400
“XARİCİ DİLLƏR” BÖLMƏSİ
CYBERSECURITY
Student:
Supervisor:
Aliyev Emil Namiq Aliyeva Gulshan
I year, group 622.18E
We can’t imagine our everyday life without internet and
applications like What’s App, Facebook, Twitter, Instagram
and etc. It has become the part of our normal life. But how
often do we think about our privacy and security of information
that we keep on our devices? Not everyone who uses network
is going to play by the rules. Just as how we have physical
security like police officers to minimize crime in the real
world, we need cybersecurity to minimize crime in virtual
world. Some of us don’t even know how dangerous it is to
connect to public Wi-Fi network, because others can get easy
access to the data on your device. There are many methods for
protecting computer systems, networks and data and two main
security questions: who are you, and what should you have
access to? It is clear that the access should be given to the right
person and refused to the wrong one. So to make difference
between
them
cybersecurity
has
a
process
called
authentication. With the help of this process computer
understands with who it interacts with. There are also three
main types of authentication: something you are, something
you know and something you have. “Something you know” is
based on a secret that should be known only to the computer
and the real user. For example a password that we use to get
money from ATM is “Something you know” and the credit
card is “Something you have”. Some passwords are easy to
figure out like “1234”, but computers take the guessing system
to the next level and the is no complex algorithm for it or
whatsoever. For humans PIN: 8765 is quite hard to guess for
401
human because there are ten thousand possibilities of
combination with 4-digit PINs. Computers start operation by
guessing with “0000” up to “9999” in matters of second. Even
8-digit PINs are easy to hack. This is why so many websites
require us to mix the upper and lowercase letters with numbers
and special symbols. There are hundred million combinations
in 8-digit password where we use only numbers, but with mix
of letters and other symbols there would be six hundred trillion
combinations. So if you want to have a good password which
you can easily memorize use three words joined together.
English has about hundred thousand words in use, so putting
three words together gives us about one quadrillion possible
passwords now imagine how many combinations will be there
if we use non-dictionary words. “Something you are”
authentication is based on us. We authenticate by presenting
ourselves to the computer. Finger print readers on our phones
are great example of it. But there are some chances that this
system won’t recognize you or even worse they will recognize
the wrong person. All forms of authentication has their pros
and cons. So security experts recommend to use two or more
authentication for important information. And at the end when
system know who you are it needs to know about the data that
you can get access to. We still have no way to guarantee the
security of a program or computing system. And the passwords
we discussed are in our regular “citizen” level. Imagine what
happens if we discuss the problems of cybersecurity to a global
level. Cyberwarfare takes the battle for information to the next
level and this is why cybersecurity problems are so important
and why we need more people who can improve the security
methods so we can use computers without any concerns of
hacking.
Do'stlaringiz bilan baham: