1. First Name 2. Last Name 3. Middle Name 4. Current and previous school(s) 5. Your cellphone number Type of Information Shared Not shared
6. The name of your mother and father
7. The name of your siblings 8. Your address 9. Your home phone number 10. Your birthday Internet Safety Web safety, or online safety or Internet Safety, is the knowledge of maximizing the user's personal safety and security risks to private information and property associated with using the internet, and the self-protection from computer crime in general. Cybersafety is the safe and responsible use of information and communication technology. It is about keeping information safe and secure, but also about being responsible with that information, being respectful of other people online, and using good 'netiquette' (internet etiquette). Dangers of sharing of uploading sensitive information on the internet or social networks How to Defend Yourself Against Identity Theft
Almost every worldwide government agency responsible for identity
theft issues will tell you the same thing: The first step to fighting identity theft is to minimize the risk. Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else. Internet threats Internet threats Hacking Malware Virus Worm Trojan Spyware Spam Phishing Hacking Computer hacking refers to the practice of modifying or altering computer software and hardware to accomplish a goal that is considered to be outside of the creator's original objective.
Those individuals who engage in computer hacking activities are
typically referred to as hackers. 5 Phases of Hacking (How Hackers work) Reconnaissance: This is the primary phase where the Hacker tries to collect as much information as possible about the target. It includes Identifying the Target, finding out the target's IP Address Range, Network, DNS records, etc. Scanning: - It involves taking the information discovered during reconnaissance and using it to examine the network. Tools that a hacker may employ during the scanning phase can include dialers, port scanners, network mappers, sweepers, and vulnerability scanners. Hackers are seeking any information that can help them perpetrate attack such as computer names, IP addresses, and user accounts. Gaining Access :- After scanning, the hacker designs the blueprint of the network of the target with the help of data collected during Phase 1 and Phase 2. This is the phase where the real hacking takes place. Vulnerabilities discovered during the reconnaissance and scanning phase are now exploited to gain access. Maintaining Access Once a hacker has gained access, they want to keep that access for future exploitation and attacks. Sometimes, hackers harden the system from other hackers or security personnel by securing their exclusive access with backdoors, rootkits, and Trojans. Once the hacker owns the system, they can use it as a base to launch additional attacks. In this case, the owned system is sometimes referred to as a zombie system. Covering Tracks: - Once hackers have been able to gain and maintain access, they cover their tracks to avoid detection by security personnel, to continue to use the owned system, to remove evidence of hacking, or to avoid legal action. Hackers try to remove all traces of the attack, such as log files or intrusion detection system (IDS) alarms. Examples of activities during this phase of the attack include steganography, the use of tunneling protocols, and altering log files. Malwares Stands for malicious software Spyware Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. Virus A computer virus is a malware that, when executed, replicates by reproducing itself or infecting other programs by modifying them. Infecting computer programs can include as well, data files, or the boot sector of the hard drive. When this replication succeeds, the affected areas are then said to be "infected". Worms A worm is a program very similar to a virus; it has the ability to self- replicate and can lead to negative effects on your system. But they can be detected and eliminated by an antivirus software. Trojan A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Spam Electronic spamming is the use of electronic messaging systems to send unsolicited messages (spam), especially advertising, as well as sending messages repeatedly on the same site. While the most widely recognized form of spam is email spam, Phishing Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Tips to stay safe online 1. Be mindful of what you share and what site you share it to. 2. Do not just accept terms and conditions; read it. 3. Check out the privacy policy page of a website. 4. Know the security features of the social networking site you use. 5. Do not share password with anyone. 6. Avoid logging in to public networks/Wi-Fi. 7. Do not talk to strangers whether online or face-to-face. 8. Never post anything about future vacation. 9. Add friends you know in real life. 10. Avoid visiting untrusted websites. 11. Install and update an antivirus software on your computer. 12. If you have a Wi-Fi at home, make it a private network by adding password. 13. Avoid downloading anything from untrusted websites. 14. Buy the software; do not use pirated ones. 15. Do not reply or click links from suspicious emails Think before you click Protecting Reputations Online In the past, doing something embarrassing was not much a big deal. Nowadays, embarrassing moments are captured using any device you could imagine This could impact not only your reputation but also the people around you. Think before you click 1. Before you post something on the web, ask these questions to yourself: Would you want your parents or grandparents to see it? Would you want your future boss to see it? 2. Your friends depend on you to protect their reputation online. 3. Set your post to private. 4. Avoid using names. 5. If you feel that a post can affect you or others reputation, ask the one who posted it to pull it down or report it as inappropriate. Copyright Infringement Intellectual Property Copyright Law Copyright Page No part of this book may be copied, reproduced Copyright Infringement 1. Understand. Copyright protect literary works, photographs paintings, drawings, films, music (and lyrics), choreography, and sculptures. 2. Be responsible. Even if a material does not say that it is copyrighted, it is not a valid defense against copyright. 3. Be creative. Ask yourself whether what you are making is something that came from you or something made from somebody elses creativity. 4. Know the law. There are some limitations to copyright laws.
Hacking With Kali Linux : A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing