Wednesday 24th of April 2024
|
|
|
Headlines : * Bangladesh requires US$ 534b to address climate change impact by 2050: Saber   * Severe heat wave sweeping parts of country   * Bangladesh, Qatar sign 5 agreements, 5 MoUs   * Malaysian navy helicopters collide in mid-air, 10 killed   * 4 family members killed as bus ran them over in Cumilla   * PM warmly welcomes Qatar’s Amir at her office   * One killed as roof of bus ripped off after crashing into tree in Sirajganj   * No respite from scorching heat for 5 days: BMD   * BSF kills Bangladeshi youth in B`baria   * Heatwave alert extended for 3 more days  

   Op-ed
Virtual World: Cyber ​​Security
  Date : 24-04-2024

Alhaj Md. Abu Yusuf: Welcome to the 24th edition of the series titled Possibilities and Fears of virtual world. In the last few episodes we have discussed various aspects of the Internet and the virtual world. One thing to keep in mind when publishing information in the internet or virtual world is that once you select something and press the send button, it reaches others in an instant.

Not only that, it can instantly spread to the entire cyber world. Once you send something, you can quickly delete it, but it can catch the eye of others within that time. In many cases, forgotten personal information, photos and videos have been passed on to others. Anyone who has received a photo or video may think that the photo was sent to him on purpose. But the sender may never want anyone to see his personal picture or video. Such problems are usually self-created problems. But there are some problems that are created through others. Computer viruses and malware are among them.

A computer virus is a type of program that is usually associated with another piece of software and then spreads throughout the system. Viruses are most often spread from computer to computer through software or file sharing. Another major threat in this world is malware. If you install any software or browser plugin without proper verification and selection, malware can enter the computer. There are also some malware that can lock the computer. Can ask for money for unlock code after locking. There are also several other threats in the cyber world. Such as the backdoor. It is a system through which a hacker or spammer can use another`s network connection. There is also malware called `Key Logger`. Its job is to record everything that will be typed into the computer, including the user ID, password and any other sensitive information and then send it to the logger programmer.

A terrible malware is the `root kit`. It is not easy to catch. Root Kit helps to hide other malware. Spyware is a means of spying on Internet users. Everything that can be done on the internet can be monitored through it. A well-known malware is the Trojan horse. It is used to steal financial information of internet users. It can ruin the whole computer.

There are also worms in the cyber world. It is a kind of eater. Worm`s food is different files. When a worm enters a drive, it gently empties the drive. It destroys all files.

Currently, Internet users are being put in danger in many other ways. Many times letters come to personal email accounts with interesting offers. Fraudsters often use the names of famous organizations and known friends. They use such names. Because the person who received the email opened it with confidence and tried to read it. But these are actually phishing emails. Personal information is stolen through such emails. In this situation, first of all, awareness is important to strengthen cyber security. Many risks can be easily dealt with if you are aware of yourself.

 

In addition, the computer operating system should be kept up to date. Using antivirus can protect your computer system from virus attacks. You should keep a backup of the information you need. You can`t click just by looking at the ad. Opening an unfamiliar email is not okay. Only by opening the email can the information go to the hacker. It is often seen that extremists are attracting people to themselves through the internet in various ways. In this case also be careful.

Although cyber crime continues to rise, poor countries are not taking any effective steps to tackle it. Many countries have formed cyber police. Cyber ​​policing can also be seen in the Islamic Republic of Iran. While it is possible to identify many criminals through the cyber police, a large part of it remains out of reach. Because they work in such a way that it is not possible to identify them.

Author: Alhaj Md. Abu Yusuf is a Columnist and Chairman of Ababil Hajj Group



  
  সর্বশেষ
Bangladesh requires US$ 534b to address climate change impact by 2050: Saber
Depositors deposit in merged banks will remain completely safe: BB
PM leaves for Bangkok tomorrow morning
Qatar emir leaves Dhaka

Chief Advisor: Md. Tajul Islam,
Editor & Publisher Fatima Islam Tania and Printed from Bismillah Printing Press,
219, Fakirapul, Dhaka-1000.
Editorial Office: 167 Eden Complex, Motijheel, Dhaka-1000.
Phone: 02-224401310, Mobile: 01720090514, E-mail: muslimtimes19@gmail.com