How to get started in CyberSecurity

Cyber Security/Ethical Hacking Boot-camp

 

Welcome to BWithHacker's first blog

Hacking : 

We listen to a lot of news about hacking every day. There are numerous cases every day about hacking and cyber threats(like malware, phishing, data theft).

We bwithhacker team has started a new Cyber Security/Ethical Hacking Boot-camp to spread awareness about cybersecurity.

What is CyberSecurity?

Cybersecurity is the field in Computer Science and IT field. (Yeah other than developing and networking, sorry for the spoilers 👅).

So coming back to cybersecurity. In layman's term cybersecurity can be defined as follows:
Cybersecurity, as you can see, comprises 2 words: CYBER and SECURITY.
The word cyber is meant for the devices and stuff related to computers like smartphones, tablets, laptops, PCs, PlayStation and many more.
The word security is as you think is, how to keep yourself secure in the cyber world and keep your data secure from being hacked as well as from the cyber threats.

We will talk about the formal definition of the cybersecurity shortly. Yeah, one that you'll find in the old bookish language. 

CYBERSECURITY:

Cybersecurity is the combination of processes, practices, and technologies designed to protect networks, computers, programs, data and information from threats and hackers.

Yeah yeah, the formal definition may be frightening for you but don't worry, we will go hand in hand in this cybersecurity boot-camp.


So, now let's talk about the ethical hacking concept......
Normal people don't praise the word hacking. That's why we cybersecurity people named it Ethical Hacking. Ethical Hacking as a whole is not a word itself, but to make the field more and more appealing and acceptable to the society we needed this word.

Ethical Hacking: 

Ethical Hacking is the process of hacking with consent so as to provide the required security such that the bad hackers don't hack and misuse our data.

You may be confused with hackers and ethical hacking. So let me try to explain you with an example: The army and terrorists, both have the same weapons. The only difference is how they use their weapon.
I hope it cleared your doubt but it's difficult to make our family and friends understand the same thing.

Now, let's see how cybersecurity is present in our daily lives and we don't use it......

1. Presence of minimum 8 characters of password with alphabets, numeric and special characters:

For hackers password cracking is a child's play. Easy passwords are simple to crack. So never use simple words/passwords that are easy to crack. Keep your password strong as it's your first line of defense against hackers.

Never use your birth date, pet's name, nickname, your girlfriend's name💁 for your password. Trust me these are most used and very easy to crack passwords.

I have read a quote "Coffee and Passwords are best when kept stronger." If you like strong coffee go for the stronger password.

2. Presence of Two factor-authentication in all social media platforms:

Two factor-authentication is present in every social media platform(from Gmail to Snapchat) but we normal people don't bother to enable. It can come handy as it's your second line of defense against hackers. If your password gets compromised even then your account would be safe with you.

3. The power to deny permissions to the app

If you are among the 80-90% of the people, you'll be using an Android Device. Whenever you install an application from Play Store, the application requires some permissions to run and as normal users we blindly allow permission to use the app. As a user, we have the power to allow some specific permissions to run an application. Being more aware we can what permissions are suspicious, whatever permission you think is suspicious never allow that or if you enable the permission, never forget to deny the permission after use.

Example: Some of you may have seen the meme that the Calculator app needs to access your Call Logs and Contacts information. Someone, please tell me Why in the world, the simple calculator app needs your call logs to do its calculations. So beware and don't give the apps some suspicious permissions.
Below is the image showing the same example. 


So, these were some of the basic cybersecurity stuff present in our daily life and folks have no knowledge of their presence as cybersecurity.

Guys, stay tuned for furthermore. In the next blog, we will show our modules that we will be teaching in the upcoming blogs.



 




Comments

  1. Well done guys... Brilliant work done by you guys... Loved it 🌸
    Keep it up guys 💪

    ReplyDelete
  2. 👐🏻👐🏻👐🏻👐🏻

    ReplyDelete
  3. Nice....and thanks for a waring us about all these hacks..👍🏻

    ReplyDelete
  4. Really a great addition. I have read this marvelous post. Thanks for sharing information about it. I really like that. Thanks Network Security Testing

    ReplyDelete
  5. This comment has been removed by the author.

    ReplyDelete
  6. Really Nice post, I got useful learning from here, keep sharing such a wonderful information with us, really inspired by your blog.
    latest tech news

    ReplyDelete
  7. It’s really a great post with lots of blog commenting sites. It’s very important for getting traffic and really thanks for sharing all.
    Digital Era

    ReplyDelete

Post a Comment

Popular posts from this blog

How to get started in CyberSecurity

How to get started in CyberSecurity