How to defend against cyber crime and cyber crime

Cybercrime, the cyber cybercrime are all those who use the networks to be committed, accessing the target of the crime using computers. Those who commit them are hackers (experts hacking) y se les llama ciberdelincuentes o cibercriminales.

computer fraud

Consisten en utilizar las redes para obtener de manera fraudulenta información de los usuarios que luego se usa en la comisión de fraudes. For example, acceder a una Amazon customer account y obtener el historial de compras para luego ofrecer a la víctima productos o servicios fraudulentos, or discover what kind of interest have someone to guide you to fake websites.

Theft and disclosure of trade secrets

Consiste en access confidential information a través de cuentas de correo o redes sociales o en obtener contraseñas y claves de seguridad para acceder a esa información.

blackmails, threats and cyberbullying

It happens a lot among young people, y consiste en get personal information from the victim para luego amenazar con usarla en su contra si la víctima no accede a dar al hacker lo que le pide.

In recent years it has become popular ciberacoso con fines sexuales, in which the criminal usually gets tricked, compromised personal information or pictures of his victim and then ask for sex in exchange for not disseminate.

Spoofing

La suplantación de identidad consiste en usar la red para conseguir suficiente información personal de un usuario de Internet para impersonate him. May the activities that will be done using the image or identity of another are completely legal, but impersonation is always illegal.

Hack security cameras and systems

Entrar en el sistema de seguridad de una vivienda puede servir para avoid being detected during a robbery, y también para aprenderse las rutinas de una familia, which it can be used for many criminal purposes.

Precautions against cyber crime

  • Protect our electronics debidamente.La most cybercrimes committed accediendo a los dispositivos electrónicos de la víctima, ya sea de manera física o a distancia. Thats why he 90% attacks can be avoided if the initial access is avoided.
  • Put passwords: evitar usar series de números correlativos, Birthday dates, etc., overall the best password is the weirdest possible. También es bueno have different passwords for each device.
  • Zoom windows devices: si tenéis un ordenador frente a una ventana que da a la calle, is not only possible someone know that you have this device and can think of hacking, but the wireless network will be more accessible. This is especially important if you have appliances home automation control, as Amazon Echo o Google Home, que dan acceso a todo el sistema de seguridad del hogar.
  • Not stop moving, portátiles o tablets al alcance de otras personas Unsupervised.

Avoid public connections

Si acceder a public WiFi networks es algo que no podéis evitar, hay que intentar verificar siempre que la red sea lo que parece. Some Hackers create wifi networks con nombres similares a las de redes públicas para llevar a los usuarios a engaño. Cuando el usuario se conecta a “Hotel Miramar 5G” en lugar de a “hotel Miramar”, for example, pasa a compartir sus datos con un criminal que puede aprovechar la ocasión para capture private information.

Keep private life private

El uso intenso de las redes sociales ha llevado a mucha gente a convertir esas plataformas en una extensión de su día a día. Eso hace que se tienda a subir fotos y a share personal information sin pensar en que muchos de nuestros amigos o followers are real unknown networks. The photo spread with little clothes on the beach in summer is a great example of this.

Therefore, hay que avoid giving many personal data (real names, age, addresses, phones…) and, course, not give any economic data. This point should also be taken into account when creating profiles on web pages, using remote control devices…

Separ personal information and labor

If you have job responsibilities involving handling company data, employee or confidential information, es bueno not use mobile, tablet or personal computer to store such data. Usually it tends to protect less personal devices, and that can lead to problems with employment data.

Monitoring the activity of children in the network

Children are particularly vulnerable to certain types of attacks, so they must be protected, monitoring their activity y evitando que incurran en comportamientos de riesgo.

 

Leave a Reply

Your email address will not be published.