Shielding Your Digital World: How to Stay Safe Online.

Abith Ahamed
6 min readAug 9, 2023

--

What is the Internet?

Before we can discuss internet security, it is important to have a clear understanding of what the internet is and its history. The Internet is a global network of interconnected computers that allows people to share information and communicate with each other. It is a vast and ever-changing resource that has revolutionized the way we live and work.

It all began in the late 1960s when the United States Department of Defense envisioned a decentralized communication network known as ARPANET, designed to ensure unwavering connectivity in times of crisis. This brave process made possible what we know today as the internet, transcending its military roots to become an omnipresent force in modern society.

The breakthrough moment arrived with Sir Tim Berners-Lee’s revolutionary concept of the World Wide Web in 1989. This visionary innovation unleashed the true potential of the internet, allowing users to navigate through a labyrinth of hyperlinked web pages. As the web spread its wings, the internet rapidly expanded beyond geographical boundaries, permeating every facet of our lives.

The internet is a powerful tool that can be used for good or for bad. It is important to be aware of the risks of using the internet, such as cyberbullying, online scams, and the spread of misinformation. However, the internet also has the potential to make our lives better in many ways.

Understanding of deep web.

The deep web refers to the vast portion of the internet that is not indexed and accessible through traditional search engines like Google, Bing, or Yahoo. Unlike the surface web, which includes websites and content readily accessible to the public, the deep web encompasses a concealed and hidden realm, shielded from casual browsing.

If you are interested in learning more about the deep web and dark web, please check my previous article.

Why cyber security is important?

Cyber security holds paramount importance in the digital age we inhabit. As technology continues to permeate every aspect of our lives, the internet has become a present platform for communication, business, and personal interactions. However, with this unprecedented connectivity comes cyber threats and attacks that can have far-reaching consequences.

For businesses, cyber security safeguards proprietary data, intellectual property, and customer information from falling into the hands of malicious actors. A successful cyber attack can disrupt operations, erode consumer trust, and lead to significant financial losses. As a cyber security professional, understanding the implications of cyber threats helps me highlight the importance of adopting good security practices, whether individual or business.

Social engineering awareness.

Social engineering awareness is a critical aspect of cybersecurity, focusing on understanding and safeguarding against manipulative tactics used by cybercriminals to exploit human vulnerabilities. Unlike traditional hacking techniques that target technical weaknesses, social engineering preys on psychological manipulation, deception, and trust to gain unauthorised access to sensitive information or systems.

Recognising the various forms of social engineering is paramount for individuals and organisations alike. Phishing is one prevalent form, where attackers send deceptive emails or messages impersonating trustworthy sources to trick recipients into revealing personal information or clicking on malicious links. Pretexting involves creating fabricated scenarios to extract sensitive data or gain access to secure areas. Another tactic is baiting, wherein attackers entice victims with tempting offers or quizzes that lure them into disclosing personal information.

Raising social engineering awareness helps empower users to identify red flags and employ best practices to protect against these threats. Users should not click any unauthorised links. It’s best to check the sender’s mail address or link before clicking it.

For example, a user could receive an email to change the password to Facebook, but the link might have the domain name facebok.com, not facebook.com. So users must be aware of this kind of tricky mail. Organisations can conduct cybersecurity training, emphasising the importance of verifying requests for sensitive information and establishing strict protocols for handling sensitive data.

Types of cyber security attacks.

Cybersecurity attacks come in various forms, each designed to exploit specific vulnerabilities in computer systems, networks, or individuals. Here are some common types of cyber security attacks:

Malware: Malware is malicious software designed to harm or gain unauthorised access to systems. This includes viruses, worms, trojans, ransomware, and spyware.

Phishing: Phishing attacks involve sending deceptive emails or messages that appear legitimate to trick users into revealing sensitive information, such as login credentials or financial details.

Denial of Service (DoS) and Distributed Denial of Service (DDoS): These attacks overload a target system with excessive traffic, causing it to become inaccessible to legitimate users.

Man-in-the-Middle (MitM): In a MitM attack, an attacker intercepts and relays communication between two parties, potentially eavesdropping or modifying the information being exchanged.

SQL Injection: This attack involves inserting malicious SQL code into web forms or URLs to gain unauthorised access to a database and retrieve sensitive information.

Cross-Site Scripting (XSS): XSS attacks inject malicious scripts into web applications, potentially compromising user data or session information.

Zero-Day Exploits: These attacks target undiscovered vulnerabilities in software or systems, taking advantage of the time between the vulnerability’s discovery and its patch.

Password Attacks: Password attacks include brute-force attacks (repeatedly trying different passwords) and dictionary attacks (using a list of common passwords) to gain unauthorised access.

Social Engineering: Social engineering attacks exploit human behaviour and trust to trick individuals into revealing sensitive information or performing specific actions, as I mentioned above.

Advanced Persistent Threats (APTs): APTs are sophisticated, targeted attacks that aim to gain prolonged, unauthorised access to a network, often for espionage or data theft.

IoT Exploitation: Internet of Things (IoT) devices with weak security can be exploited to gain access to home or corporate networks.

Insider Threats: Insider threats occur when employees, contractors, or other trusted individuals misuse their access to cause harm or data breaches intentionally or unintentionally.

How to handle the internet in a secure manner.

Handling the internet in a secure manner is crucial to safeguard your personal information, privacy, and digital assets. Here are some essential tips to help you stay safe online:

Use Strong and Unique Passwords: Create strong passwords with a mix of upper and lowercase letters, numbers, and special characters. Avoid using the same password for multiple accounts, and consider using a password manager to generate and store complex passwords securely.

Enable Two-Factor Authentication (2FA): Whenever possible, enable 2FA for your online accounts. This adds an extra layer of security by requiring a second form of verification (such as a code sent to your phone) to access your account.

Keep Software and Devices Updated: Regularly update your operating system, apps, and antivirus software. Software updates often include security patches that protect against known vulnerabilities.

Be Cautious with Email and Links: Beware of phishing emails that attempt to trick you into revealing personal information. Avoid clicking on links or downloading attachments from unknown or suspicious sources.

Use Secure Wi-Fi Networks: Be cautious when using public Wi-Fi networks, as they can be vulnerable to cyber-attacks. Avoid accessing sensitive information or logging into accounts on public Wi-Fi, and consider using a Virtual Private Network (VPN) for added security.

Secure Your Social Media Profiles: Limit the personal information you share on social media platforms and adjust privacy settings to control who can see your posts and profile information.

Avoid Suspicious Websites and Downloads: Only download software, apps, and files from reputable sources. Avoid visiting suspicious websites or clicking on pop-up ads.

Backup Your Data Regularly: Create regular backups of your important files and data. In case of a cyber-attack or hardware failure, having backups ensures you can recover your information.

Educate Yourself about Cybersecurity: Stay informed about the latest cyber threats and security best practices. Attend cybersecurity workshops or webinars to enhance your knowledge and awareness.

Use a Firewall and Antivirus Software: Install and regularly update reliable antivirus software and enable a firewall to protect your devices from malware and unauthorised access.

Be Cautious on Social Engineering: Be sceptical of unsolicited requests for personal information or financial transactions, even if they appear to come from trusted sources. Always verify such requests through other means before taking any action.

Review App Permissions: Review the permissions requested by apps on your devices and grant only the necessary ones. Avoid giving unnecessary access to sensitive information.

By adopting these security practices and staying vigilant while using the internet, you can significantly reduce the risk of falling victim to cyber threats and ensure a safer online experience.

Conclusion.

Handling the internet in a secure manner demands a proactive and conscientious approach. By adopting best practices such as using strong passwords, enabling two-factor authentication, staying updated on software, and being cautious with email and links, we can create a safer online environment for ourselves and others.

As technology continues to evolve, so will cyber threats. Therefore, our commitment to cyber security must remain steadfast, driven by continuous learning, adaptation, and collaboration. By fostering a collective sense of responsibility towards cyber security, we can navigate the digital landscape with confidence, harnessing the full potential of the internet while protecting our online presence and privacy.

--

--

Abith Ahamed
Abith Ahamed

Written by Abith Ahamed

Passionate about technology, networking, and cybersecurity. Network Engineer| Cybersecurity Specialist | Constantly exploring the ever-evolving tech landscape.

No responses yet