Friday, November 22, 2024

Cybercrime-Blog # 9

Hello! This is a much more positive blog than the one before this :) Here are the types of cyber crime that I have been a victim of: 

 Phishing

  • Definition: A cyberattack where an attacker pretends to be a trustworthy entity to trick individuals into providing sensitive information.
  • Example: Receiving an email that appears to be from your bank, asking you to verify your account by clicking on a fraudulent link.
This happens to me constantly through both email and text. I am usually able to spot these phishing attacks but I have fallen for them in the past. There was a Costco email that I got and it looked real. They told me that I had won some sort of free gift and I ended up being taken to some page where they were offering other discounted things. I thought it would be a nice thing for mew to be able to give my husband what looked like some wireless headphones. Turns out this whole thing was a scam and I had to call my bank, or either they noticed it and sent me some alert and whatever but I ended up having to go into the bank dispute the charges which they did give back to me, and made me a new debit card too.

Adware

  • Definition: Software that automatically displays or downloads advertisements, often without the user's consent.
  • Example: A browser extension that bombards users with pop-up ads after being installed.
I hate adware! Its everywhere. Now I know what its called. Thank you!

Cyberbullying

  • Definition: The use of electronic communication to harass, threaten, or intimidate someone.
  • Example: Sending threatening messages or posting hurtful comments about someone on social media.
Yes. I was in a bad relationship and my ex-boyfriend tried to take over my Facebook account and hacked my email, but I got all of it back because I was quicker and smarter than him. 

 Data Breach

  • Definition: An incident where sensitive, protected, or confidential data is accessed or disclosed without authorization.
  • Example: The Equifax data breach in 2017 exposed the personal information of 147 million individuals.
Man.....too many to count. I've had this happen at least 6 times where they send you letters in the mail and give you that credit monitoring service for a year. I just got another one in the mail last month from some healthcare company that was hacked.....

This stuff is crazy and I can't believe there are no laws against this but then, again, what can people who aren't able to catch these guys do? We need a cyber security team. Trump needs to get one of those if he hasn't already. Ah. Found it:

The Cybersecurity and Infrastructure Security Agency (CISA) is a U.S. federal agency under the Department of Homeland Security (DHS), established to enhance national cybersecurity and protect critical infrastructure. CISA was created in November 2018, when the DHS elevated its cybersecurity and infrastructure protection functions into a standalone agency. This move acknowledged the growing importance of cybersecurity to national security. With the increasing sophistication of cyber threats and reliance on digital infrastructure, CISA plays a pivotal role in safeguarding essential systems from potential attacks. Its partnerships with both government and private sectors ensure a comprehensive approach to national cybersecurity challenges.

The article https://www.forbes.com/sites/chuckbrooks/2024/11/18/5-cybersecurity-priorities-for-the-trump-administration/ outlines the top five cybersecurity priorities for the Trump Administration's second term, emphasizing the pivotal role of the Cybersecurity and Infrastructure Security Agency (CISA). Here's a summary:

  1. Protecting Critical Infrastructure
    Safeguarding vital physical and digital systems essential for national security and economic stability remains a top priority.

  2. Interagency and Public-Private Cooperation
    Collaborative efforts among government agencies and private entities are essential for effective cybersecurity measures and information sharing.

  3. Building on Government Cyber Risk Management Strategies
    Leveraging frameworks like "Zero Trust" and "Security by Design" to mitigate vulnerabilities and enhance security across government systems.

  4. Addressing Emerging Technologies
    Preparing for the dual impact of advancements like AI and quantum computing, which present new opportunities and security challenges.

  5. Ensuring the Cybersecurity of Space Systems
    With increasing dependence on satellites, securing space-based assets has become crucial for communication, navigation, and defense.


Sources: 

Brooks, C. (2024, November 18). 5 Cybersecurity priorities for the Trump administration. Forbes. https://www.forbes.com/sites/chuckbrooks/2024/11/18/5-cybersecurity-priorities-for-the-trump-administration/

ChatGPT

No comments:

Post a Comment

Blog #10-Using HTML to Create a Website

file:///C:/Users/Shannon%20Moffat/Downloads/SandwichesWebsite.html I started creating a web page using HTML for the first time by following ...