The versatile use of the Internet continues to improve our quality of life as a blessing. The number of internet users is gradually increasing. Almost every field including social communication, information exchange, business is now in our hands for the benefit of the internet.
Using the popularity of the internet, some endangered geniuses are harming the general internet users in various ways. As a result, financial and social harm, including personal information protection is being done. With a little awareness, we can be much safer on the Internet.
What is Internet Security?
Internet security is the process of trying to avoid potential harm online.
In fact, no process is 100% safe on the Internet. We can only use some of the procedures to increase security.
If we compare internet security with a house, then the security of that house will depend on what material the house is made of. The impact resistance of a house made of concrete must be greater than that of a house made of straw and bamboo.
Why does Internet Security is needed?
Security is needed to ensure the protection of personal information and property on the Internet. Hackers are those who steal and misuse your personal information in various ways. They use various viruses and malware to steal your information like bank and credit card information, photo galleries, email, and social media accounts, etc. Which can subsequently tarnish the image of your social life, including money stealing.
How we become victims of Hacking
Hackers are constantly inventing new ways to steal our information. Our ignorance is most responsible for leaving our personal information in the hands of others. There are many more ways we can be victims of hacking. Here are some common methods and some possible ways to get rid of it.
1. Our Ignorance
We ordinary users are not very careful in using the internet. And hackers take advantage of this carelessness to steal our information. Some common mistakes that we make when using the Internet are:
Methods of Remedy
2. Viruses & Malware
Viruses and malware are a kind of malicious code or program that hackers create for stealing our information. When viruses and malware enter a computer, it is automatically installed and our information is being sent to the hacker through the internet.
Some viruses cannot be removed by using antivirus. These enter the computer’s BIOS and steal information. In this case, it may not be possible to remove the virus by setting up a new Windows.
“Keylogger” is a type of virus, that steals strokes of our keyboard and sends it to hackers. That is, the Keylogger virus records what we have pressed on the keyboard as ID and password and sends it to the hacker.
There are also many other types of viruses. Some malicious viruses steal our browser’s cache, browser-saved IDs, and passwords. Virus programs are mainly designed to harm others.
How do viruses and malware enter our devices?
Methods of Remedy
Usually, ordinary users don’t understand whether the Keylogger is installed on our computer or not. So we can use a little trick while writing our ID and password.
Suppose, your password is MyPassword_1234. Then when writing your password add some extra letters to it. Such as My_1234_Password_1234. Then, before pressing Enter, select the extra letters (1234) together and delete them with backspace. Then log in to the account. Then the hacker will have very little chance of getting your correct password.
3. Being a Victim of Phishing
In this method, the hacker creates a clone of a site that you are using. That is, create a website that looks the same as a site that you are using. You will be asked for your ID and password if you want to use that clone site. Which will be stored in the hacker’s database.
Suppose you use Facebook regularly. Now a hacker wants to hack your Facebook ID. Then he will create a site that looks like Facebook. Then he will send you the link of that site by email, message, or any other way. If you want to enter the phishing site, you have to give your ID and password. And in this way, hackers can steal your ID and password.
Methods of Remedy
4. Man-in-the-Middle Attack
In this method, the hacker hides himself between the user-side and the server-side and then captures the information that he wants by tempering the data.
When we visit a website by using a browser, a request goes from our browser to the server of that website. Then the server sends data to the browser based on that request. In this communication stage between the server and the browser, hackers hack the information by hiding himself.
If the information came from the server-side is not encrypted, the hacker can easily tamper with it.
Methods of Remedy
Sometimes we may need to send a very important file to someone else. In this case, we can send the file piece by piece without sending the file at once.
Suppose, our file is 10 MB. Then first we will split the file into 2 or 3 parts using WinRAR or any other archive software. Then a part will be sent using an email. Other parts will be sent using another email or messaging app. In this method, every part will be sent using different mediums.
The sender must be told which software has been used to split the original file. This is because the same software may need to be used to reattach the file. That is, if we split the original file using WinRAR, then we may need to merge the pieces again using WinRAR.
If you send the file in this way, it will not be possible to get the original file without all the pieces. And it is almost impossible for any hacker to hack every medium and steal all the pieces.
How to Split the file using WinRAR
How to Recover the Split File using WinRAR
Put all the files in one folder. Select all the files with Ctrl + A. Click the right button of the mouse. Click Extract Here. Then the original file can be found.
Here are some common methods of how our information can be stolen online and how to protect them from it. We need to be careful about where and how we are using our information to avoid online hacking.