The unique contribution of science is the modern civilization. As the civilization progresses, the revolution is information technology. With the advancement of information technology, people are becoming cyber-dependent. And at the root of it, the computer and the Internet's ultimate contribution.
source
Earlier, countless waiters were counting on the waitress to find a friend, who had to depend on the postal department, and reaching hundreds of thousands of times, at the end of the wait, the letter reached the hands of a friend. And now it's a matter of seconds!
Messaging, phone can easily find people near us. Messaging, phone costs again more The cost to reduce the cost is email, viber, WhatsApp, messenger etc. By which can you find out the news of the beloved man in a moment. These are possible due to the development of IT.
Generally, the necessary information was usually kept on file or recorded as there was a lot of space needed to keep the information and time wasted. Besides, these files were easily destroyed in disaster or fire, could have been lost in different ways or even steals. Due to improvements in IT, the server is now sorted into database size. As a result, less time and space are less and the fear of stealing or losing is less.
source
Even though there has been an appreciation of cyber or IT technology, there are many other negative aspects. Various types of cyber criminals, who are known as hackers, have different convincing information in the hands of the people in many different ways or problems. As a result, people are damaged in many ways. So the security of information is increasing the importance of internet security or security.
How to handle information?
What is the need of cyber before learning how to handle information?
With a small example, let's say how many computers are formed together to form a network. Where data or information is transmitted from one place to another. This whole system is cyber. And entering the system without permission, the data is hacking. And those who do these things are called hackers or cyber criminals.
Hacking can mean many people who think of hacking the website or Facebook id but it is not. There may be different types of hacking. Such as:
♦Electrical device hacking. For example mobile, telephone, laptop, personal computer etc.
♦Web server hacking etc.
♦Network Hacking Such as WiFi Network,
Wireless Network, ATM Booth Network etc.
♦Tracking Network Hacking For example, drone tracking, aircraft tracking, unmanned car tracking etc.
♦Hacking different cards. Such as credit and debit cards etc.
♦Different account hacking. Such as email, facebook, viber, WhatsApp, messenger, tango, wechat account hacking.
The hackers first find the account, electrical device, system or network vulnerability. Applying those weaknesses enters the system. Collect system information and leave it on the Internet. Many times the system disables or completely destroys the system. Again, in the social media, especially on Facebook, behind the various fan, necessary or interesting pages, to open different phishing sites. Which basically acts as a hacking site. Users have clicked or hit these sites through emotionally, so they go to their Facebook id, password hacker. As a result hackers get the information. This is how the information is getting.
@originalworks
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit