Imagine a platoon of expert computer criminals using the internet to operate networks of hijacked computers.This army of computers,known as botnets unleashes a barrage of malicious computer code targetting a specific nation.Within minutes,that nations,financial,millitary,and commercial websites crash.ATMs and phone networks fail.Airplanes are grounded,and computer and safety systems at nuclear power plants are disrupted.How would people react?What would they do?What would you do?
Perhaps,the above scenario seems far fetched.But according to Richard A Clarke,the former US cordinator for security,something similar could happen in real life.Intact there has already been Cyberattacks.Perhaps,you have even been a victim.
Why would anyone want to launch a cyberattack?How are cyberattack carried out?And since cybercrime against individuals is common,how can you protect yourself online?
The digital battlefield
People launch cyber attacks for various reasons.Terrorists or government,for instance ,may try to infiltrate the computer networks of their enemies to steal secrets or to sabotage the equipments those computer networks control.In 2010,US deputy Secretary of defence William I.admitted that foreign adversaries had repeatedly attacked and penetrated classified US computer networks and stolen thousands of files including weapons blueprints,operational plans,and surveillance data.
Computer criminals use similar methods to steal intellectual property or financial information from corporate networks and personal computer.Criminals reportedly take in billion of dollars each year by means of fraudulent network transactions.
Criminal hackers has assembled best armies of hijacked computers to carry out their online attacks.In 2009,an Internet security firm uncovered a criminal gang that remotely controlled a global network of nearly two million computers many of them owned by private companies.The organization for Economic cooperation and development recently estimated that 1 in 3 online computers is remotely controlled by an intruder.What about your computer?can someone commandeer without your knowledge?
According to the OECD,1 in every 3 computers online is remotely controlled by an intruder
Or send passwords and financial details or other information back to the intruder.
Computer criminals could even trick you to infecting your computer yourself!How?You may infect your own computer by opening an attractivelooking email attachment,clicking on a webpage link ,downloading and installing a free computer program,plugging an infected memory device into your computer,or simply visiting a quesrionable website.Each of these actions can install malicious software on your computer and bring it under the control of a remote intruder.
Thank you!