealing sensitive information from your device in order to access sensitive information for the purposes of Cyber crime. Here are just a few main types of Malicious programs that can damage your system. Viruses- A self-replicating file or program Adware - Exposes you to massive amounts of unwanted ads Spyware - Logs personal emails through keyloggers Ransomware - Encrypts or prevents you from accessing your data on device until a ransom is paid Trojans - Malicious programs built into legitimate applications Computer worms - Malware that is able to live in a device's memory, and able to attack and infect devices on the same network. (3)

Phishing

Phishing is where cybercriminals attempt to deceive you into revealing personal or financial details by pretending to be a legitimate business or by threatening to pursue legal actions. Cybercriminals usually attempt to collect your data using these methods. (3)

Pharming

This is another method which is similar to phishing trick you with phishing websites. Though the main difference between Phishing and Pharming is simple, pharming doesn't rely on fake messages. Instead cybercriminals attempt to redirect your browser URL address bar by taking complete control of it, redirecting you to malicious websites. (3)

Scams

Ever since the internet was a thing scammers have been using the web to exploit others, scamming for people's money. Usually scammers employ various levels of tactics, from tricking you to providing your SIN number, to fake login pages, and credentials so that your money or identity can be stolen. These scams can consist of many different types of scams but here are some of the most common methods used by cybercriminals to steal money or sensitive information. (3)