Cyber Security and Social Media Usage

 From time to time, they are used as “cyber space”, “cyber space” and “cyber environment” (and even the virtual world in colloquial language). The cyber environment, which is basically used by adapting the English word “cyberspace”; means “the environment consisting of information systems spread all over the world and space and the networks that connect them”.


While it is generally considered appropriate to give this name to internet environments, cyber environments should be considered as a universe that includes all information systems and those who use these systems, especially with the spread of cloud computing and industry 4.0 technologies.

Technologies that produce digital data have become used in the business world, public spaces, home and pocket, in short, at every stage of human life. Both corporate and personal data are transferred to cyber environments at any time by all elements of the cyber environment.

Today, as even individuals store their personal data in cyber environments, the technologies used must be safe, reliable, sustainable and at the same time flexible. Because now many crimes you encounter in real life have become committed in cyber environments, and cyber hackers use computer networks to achieve their goals.



Many cyber attacks, such as the capture and misuse of private data by cyber hackers, damage or destruction of important works, carrying out attacks that will bring huge costs to the economy, and seize or expose national secrets, continue to increase day by day. Preventing these cyber attacks will ensure the protection of cyber media components.

The cyber environment has also been on the agenda in international platforms and was defined as a new dimension by NATO in 2016. Cyber environment, defined in addition to land, air, sea and space dimensions, has become official as an operational area.



What is Cyber Security?



It is the protection of the information systems that make up the cyber environment from attacks, the securing the confidentiality, integrity and accessibility of the information processed in this environment, the detection of attacks and cyber security incidents, the activation of response mechanisms against these detections, and then the return of the systems to their state before the cyber security incident.

Cyber environments have now become the real life itself, and people spend most of the day in digital environments. Real-life threats are now seen in digital environments. The increasing number of cyber criminals and the exposure of people from all walks of life to cyber attacks have increased the importance given to the concept of cyber security. Data security in digital environments is one of the most important elements in providing cyber security.

As a result of cyber attacks, individuals, companies and institutions / organizations suffer both material and moral losses. One of the most important reasons for this is the inability to keep up with technology, while another is the lack of technology literacy. While cybercriminals are constantly improving themselves on this issue, users do not show the necessary sensitivity to cyber security.

Similar to the fight between real-life criminals and security forces, it also takes place in cyberspace. Just as measures are taken to keep living spaces, homes and workplaces safe, measures must be taken to keep data safe in cyber environments.

Companies around the world are trying to take measures to ensure cyber security. Undoubtedly, these measures, both software and hardware, have an educational dimension. Raising the awareness of users and employees is one of the most important factors in this regard. Because currently, most of the cyber attacks are caused by people’s unconsciousness.


Global cybersecurity spending 2017–2020

Cyber Security Risks

Cyber Attacks

Through information technologies, individuals, institutions, companies, systems, etc. These are attacks that target and disrupt the functioning of them, prevent them, access information without permission and disrupt information integrity.

By placing harmful viruses in programs via e-mails, sending them to targeted systems, obtaining personal information illegally using information technologies, capturing websites in order to lose the reputation of public and private institutions and organizations and to cause psychological damage, overloading the websites of public institutions and organizations, systems cannot work. the situation can be listed as.

Viruses: Computer viruses are computer codes that change themselves as one of the files or programs in the system. The critical point in understanding viruses is that they must be run by a user.

Trojans: Named after the famous Trojan horse tactic of history, this malware is actually computer programs that you have authorized to use a different feature, but that contain features that can harm the system in the background. Users can play music on the Internet, programs with broken licenses, etc. They can also unknowingly download trojans while downloading from sites. So they may have installed programs that work for hackers on their computers.

Worms: Malware, such as viruses, designed to copy itself from one computer to another. Its difference from viruses is that it spreads automatically over the network. Due to the automatic spreading, the slow operation of the computer network over time causes the internet pages to arrive late.

Rootkits: It is a very difficult to detect computer program that infects the computer, hides itself between running processes, provides full control of your computer remotely to malicious people.

Spyware : Spy programs are programs created to spy on a computer. Spyware is defined as the software that enables the collection of sensitive information belonging to users and the actions taken by the user without the user’s knowledge and to send this information to malicious people.

Phishing: In the most general sense, it can be defined as defrauding people on the internet.

Social engineering: This method can be defined as neutralizing or circumventing cyber security processes by taking advantage of people’s weaknesses.

Sniffing: It is the process of listening to the data stream while communicating using some software tools.

DoS and DDoS: These methods are attacks to try to prevent some online services from working properly. Attackers send too many requests to a website or a database to occupy the system, which can cause systems to stop working. DDoS occurs when these attacks are done from more than one computer.

SQL injection : Many databases are designed to comply with commands written in SQL, and many websites that receive information from users send this data to SQL databases. Attackers can take control of victims’ databases by exploiting SQL vulnerabilities.

Bots and botnets: Zombie computers or botnets can be considered the most dangerous of this threat group. The important point here is that the computer can be used to commit very serious crimes without the computer user knowing about it.

Social Media Data



Hiç yorum yok:

Yorum Gönder