Page 77 - CDM-CYBER-DEFENSE-eMAGAZINE-December-2018
P. 77
4. Social Engineering:
Social engineering is the act of persuading users to provide their confidential information. The types of
information may differ, but usually, the hackers are trying to cheat the users to get their passwords, credit
card details, and bank information.
The hackers can also access a system secretly to install malevolent software which will give them access
to their personal information along with control over the computer.
Generally, social engineering attacks occur in the form of phishing emails which attempts to encourage
users to reveal their information, or even readdresses to websites such as various banking or shopping
sites which looks authentic and comply users to enter their details.
5. Denial of Service:
A Denial of Service also known as DoS attack takes place when regularly operating services are reduced
to unavailable. The prime objective of DoS attack is not to steal identities or data, but it is aimed at
disabling businesses from functioning.
Within IoT networks, more networks are connected which means that more and more services are open
for hackers and attackers who are looking to inactivating the operating ability.
Although the businesses may not undergo any data loss, the hits to business stability and status
can be extremely disastrous and tragic.
How to Stay Secured and Protected?
The users are recommended to use passwords of proper standards moreover if they doubt any
suspicious activity so change their passwords. Also, use VPN and encrypting file systems to protect
yourself from the threat of cyber crimes.
The users should also make a wise decision while choosing their device. Either you are choosing any
device for business purpose, or personal use make sure it has been designed with security in mind.
Select products which have combined security considerations in all stages of design and production.
77