What is Cyber Security? How Do We Protect Our Personal Information Security?
Before moving on to the question of what measures can be taken against cyber attacks, I would like to give a brief briefing on the types of attacks. We can group the types and methods of cyber attacks as follows;
- Copying data by bypassing the firewall of the target system,
- Open mic/camera listening,
- Penetration with Network scanning, which we call Network scanning,
- All services hosted and available in the target system are deactivated (Denial of Service),
- Taking destructive action against all internet services of the target structure,
- Breaking passwords with crypto attack,
- IP hiding and replacing another IP (IP Masquerading),
- eavesdropping and data capture (MITM) between two connections
- Phishing
How Do We Protect Our Personal Information Security?
So far, I have tried to outline how our information security is protected by laws and institutions. With both international standards and national studies, our data is protected at the highest possible level. However, there has never been a method that can prevent cyber attacks and personal information theft with 100% success. In such cases, of course, we can protect our rights by taking legal action; but we are unlikely to recover our copied, and unauthorized, maliciously exploited data. There are some precautions we can take to protect ourselves from attacks and theft. Basically, I will make a series of suggestions in order to protect our data security in the internet environment; However, it should be noted that these measures will not provide you with full protection, and the weaknesses and precautions to be taken of each device and virtual environment may be different.
- We should take care to use the common networks, which are frequently encountered especially in public transportation and cafes, at the minimum level as possible, or even not at all if possible.
- We should check the 'https' statement in the address line of the web pages accessed during internet use.
- If we are working in a workplace, that is, in a public network, we should pay attention to the use of secure access channels (VPN).
- We should always keep our modems that we use at home / at work in the most up-to-date version.
- Against sniffing attacks, if possible, we should use third-party firmware recommended by the modem manufacturer and always keep it at the latest version.
- Modem interface login information should not be used in factory settings, we should definitely change it.
- We should use our devices such as phones, computers, tablets in their most up-to-date versions.
- We should not use simple passwords no matter what happens in our accounts. We should be careful to change our passwords between 3-6 months, even if it is not often.
- We should not use the same password on every platform.
- We should back up our data regularly and manage our backups with separate passwords.
- We should not immediately click on every link that comes our way, we should first read and think carefully. We must always be on guard against phishing traps. We should be wary of panic-inducing and seemingly reliable sources, and consult experts in the surrounding area if necessary.