Page 25 - CyberSecurityEssentialsEnglish
P. 25
CHAPTER 2
SECURING INTERNET ACCESS
One must have access to a digital society to engage in it entirely; this includes having access to resources and
innovations—such as the Internet and computers—that permit full digital engagement. Unfortunately, such
access comes with threats that can endanger you in real life. This chapter describes how to protect yourself
from such threats while accessing the Internet.
Digital Access Threats
Email-related threats
The reliance on internet communication, especially emails, has reached an all-time high, and so have the security
dangers that arise from utilizing it. The COVID-19 pandemic has forced multiple organizations to adopt a work-from-
home policy more permanently in the short term. Therefore, hackers used emails to launch around 90% of the most
recent cyberattacks.
Over the Internet, data is sent from one server to another. Therefore, they are susceptible to interception and assaults
by hackers. As an example, hackers can decrypt those intercepted feeds to steal private data.
Moreover, hackers employ sophisticated social engineering techniques (figure 13) to surpass traditional security
measures like antivirus software.
23

