Page 25 - CyberSecurityEssentialsEnglish
P. 25

CHAPTER 2



       SECURING INTERNET ACCESS























       One must have access to a digital society to engage in it entirely; this includes having access to resources and
       innovations—such as the Internet and computers—that permit full digital engagement. Unfortunately, such
       access comes with threats that can endanger you in real life. This chapter describes how to protect yourself
       from such threats while accessing the Internet.

       Digital Access Threats

       Email-related threats

       The reliance on internet communication, especially emails, has reached an all-time high, and so have the security
       dangers that arise from utilizing it. The COVID-19 pandemic has forced multiple organizations to adopt a work-from-
       home policy more permanently in the short term. Therefore, hackers used emails to launch around 90% of the most
       recent cyberattacks.

       Over the Internet, data is sent from one server to another. Therefore, they are susceptible to interception and assaults
       by hackers. As an example, hackers can decrypt those intercepted feeds to steal private data.
       Moreover,  hackers  employ  sophisticated  social  engineering  techniques  (figure  13)  to  surpass  traditional  security
       measures like antivirus software.



























          23
   20   21   22   23   24   25   26   27   28   29   30