The widespread use of the Internet in every field has brought cybercrime. In particular, the spread of online shopping with credit cards, the globalization of trade, cyber-robberies, hackers and virtual threats have increasingly incorporated into our lives. So you understand that if you do not take measures, the Internet is not such a very secure environment. You must ensure your cyber security and store your personal information and documents in a more secure environment. Otherwise, you may be able to get people you do not know to capture your information.
One of the most important issues today is cyber security! Because now everything is going through computers and internet. For example, if cyber security measures are not taken in a company, the probability of leakage of confidential information is as high as possible. Or if you don’t want your personal photos and documents to be stolen, you should ensure your cyber security. All applications that protect computers and servers, mobile devices, electronic systems, networks and data from virtual attacks and virtual scams are called güvenlik cyber security..
Never ignore cyber security. You ask why? To explain this example; The US government only spends $ 13 billion per year on cyber security. Because he considers that cyber attacks continue to develop rapidly and knows that he is obliged to take these measures in terms of state secrets. Of course, unforgettable cyber attacks have been influenced by this.
What Does Cyber Security Prevent?
Cyber security can be taken against 3 different threats. The first is cybercrime. Cybercrime includes individuals or groups targeting systems for financial gain. Secondly, cyber warfare usually involves gathering information and fights for political purposes. The last one is cyber terror. Cyber terror aims to damage electronic systems and cause panic. So, what methods are used by the attackers who do them? Viruses, worms, spyware and Trojans…
Cyber Attack Methods
There are various methods of cyber attack. The most known are viruses. Various computer programs are used to prevent viruses, and every personal computer must use a virus program. We can briefly explain the methods of cyber attack:
• Virus: Small software that is transmitted to computers without user information or consent, threatens user files or the integrity, confidentiality, and accessibility of the operating system on the computer. Internet viruses can get in memory and change the structure of their programs.
• Worms: Independent programs that can multiply through computer viruses without human assistance are called worms, and worms can copy itself.
• Spyware: Software that collects data from a computer without the user’s knowledge and transmits it to third parties is called spyware. In general, it includes collecting confidential and personal information such as passwords, PIN codes and credit card numbers, tracking keystrokes, tracking web browsing behavior, and collecting e-mails.
• Trojans: The most common malware category is Trojans. Now that he’s named after the Trojan Horse in history, he must have a similarity, right? Of course there is. Trojans of the Internet are used for many malicious purposes, such as taking control of the affected device, capturing user data, and downloading and running other malicious software on the system.
Why do we need cyber security?
Do you know what the most common fraud methods are encountered by Internet users? Here are the most threatening risks from fraudulent notifications on social networks to phishers who try to capture your bank and card information:
1. The most common method used by virtual scammers is fake notifications that seem to come from popular social networks. They usually take the form of new friends, comments, likes, and so on, and are generally indistinguishable from reality. The only difference with real links is that they contain phishing links, but it’s not easy to detect.
2. Another popular form of fraud is phishing attacks that attempt to steal bank card information. In this method, fake messages are sent to users on behalf of banks or payment systems.
3. Another method of cyber attack is the creation of fake notifications using the names of popular online stores, distribution services, booking sites, multimedia platforms, job search websites and other popular online services.
4. Have you ever heard of the “Nigerian Prince” scam? This is one of the oldest spam types and is still in use. This kind of fraud promises a fortune in exchange for a payment to a lawyer or relative of a dead millionaire. In a different version of the same subject, the scammer presents himself as a celebrity in distress. Victims are offered a grand prize in exchange for helping an unfortunate millionaire to withdraw their bank accounts. To do this, first of all, they are asked to provide detailed information about themselves. Guess what this information is!
Unforgettable Cyber Attacks!
History is incredible and full of unforgettable crimes and attacks. This includes the cyber world, of course. Here are the everlasting cyber attacks in history!
• During the demonstration of Marconi’s wireless telegram, the telegram began to write a poem with morse codes. An inventor, Nevil Maskelyne, interfered with the show because he had restricted Marconi’s telegraph patent before him, and this event became the first event in which the communication lines were hacked.
• In 1988, a college student named Robert Morris issued a worm to measure the size of the Internet. However, some devices were hacked more than once and slowed down the systems, making them unusable. The worm affected 10 percent of the computers in the world, ie 600 thousand devices.
• In 2006, Operation Shady’s remote control vehicle targeted the systems of 72 organizations. Among the targets were the defense systems and technology firms of the UN and the United States. The operation is estimated to have come from China.
• Google established www.google.cn in 2006 despite strict Chinese management. Three years later, hackers accessed the company’s servers and stole private documents. Later analysis showed that gmail accounts in China, the US and Europe were vulnerable when they were in Internet Explorer.
• In 2011, Sony was fined £ 250,000 on charges of jeopardizing the personal information of users in the UK. It was reported that 100 million accounts and information were stolen as a result of an attack.
• In 2013, the American chain of markets, Target, stole 110 million credit card information. It is known that information is stolen from POS devices via magnetic strips.
• In 2014, a significant vulnerability was discovered by Google teams in the crypto algorithm used by the world’s largest websites.
• In 2015, the Ashley Madison dating site was hacked and stolen 37 million users.