Cyber-Security: The Weakest Link In The Security Chain Is The Human

Authors

.

Learning basics of IT-Security and Cyber-Security.


.

sid2014-anim-banner

.

Human Behavior Vulnerabilities

.

sharing-iconWE are NOT perfect, far away from that! That is something WE need to keep in mind as WE are vulnerable through it, and this in Real-World as ALSO in Virtual-World! Through this WE become, on a certain point, even on Naivety status, especially on the Internet, check my blog about it and learn more to avoid some traps:


SO, WHAT are these characteristics who make us look naïve and vulnerable!???

.

programmerman2

.

.

I will go straight to the point to show you which bad behavior is used to profit from it by the bad guys on the Internet, here we go:

.

.

  • Curiousity
    • Clicking on everything without thinking by ONLY being curious.
  • Compassion
    • Accepting to click on any stupid link, telling us that a certain person needs OUR help
  • Anxiety
    • Accepting to click on any stupid link telling that OUR computer is infected
  • Sex
    • Accepting to click on any stupid link who promises best porn websites…
  • Money Greedy
    • Accepting to click on any stupid link who promises easy money earnings…
  • Stress
    • Clicking on everything without thinking.
  • Over confidence
    • Macintosh or Linux users have this over confidence that their platform is immune to problems.

 “Over Confidence” as it is exactly that! I don’t make a war of different OS, but one must be aware today that Nobody Is Perfect, attacks and vulnerabilities are showing us that, see here please:

Concerning the Mac, check the Report from, SYMANTEC here:

  • Ignorance
    • NOT enough knowledge about how to protect ALL devices!
    • NOT enough knowledge about where to download Apps and Browser extensions as well as software!
  • Stupidity
    • NOTHING bad will happen to me!

 .

INFOGRAPHIC: The Human Factor

Image credit: TrendMicro

.


WHAT Say The Professionals!?

.

[Start Text from SYMANTEC]

Definitions

Chat iconMost articles I have read on the topic of social engineering begin with some sort of definition like “the art and science of getting people to comply to your wishes”, “an outside hacker’s use of psychological tricks on legitimate users of a computer system, in order to obtain information he needs to gain access to the system”, or “getting needed information (for example, a password) from a person rather than breaking into a system”. In reality, social engineering can be any and all of these things, depending upon where you sit. The one thing that everyone seems to agree upon is that social engineering is generally a hacker’s clever manipulation of the natural human tendency to trust. The hacker’s goal is to obtain information that will allow him/her to gain unauthorized access to a valued system and the information that resides on that system.

Security is all about trust. Trust in protection and authenticity. Generally agreed upon as the weakest link in the security chain, the natural human willingness to accept someone at his or her word leaves many of us vulnerable to attack. Many experienced security experts emphasize this fact. No matter how many articles are published about network holes, patches, and firewalls, we can only reduce the threat so much… and then it’s up to Maggie in accounting or her friend, Will, dialing in from a remote site, to keep the corporate network secured.

[End Text from SYMANTEC]

Read more by following the link below:


NEW Terms To Learn – Social Engineering, Phishing, Spear-Phishing and…

1ibdy1vf6wghd-n05dgl-aigainformation1When WE talk about Cyber-Security, especially about the weakest link (ourselves, the human) then WE need ALSO to learn about the practice which the bad boys use to trick us. There are a lot and ALL of them have special names, of course, so here WE go to learn more about it:

.

.

Phisher pupils hack class computers

.

Chat icon

.

.

A group of children in Alaska took over their classroom computers after phishing account details from teachers. They asked teachers at Schoenbar Middle School, for 12 to 13-year-olds, to enter admin names and passwords to accept a false software update, according to reports.

Check for whole story /May03, 2013):

.

.


Useful links

book-question-mark

.


Practical Examples Used By The Bad Guys

.

Coming soon…

.

Meanwhile check…

.

Real Time Web Monitor

Check here to go to the website ===> AKAMAI Real Time Web Monitor <===

.

Should I give you more explications? I don’t think so, just go to the website by clicking the above link and try it out! Make some ===> PracTICE  <=== ;)


.

Gust MEESL’auteur Gust MEES est Formateur andragogique / pédagogique TIC, membre du “Comité Conseil” de “Luxembourg Safer Internet” (LuSI), appelé maintenant BEESECURE, partenaire officiel (consultant) du Ministère de l’éducation au Luxembourg du projet  ”MySecureIT“, partenaire officiel du Ministère du Commerce au Luxembourg du projet ”CASES” (Cyberworld Awareness and Security Enhancement Structure).

The author Gust MEES is ICT Course Instructor, ”Member of the Advisory Board” from “Luxembourg Safer Internet” (LuSI), BEESECURE, Official Partner (Consultant) from the Ministry of Education in Luxembourg, project “MySecureIT“, Official Partner from the Ministry of Commerce in Luxembourg, project “CASES” (Cyberworld Awareness and Security Enhancement Structure).

.


.

Stay tuned for next free courses and tutorials ;)

.

13 Comments

Comments RSS
  1. Being unpopular | Talaria linked to this post.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Follow

Get every new post delivered to your Inbox.

Join 85 other followers

%d bloggers like this: