Brain Print: New section of cyber security.(part -1)

in steemiteducation •  7 years ago  (edited)

The unique contribution of science is the modern civilization. As the civilization progresses, the revolution is information technology. With the advancement of information technology, people are becoming cyber-dependent. And at the root of it, the computer and the Internet's ultimate contribution.

source

Earlier, countless waiters were counting on the waitress to find a friend, who had to depend on the postal department, and reaching hundreds of thousands of times, at the end of the wait, the letter reached the hands of a friend. And now it's a matter of seconds!

Messaging, phone can easily find people near us. Messaging, phone costs again more The cost to reduce the cost is email, viber, WhatsApp, messenger etc. By which can you find out the news of the beloved man in a moment. These are possible due to the development of IT.


source

Generally, the necessary information was usually kept on file or recorded as there was a lot of space needed to keep the information and time wasted. Besides, these files were easily destroyed in disaster or fire, could have been lost in different ways or even steals. Due to improvements in IT, the server is now sorted into database size. As a result, less time and space are less and the fear of stealing or losing is less.

source

Even though there has been an appreciation of cyber or IT technology, there are many other negative aspects. Various types of cyber criminals, who are known as hackers, have different convincing information in the hands of the people in many different ways or problems. As a result, people are damaged in many ways. So the security of information is increasing the importance of internet security or security.

How to handle information?

What is the need of cyber before learning how to handle information?

With a small example, let's say how many computers are formed together to form a network. Where data or information is transmitted from one place to another. This whole system is cyber. And entering the system without permission, the data is hacking. And those who do these things are called hackers or cyber criminals.


source

Hacking can mean many people who think of hacking the website or Facebook id but it is not. There may be different types of hacking. Such as:

♦Electrical device hacking. For example mobile, telephone, laptop, personal computer etc.
♦Web server hacking etc.
♦Network Hacking Such as WiFi Network,
Wireless Network, ATM Booth Network etc.
♦Tracking Network Hacking For example, drone tracking, aircraft tracking, unmanned car tracking etc.
♦Hacking different cards. Such as credit and debit cards etc.
♦Different account hacking. Such as email, facebook, viber, WhatsApp, messenger, tango, wechat account hacking.


source

The hackers first find the account, electrical device, system or network vulnerability. Applying those weaknesses enters the system. Collect system information and leave it on the Internet. Many times the system disables or completely destroys the system. Again, in the social media, especially on Facebook, behind the various fan, necessary or interesting pages, to open different phishing sites. Which basically acts as a hacking site. Users have clicked or hit these sites through emotionally, so they go to their Facebook id, password hacker. As a result hackers get the information. This is how the information is getting.

Thank you follow & upvete

Next part will be coming soon

U5dry8PwHEY127jKoVY1LtGC4B2baPN_1680x8400 (1).png

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order: