Critically discuss about how users, enabled hackers to obtain these details more easily by providing known companies with our data.
Ransomeware
Using storage solutions that require subscription like Google Drive and One Drive increase the chances of hackers to find a gap and use ransomeware to access and destroy data.
They can be avoided by installing and updating anti-virus software's and using windows defender such as McAfee.
The Internet of Things
Users make use of these physical objects to connect and share data with other individuals. Such as devices,vehicles and buildings with software's and applications, hackers make use of physical objects to hack devices and other physical objects.
Cyber-espionage
Making use of computer to access internet network connection and illegally access confidential information held by government or organisation.
Cyber theft increases
Users provide their personal information details and usually hackers make use of that personal information to gain access to another important information. The stealing of personal information and financial information on the internet.
Insecure Passwords
Users set up weak passwords and they do not make use of upper and lower case and numbers to set up strong passwords, this also allow hackers to easily crack weak passwords.
They can be avoided by installing and updating anti-virus software's and using windows defender such as McAfee.
The Internet of Things
Users make use of these physical objects to connect and share data with other individuals. Such as devices,vehicles and buildings with software's and applications, hackers make use of physical objects to hack devices and other physical objects.
Cyber-espionage
Making use of computer to access internet network connection and illegally access confidential information held by government or organisation.
Cyber theft increases
Users provide their personal information details and usually hackers make use of that personal information to gain access to another important information. The stealing of personal information and financial information on the internet.
Insecure Passwords
Users set up weak passwords and they do not make use of upper and lower case and numbers to set up strong passwords, this also allow hackers to easily crack weak passwords.
Overview how they can be avoided or mitigated.
They can avoid these risks first by installing anti-virus software's and update them weekly, they could also avoid these risks by securing their network connection, personal information and making use of strong passwords
No comments:
Post a Comment