Skip to main content

Introduction To Cybersecurity - A Beginner's Guide To Cybersecurity World

Introduction To Cybersecurity - A Beginner's Guide To Cybersecurity World
Have you ever thought about how secure your data is? Nowadays, cybercrime is a major issue. Therefore, Cybersecurity has become very important. My main goal to start this blog is more and more people learn and aware of cybersecurity, networking, and hacking related concepts. So, Let's start the journey.

I am here to guide you through the world of cybersecurity. Everyone who uses smartphones, computers, tablets, or any other digital device which is connected to the internet should know the cybersecurity related concepts. This is my first blog so here you learn the basic things that you should be aware of cybersecurity.

Before I start, let me just list out the topics I'll be covering in this article.
  • The History of Cybersecurity
  • Why We Need Cybersecurity?
The History of Cybersecurity
Around fifty years ago words like adware, spyware, malware, viruses, worms, trojans, ransomware weren't even part of information technology (IT) vocabulary. The origin of cybersecurity came into existence because of the development of viruses.
How did we get there?
In the 1970s, researcher of BBN Technologies, Robert Thomas created the first virus. After creating a virus, He realized that it was possible for a computer program to go across a network and that computer program also left a sign wherever it went. Robert Thomas named this computer program "Creeper" and he designed it to travel between the Tenex terminal (on the early ARPANET), by printing the message like "I'M THE CREEPER : CATCH ME IF YOU CAN".
At that time, Ray Tomlinson (the inventor of email), was also working for BBN Technologies. Ray Tomlinson saw this and he likes it. So, he tried to repair something with that computer program and made the first self-replicating computer worm. Ray Tomlinson named this computer program "Reaper" and it became the first antivirus software that would found Creeper virus copies and delete it.
Where are we now?
After Creeper and Reaper, cyberattacks became more and more sophisticated. Cyberattacks also increase as computer software and hardware developed. German citizen, Marcus Hess hacked 400 military computers and he intended to sell all the private secret information to the KGB. However, American astronomer, Clifford Stoll caught him before he sells that private secret information to the KGB.
In 1988, Computer scientist, Robert Morris wanted to check the size (volume) of the internet and for that, he wrote a program that tests the size of the internet. This program went through networks, entered into Unix terminals, and copied itself. Due to this functionality, this program became a famous network virus named Morris worm. This network virus could infect a device multiple times and each time it would damage the device. Under the Computer Fraud and Abuse Act, Robert Morris was charged for creating the Morris worm network virus.
It is hard for the Information Technology (IT) community to remember a bigger shock than WannaCry, the biggest ransomware attack in history. WannaCry had infected 2,30,000+ computer devices in more than 150 countries within a single day.

Introduction To Cybersecurity - A Beginner's Guide To Cybersecurity World
From Wikimedia Commons
WannaCry is very famous and popular, but hardly the only case. We see on a regular basis how attackers are finding new ways to compromise (hack) devices.
Nowadays, viruses were more dangerous and harder to stop. The above is to name a few, but these attacks are enough to prove that cybersecurity is necessary for corporations, small businesses, and also for people who use computers and smartphones.
The Future of Cybersecurity
Nowadays, cyber threats are so common and advanced that they seem almost impossible to stop. As a result, now many organizations focus on cybersecurity and also developing proper response plans that minimize the damage in the event of cyberattacks. According to a survey, cybersecurity professionals are in high demand but the talent gap for cybersecurity is estimated to hit around 2 million by 2022. Those who are in the cybersecurity industry, the opportunities are endless.
Why We Need Cybersecurity?
Today's generation lives an entire day on the internet and common users are almost unknowledgeable as to how those random bits of the 0's and 1's reach securely to our computers, smartphones, and other digital devices. It's a golden era for attackers. With so many public IP addresses, access points, and constant traffic, attackers are creating malicious software for the same. Cyberattacks are evolving day by day. Attackers are also becoming more creative with their viruses and malware.
Introduction To Cybersecurity - A Beginner's Guide To Cybersecurity World
Therefore, there has to be some type of protocol that protects us against all types of cyberattacks and make sure our data does not fall into the wrong hands. So, that's why we need cybersecurity.
If you have any questions related to cybersecurity and also want to share your views on this then please mention in the comments box and I will get back to you.


Popular posts from this blog

How To Check If a Link Is Safe To Click

Many times, we share links among our friends on social media platforms like WhatsApp, Facebook, Instagram or Twitter. But do we know how safe they are? What can happen if you click on any malicious link? We never think of the following things : Links can drop various harmful programs, viruses on your device Links can steal your personal data by dropping spyware or keyloggers Use your browser for crypto mining which will affect your device's performance Even if your device is secured with antivirus, not all of them warn you before clicking such malicious links . And the moment you click on these, they will become big trouble for you. This can sometimes even be dangerous with regard to data security and identity theft. So, Be careful about what you click on. These days one of the quickest growing security issues is ransomware , which is often spread by the user unintentionally clicking dangerous links in emails, social media platforms, messengers, and other tool

How To Enable WhatsApp Fingerprint Lock Feature on Android

WhatsApp has officially rolled out the fingerprint lock feature for all the Android users. Most of you may already have been doing it for the last few years with the help of third-party app lockers for adding more security. Keeping that in mind and to make the process quicker and safer at the same time, WhatsApp has now launched this new fingerprint lock feature so that you can open the app by your fingerprint. It means that regardless of whether the phone is opened, others won't have the option to gain access to the messages without your fingerprint. So, you can now secure your WhatsApp conversations with an extra layer of biometric security . With this step, WhatsApp is finally offering biometric authentication to the Android app, while iPhone users enjoying both the Touch ID that is the fingerprint recognition and Face ID that is the facial recognition since the month of February 2019. WhatsApp is also giving more options with the new fingerprint lock featur

TikTok Secretly Sent Users Private Data & PII Number to Chinese Server Including Draft Videos

The popular Android and iOS short-videos creating app, TikTok hit with a lawsuit claims that the app illegally and secretly transfers app's users' private sensitive data and Personally Identifiable Information (PII) to Chinese servers. TikTok which is a 15-second short-video creating app especially popular among the younger generation and also downloaded over 1.3 Billion times worldwide . TikTok remains top in the most downloaded app list for months on the Apple App Store and Google Play Store.  According to the lawsuit, Tiktok shared the user's created videos which include private acts and closeups of user's faces (biometric data) before the videos are saved on the app. TikTok provides many options includes the next button, close button, and button for effects to its users while recording the video. Here, the next button takes users to the screen that shows these two options : "post" and "save".  After clicking on the "next" button, Tik