- Computer Security Made Simple Series
- Brute Force Attacks: What are They, and How Do I Prevent Them?
Each week, I plan on addressing a different aspect of Computer Security and break it down into something that your average person (a layman, if you will) can understand. The idea is that a lot of sites tell you what it is and what you need to do about it, but they use jargon that is hard to understand (unless you’re a Cyber Security Professional). And they may only talk about one aspect of the problem–where there are multiple facets to it.
I’m starting off with Brute Force Attacks, because virtually everywhere that you go, you have to use a login of some type. These attacks are the first step for criminals to perform the other attacks that I will discuss. So hopefully it will inspire you to create harder to guess passwords, and remove unnecessary accounts from your devices–thus preventing the criminals from getting a foothold.
From there, I will move on to RansomWare, which is a hot-button topic recently. After the WannaCry attack that took out hospitals in the United Kingdom, all you hear on the radio, and a lot of ads on Facebook and other sites concern RansomWare and how their product or service will protect you. But they almost all focus on email as the vector that the criminals use–when there are multiple ways to get infected. In fact, WannaCry didn’t use email at all. It searched for computers with a specific security hole and exploited that.
After this, I will discuss things like Denial of Service (DoS and Distributed Denial of Service–DDoS) and how criminals use that to wreak havoc on your sites while stealing your information.
If there are any hot button topics that pop up in between posts, I’ll cover those and move my regular posts out. Also if you have any topics that you wish to learn about, please comment. I’ll be more than happy to dig into them for you.