Have you ever been a victim of a cyber attack? According to Ponemon Institute, in 2014 approximately 110 million Americans had their personal information exposed by hackers, which is 47 percent of the U.S. adults (Pagliery). This vast number proves that cyber terrorism cyberterrorism is one of the most severe problems of our time. Today, I would like to take this opportunity to inform you about what cybersecurity is, what the dangers of being cyber attacked are, and how to avoid possible adverse outcomes.
Firstly, to understand what we are talking about, it is essential to define the term. Schatz, Bashroush, and Wall define it as “The approach and actions associated with security risk management processes followed by organizations and states to protect confidentiality, integrity, and availability of data and assets used in cyber space” (66). Intercepting e-mails, blocking computers or websites, hacking databases, stealing money from bills, malware, intercepting passwords are all cybersecurity competencies.
Use your promo and get a custom paper on
"How to Practice Cyber Security".
It is crucial for us to practice cybersecurity. Otherwise, the consequences can be very unpleasant and even dangerous. Malefactors can get access to our personal or working correspondence. In addition, hackers can get hold of photos or files that are not intended for a wide audience, and use blackmail to get a ransom. To make matters worse, they can hack your bank account and steal the money you keep there.
How to protect against data breaches? No postal service can provide 100% security of your correspondence. The easiest way to protect yourself is to use more complex passwords for your accounts. Surprisingly, in our age of cyber threats, the most popular passwords are still numbers from 1 to 8 or the birthdays of relatives. Should be responsible for choosing a password. Also, you should not use the same password on different sites. An additional security measure is two-step authentication. In any mail service, you can configure this feature. After setting it up, when you log in to your account, you will be asked not only for the password, but also the code that will come to your number by SMS.
When sending valuable messages, you should not use free Wi-Fi networks. In open systems, traffic is not encrypted, and it is relatively easy to intercept. It is better to send personal documents, such as identity scans, in a password-protected archive. For transmitting confidential data related to your work and business, it is better not to use a free mailbox. To do this, some corporate addresses and applications encrypt messages. If you do not have one, you can use anonymous mail, an address that you do not utilize to register on websites and social networks. Besides, pay attention to incoming messages. It is better to send suspicious letters to spam immediately.
Bank cards have become a universal way to pay for services on the Internet. We connect them to online stores, coupons, ticket services or taxi services. At the same time, the risk of using card data to steal funds from accounts increases. The easiest way of such theft is fake websites of famous online stores and online services. Their address and appearance can practically not differ from the real ones. If you receive a letter about amazing discounts on iPhone 7 on the site of a famous store, do not rush to make a purchase. It is possible that this is just a skillful copy created by fraudsters to find out your card details. It is better to go to this site via another link and check whether there is a similar offer. In general, you should carefully check on which site you are making a purchase. If it was a one-time, you can delete your data from the resource. Brian Acton recommends another way to protect your funds – use a virtual card for online purchases. Any bank provides a similar service. Such virtual cards have temporary numbers, which protects your physical card from thieves (Acton).
To sum up, cybersecurity is an incredibly complex set of methods for protecting information and computer systems from unauthorized use, destruction, and hacking. It is easy for intruders to gain access to our private data these days. Thus, we should practice cybersecurity in order not to fall victim to hackers.
Speech Outline
Topic: Cyber security.
General Purpose: To inform the audience about cyber security.
Thesis Statement: Today, I would like to take this opportunity to inform you about what cybersecurity is, what the dangers of being cyber attacked are, and how to avoid possible adverse outcomes.
Introduction
I. Attention grabber (Have you ever been a victim of a cyber attack?)
II. 110 million Americans victims of hackers in 2014 (Ponemon Institute)
III. This proves it is a severe problem
IV. Thesis statement.
Defining the term
I. Essential to define the term
II. Schatz, Bashroush and Wall definition
III. Examples of cybersecurity competencies
Why practice cyber security
I. Crucial to practice CC or dangerous consequences
II. Personal & working correspondence can be stolen
III. Personal photos or files
IV. Bank accounts
How to protect emails
I. No postal service gives 100% security
II. Use complex passwords
III. Not consecutive numbers or dates
IV. Different passwords for different sites
V. Two-step authentication.
Sending messages
I. Do not use free Wi-Fi networks
II. Send personal files in protected archives
III. Use corporate mailboxes for business
IV. Use anonymous mails
V. Send suspicious letters to spam
Protecting bank cards
I. Bank cards uses
II. Care links to fake websites with similar addresses
III. Check real websites
IV. Use a virtual card (Brian Acton)
V. Temporary number
Conclusion
I. What cybersecurity is
II. Easy to hack these days
III. Thus, we should practice CS.
- Acton, Brian. “A Virtual Credit Card May Help Protect Your Information Online.” Business Insider, 22 September 2017, businessinsider.com/a-virtual-credit-card-may-help-protect-your-information-online-2017-9. Accessed 21 October 2018.
- Pagliery, Jose. “Half of American Adults Hacked This Year.” CNN, 28 May 2014, money.cnn.com/2014/05/28/technology/security/hack-data-breach/. Accessed 21 October 2018.
- Schatz, Daniel, Rabih Bashroush, and Julie Wall. “Towards a More Representative Definition of Cyber Security.” Journal of Digital Forensics, Security and Law, vol. 12, no. 2, 2017, pp. 53-74.