Some time ago no one could even imagine that computers could be hijacked by so-called "pirates". These attackers use the World Wide Web to create their own botnet to access and control the computers of their victims. Through a botnet, it is possible to launch malicious commands and messages that can destroy the country's main websites in a matter of minutes. Phone lines and ATMs stop working, flights can be canceled, and, worst of all, computer security systems at nuclear power plants and other strategic facilities can get out of control.
To some, this information is like a modern-day movie, but as Richard Clark, the national coordinator for counterterrorism, security and infrastructure protection for the United States, says, similar things can happen in modern life as well. It is worth noting that cyber attacks have occurred more than once. For example, the last cyberattack occurred in 2010, when a dangerous network worm called Stuxnet managed to attack the industrial automation systems at a nuclear power plant in Iran.
It is impossible to say unequivocally for what purpose cyber attacks are carried out. For example, states may use them to take possession of sensitive information of their adversaries, or to disable strategic facilities of the country. U.S. Undersecretary of Defense William Lynn said that classified documents related to strategic plans, intelligence, as well as weapons blueprints were repeatedly stolen from classified U.S. computer networks.
As for ordinary life, these methods are used by hackers to take possession of intellectual property or financial information. According to unofficial sources, illegal operations generate billions of dollars in revenue.
We have already noted that hackers create entire networks for cyberattacks, using the computers of their victims. For example, in 2009, a cyber gang was exposed that used more than two million of its victims' computers to control an international network. According to the Organization for Economic Cooperation and Development, one in three computers that work remotely on the Internet is controlled by cybercriminals.
Hackers also use a large number of malicious programs that find a vulnerability in your computer, penetrate it and look for necessary information. These programs can modify or destroy files, send emails, or send attackers passwords or other sensitive information.
Internet users should be extremely careful because it is possible to infect your computer by yourself, for example, when opening an email attachment or downloading and installing a free program, as well as when visiting questionable sites.
It is difficult to determine whether your computer is infected by a virus, but if you see that the computer has slowed down, applications do not open, or suspicious programs are installed through pop-up windows, we recommend you to contact a specialist.
It is no secret that more and more people and countries base their work on computer systems, so it begs the conclusion that we should expect an increase in the number and quality of cyber attacks. That is why many countries are engaged in the development of improved software that can strengthen the information security of the country. Also, many countries are conducting large-scale tests of the reliability of computer networks. But according to Stephen Chabinski, deputy director of the FBI's cybercrime department, given the desire, money and time, an adversary can always penetrate an attacked system.
Here are a few rules to help keep your online life safe
Be sure to install antivirus, firewall, and applications that can block spyware on your computer. Update these programs and the operating system itself regularly.
2. Before you open links or applications in emails, make sure that they are intended for you. Be especially careful about emails from people you don't know, or emails that require the disclosure of personal information and confidential information.
Do not download or run software from unknown sources. 4.
Use passwords that consist of at least eight characters and are a combination of letters and numbers. Periodically change passwords, and use different passwords for different accounts.
5. Work only with companies that use encrypted connections.
6. You should not share confidential information and personal data when working with unsecured Wi-Fi networks.
7. Don't forget to turn off your computer when you're not working on it.
8. Make copies of your files and store them in another secure location.