Cyber Security Measures

Provido

Katılımcı Üye
21 Eki 2015
477
1
With the spread of computer technologies, another danger emerged which is cyber attacks. So what is this cyber attack and what is it done for?
Cyber attack; people who are called as hackers who are experts in the field of computer and internet, can be used for various purposes to attack banks, police, gendarmerie, government, individuals, firms etc. sites’ or computers’.
In this article, I will draw attention to the measures that can be taken after making a brief description to the attacks that targeting personal computers.


Attacks on personal computers are usually for advertising purposes. This may be the advertisement, slogan of a product, website or idea. Social accounts can be hijacked to get the likes of their own pages.
For example, your Facebook account is stolen and your entire friends list is invited to the page where you want to be enlarged.In this way, there are many Facebook pages whose likes are increased.
If the attack on your personal computer is not for advertising purposes, it was made for intelligence, undermining, harm or fantasy purposes. Here you can include the phrase intelligence: Someone is curious about your personal life and is using your personal data for that purpose.
If that is not the purpose of the attack against you, there is another option. This is because the hacker wants to use your computer for attacks.
Attacks using your computer are usually DDoS attacks. DDoS attack is when many machines(computers) are directed to a single target(site) at the same time, rendering the target system non-serviceable.
In order to do this, the hacker can inflect millions of computers with viruses and then redirect those millions of computers to the target site with a single command. Thus, the target site won’t respond due to excessive traffic.


In cyber attacks, hackers have no obligation to break into computers. Computer viruses are soldiers of hackers. They can make them do what they want. If you notice that your computer is infected with a virus, you need to be very careful about it. So how can we protect ourselves from cyber attacks, hackers and viruses? The way to prevent cyber attacks is to be careful. To protect against cyber attacks;

Use Social Media Consciously

• Pay attention to privacy. Av0id sharing publicly. Close your account to search engines. Provide as little information as possible about yourself and protect your privacy.
• Don’t trust Facebook apps. Because the apps on Facebook are third-party apps and they have nothing to do with Facebook. An application may be written by malicious people. Don’t use the app you don’t trust. Malicious apps are generally trick you in the form of increasing followers, like and see who looks at your profile.
• Don’t use like and follower systems. With the token code you copy, you give all your powers to that like application or other apps and the app follows others for you, others follow you. If you want to increase followers, you can use the like apps that have rating system, more secure and don’t require token. However, the risk here is that people you don’t know are tracking you so people who don’t know will see your personal data, photos etc. sharings. Now it’s entirely up to him what he’s going to use for.
• Don’t accept friendship requests of people you don’t know. Don’t add people you don’t know. Don’t talk to people you don’t know and don’t exchange files.
• Your friend who adds you may not actually be your friend. So it could be the attacker who added you from an account that mimics your friend’s account. In such cases, contact your friend directly or by phone to confirm that it is him.
• Be careful when you like pages. Someone who wants to know about you could be hiding behind a page and following you.

• Don’t enter random groups.

• Be wary of sites that imitate Facebook. If you encounter Facebook login screen with a link you click without logging out of Facebook, don’t log in. Because that site isn’t Facebook, check your address bar. If an intervention has been made to your host file, the name of the fake site also be displayed on facebook.com. Because doing DNS resolution on the remote machine is the next thing. The computer checks the host file first to decide which site to enter using this domain. So this means that if you set google.com’s IP to facebook.com domain in your host file, when you enter facebook.com in the address bar, the computer will enter google.com Be careful about that, too.

Use Other Websites Consciously

  • Be especially careful when downloading files. The file you downloaded may contain malware.

  • Distinguish truth from the advertisement. Especially on download sites, an ad containing malware can be placed next to the download button. If you click on the ad to download the file, you have downloaded the malware to your computer. This type of software usually changes your first homepage when you run it.

  • Don’t be fooled by fake sites. There are many sites that contain malware, especially in the style of flash player, java updates. If you fall for this trick, you will install the malware on your computer by your own hands.
  • Don’t enter every site. Because websites are actually computers, so they can see who is connecting to them. Therefore the site administration will see your IP address. Many things can be done from IP address to l0cation detection. And if a hacker is going to attack your computer over internet, he will definitely need your IP address.
  • Don’t enter the Deep web. It is unclear who is in this dark corner of the internet. The connection is provided through the Tor network and is anonymously connected to the deep web. Since everyone’s identity is confidential here, it isn’t clear who is what.
  • Stay away from Warez sites. A virus is usually placed inside programs whose license is broken. If you use the software for free, there has to be a price, right?
  • There are sites that distribute viruses. You have to be very careful about that, too.
  • There is also a high probability of getting viruses on your computer from chat sites. Again, someone may be using Chat services to send malware.
There are few rules to consider hen using your computer

• Use licensed software. I mentioned a little while walking about Warez sites above. Malware can be loaded into a software that has broken its license.

• Keep your Anti-Virus program absolutely active and up-to-date.

• Be careful when using removable media. There are many viruses, especially those that are transmitted through flash disks. When Anti-virus programs identify viruses that spread over Web, it is more difficult to gather information about the viruses distributed over the flash disk. Therefore, most anti-virus programs can’t detect viruses on usb disks. You can see the virus files by making the hidden and system files visible on your flash disk to see if there is a virus on your usb disk or if you enter the usb disk with the Winrar program, you will see all the hidden files. If your flash drive has a file named autorun.inf, it is infected. This autorun.inf file is actually a script and the command to run the virus is written in the file. Commands in the autorun.inf file are triggered when the icon of the disk is clicked to open it. I’m thinking of sharing the path to clear this virus in my next post.

• Keep your operating system up-to-date. Especially if you are using Windows, you should definitely use genuine Windows and the system you use must be constantly updated. Microsoft releases Windows vulnerabilities every week and closes them with security updates. Hackers can hack into your computer using these vulnerabilities.

• If your computer has started to have freezing problems, your internet is unnecessarily crunching and if your computers is unresponsive,a virus may be running in the background. In these cases, the cleanest procedure is to format your computer.

Mail Security
Don’t open emails from people you don’t know. It may contain useful software or it may be trying to steal your passwords using the phishing method. The phishing method is a method of deceiving the victim with a fake mail as if it were coming from an institution, bank, facebook etc. Victim is asked to enter password and if he has entered his password, he’s screwed. There are two ways to download malware. First, the victim is directed to a site containing malware or given a direct link to the malware and and the virus is installed on the computer.
Second way is to direct transmission of the virus. Normally, companies that offer mail services can catch malicious software and anti-virus. However, if the virus is encrypted, antis can’t detect it.



---------------------

Turkish Version: https://www.turkhackteam.org/siber-guvenlik/1511957-siber-guvenlik-onlemleri.html
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.