The Information Systems Audit and Control Association (ISACA) identifies the following types of malicious cyber-related activities: Hacking, Malicious code, Loss of intellectual property, Phishing, Denial of service, and Insider damage. However, the two I’ve chose to discuss are Phishing and Hacking. Both phishing and hacking are cybercrimes used to target people/organizations to access and retrieve unauthorized information. Phishing in particular, lures someone into providing sensitive information by texting, emailing, or calling. According to KnowBe4 Inc., perpetrators pose as a legitimate institutions and extract sensitive information such as: banking details, personal payment methods, and passwords. This information is then used to access important accounts or take advantage of people/organizations. Phishing, like many of the other cyber threats, can lead to identity theft.
From personal experience, I’ve been targeted via phishing and hacking. Hackers use coding to “break” into computer systems (most often using malware) with the motive to steal, alternate, or destroy personal information. Most times, one will not know they have been victimized by a hacker until it is too late, and their computer system has already been compromised. In some cases, falling victim to phishing can lead to being hacked. The best way to prevent becoming a victim of any cybercrime is to educate oneself about cyber security and potential threats. Also, keeping all personal information to oneself and being cautious about what information is shared as well with whom. Last but not least, one should understand the importance of keeping their devices up-to-date with security software in case of an attack. One of the biggest telltale signs are continuous pop-ups and signs of malware. Whenever there are signs of one’s computer being compromised, one should take the immediate action of virus protection software.
KnowBe4 Inc. (n.d.). What is phishing? Phishing. Retrieved September 25, 2022, from https://www.phishing.org/what-is-phishing