{"id":185,"date":"2023-08-16T09:50:29","date_gmt":"2023-08-16T02:50:29","guid":{"rendered":"https:\/\/reporternews.news\/?p=185"},"modified":"2023-08-16T10:26:42","modified_gmt":"2023-08-16T03:26:42","slug":"%e1%9e%8f%e1%9e%be%e1%9e%a2%e1%9f%92%e1%9e%9c%e1%9e%b8%e1%9e%91%e1%9f%85%e1%9e%87%e1%9e%b6cybersecurity-%e1%9e%a0%e1%9e%be%e1%9e%99%e1%9e%99%e1%9e%be%e1%9e%84%e1%9e%82%e1%9e%bd%e1%9e%9a%e1%9e%9f","status":"publish","type":"post","link":"https:\/\/reporternews.news\/?p=185","title":{"rendered":"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6?"},"content":{"rendered":"\n<p>\ud83d\udce2 \u1798\u17bb\u1793\u1788\u17b6\u1793\u1791\u17c5\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1790\u17b6 <strong>\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f Cybersecurity?<\/strong>\u179f\u17bc\u1798\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1796\u17b6\u1780\u17d2\u1799\u1782\u1793\u17d2\u179b\u17b9\u17c7\u1798\u17bd\u1799\u1785\u17c6\u1793\u17bd\u1793\u1787\u17b6\u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u179f\u1798\u17d2\u179a\u17b6\u1794\u17cb\u17a2\u17d2\u1793\u1780\u1798\u17b7\u1793\u1798\u17c2\u1793\u17a2\u17d2\u1793\u1780\u179f\u17b7\u1780\u17d2\u179f\u17b6\u17ac\u17a2\u17d2\u1793\u1780\u1780\u17b6\u1793\u17cb\u1780\u17b6\u179a\u1784\u17b6\u179a\u1787\u17c6\u1793\u17b6\u1789 IT \u178a\u17bc\u1785\u178f\u1791\u17c5\u17d6<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat: <\/strong>\u1796\u17d2\u179a\u17b9\u178f\u17d2\u178f\u17b7\u1780\u17b6\u179a\u178e\u17cd \u17ac\u179f\u1780\u1798\u17d2\u1798\u1797\u17b6\u1796\u178a\u17c2\u179b\u1798\u17b6\u1793\u179f\u1798\u178f\u17d2\u1790\u1797\u17b6\u1796\u1785\u17bc\u179b\u1791\u17c5\u179f\u1798\u17d2\u179a\u1794\u179f\u1798\u17d2\u179a\u17bd\u179b\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792 \u17ac\u1794\u17c6\u1796\u17b6\u1793\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u17a7\u1794\u1780\u179a\u178e\u17cd\u179a\u1794\u179f\u17cb\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u17d4<\/li>\n\n\n\n<li><strong>Exploit: <\/strong>\u1798\u1792\u17d2\u1799\u17c4\u1794\u17b6\u1799\u178a\u17be\u1798\u17d2\u1794\u17b8\u1794\u17c6\u1796\u17b6\u1793\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u179a\u1794\u179f\u17cb\u1798\u17c9\u17b6\u179f\u17ca\u17b8\u1793\u178f\u17b6\u1798\u179a\u1799\u17c8\u1785\u1793\u17d2\u179b\u17c4\u17c7\u1794\u17d2\u179a\u17a0\u17c4\u1784 \u17ac\u1797\u17b6\u1796\u1784\u17b6\u1799\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7\u179a\u1794\u179f\u17cb\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u17a2\u17d2\u1793\u1780 \u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u17d4<\/li>\n\n\n\n<li><strong>Vulnerability: <\/strong>\u1787\u17b6\u1791\u17bc\u1791\u17c5\u179c\u17b6\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u1780\u17c6\u178e\u178f\u17cb\u1790\u17b6\u1787\u17b6\u17a2\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u1793\u17c3\u1785\u1793\u17d2\u179b\u17c4\u17c7\u1794\u17d2\u179a\u17a0\u17c4\u1784 \u17ac\u1797\u17b6\u1796\u1791\u1793\u17cb\u1781\u17d2\u179f\u17c4\u1799\u1780\u17d2\u1793\u17bb\u1784\u1780\u17b6\u179a\u179a\u1785\u1793\u17b6\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792 \u17ac\u1780\u17b6\u179a\u17a2\u1793\u17bb\u179c\u178f\u17d2\u178f\u179a\u1794\u179f\u17cb\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u178a\u17c2\u179b\u17a2\u17b6\u1785\u1793\u17b6\u17c6\u1791\u17c5\u179a\u1780\u1796\u17d2\u179a\u17b9\u178f\u17d2\u178f\u17b7\u1780\u17b6\u179a\u178e\u17cd\u178a\u17c2\u179b\u1798\u17b7\u1793\u1793\u17b9\u1780\u179f\u17d2\u1798\u17b6\u1793\u178a\u179b\u17cb\u178a\u17c2\u179b\u1793\u17b9\u1784\u1792\u17d2\u179c\u17be\u17b1\u17d2\u1799\u1798\u17c9\u17b6\u179f\u17ca\u17b8\u1793\u1781\u17bc\u1785 \u17ab\u1794\u17b6\u178f\u17cb\u1794\u1784\u17cb\u1791\u17b7\u1793\u17d2\u1793\u1793\u17d0\u1799\u17d4<\/li>\n\n\n\n<li><strong>Attacker: <\/strong>\u1794\u17bb\u1782\u17d2\u1782\u179b\u178e\u17b6\u178a\u17c2\u179b\u1794\u17c6\u1796\u17b6\u1793\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u179a\u1794\u179f\u17cb\u1798\u17c9\u17b6\u179f\u17ca\u17b8\u1793\u178a\u17c4\u1799\u1781\u17bb\u179f\u1785\u17d2\u1794\u17b6\u1794\u17cb \u178a\u17be\u1798\u17d2\u1794\u17b8\u179b\u17bd\u1785 \u179a\u17c0\u1794\u1785\u17c6 \u17ac\u1794\u17c6\u1795\u17d2\u179b\u17b7\u1785\u1794\u17c6\u1795\u17d2\u179b\u17b6\u1789\u1791\u17b7\u1793\u17d2\u1793\u1793\u17d0\u1799\u179a\u1794\u179f\u17cb\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u17d4<\/li>\n\n\n\n<li><strong>Attack: <\/strong>\u179f\u1780\u1798\u17d2\u1798\u1797\u17b6\u1796\u178a\u17c2\u179b\u1792\u17d2\u179c\u17be\u17a1\u17be\u1784\u178a\u17c4\u1799\u17a2\u17d2\u1793\u1780\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a \u178a\u17c2\u179b\u17a2\u17b6\u1785\u1794\u1784\u17d2\u1780\u1782\u17d2\u179a\u17c4\u17c7\u1790\u17d2\u1793\u17b6\u1780\u17cb\u178a\u179b\u17cb\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792 \u17ac\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u178a\u17c2\u179b\u179a\u1780\u17d2\u179f\u17b6\u1791\u17bb\u1780\u1780\u17d2\u1793\u17bb\u1784\u17a7\u1794\u1780\u179a\u178e\u17cd\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u17d4<\/li>\n\n\n\n<li><strong>Data Theft: <\/strong>\u179f\u1780\u1798\u17d2\u1798\u1797\u17b6\u1796\u179b\u17bd\u1785\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u1796\u17b8\u1798\u17c9\u17b6\u179f\u17ca\u17b8\u1793\u179a\u1794\u179f\u17cb\u1787\u1793\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7\u17d4<\/li>\n\n\n\n<li><strong>Cookie<\/strong>: \u1787\u17b6\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u1787\u17b6\u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u178a\u17c2\u179b\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u1795\u17d2\u178f\u179b\u17cb\u178a\u17c4\u1799\u1798\u17c9\u17b6\u179f\u17ca\u17b8\u1793\u1798\u17c1\u1794\u178e\u17d2\u178f\u17b6\u1789 (web server) \u1791\u17c5 \u1798\u17c9\u17b6\u179f\u17ca\u17b8\u1793\u1797\u17d2\u1789\u17c0\u179c\u1782\u17c1\u17a0\u1791\u17c6\u1796\u17d0\u179a(web client) \u17a0\u17be\u1799\u1794\u17b6\u1793\u1794\u1789\u17d2\u1787\u17bc\u1793\u178f\u17d2\u179a\u17a1\u1794\u17cb\u1798\u1780\u179c\u17b7\u1789\u178a\u17c4\u1799\u1798\u17b7\u1793\u1795\u17d2\u179b\u17b6\u179f\u17cb\u1794\u17d2\u178f\u17bc\u179a\u178a\u17c4\u1799\u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8\u179a\u17bb\u1780\u179a\u1780(browser)\u179a\u17b6\u179b\u17cb\u1796\u17c1\u179b\u178a\u17c2\u179b\u179c\u17b6\u1785\u17bc\u179b\u1794\u17d2\u179a\u17be\u1798\u17c9\u17b6\u179f\u17ca\u17b8\u1793\u1798\u17c1\u1793\u17c4\u17c7\u17d4 \u1793\u17c5\u1796\u17c1\u179b\u178a\u17c2\u179b\u1782\u17c1\u17a0\u1791\u17c6\u1796\u17d0\u179a\u1793\u17c1\u17c7\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u1791\u179f\u17d2\u179f\u1793\u17b6\u17a1\u17be\u1784\u179c\u17b7\u1789 \u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8\u179a\u17bb\u1780\u179a\u1780 (browser) \u1793\u17b9\u1784\u1794\u1789\u17d2\u1787\u17bc\u1793\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u178f\u17d2\u179a\u17a1\u1794\u17cb\u1798\u1780\u179c\u17b7\u1789 \u178a\u17be\u1798\u17d2\u1794\u17b8\u1786\u17d2\u179b\u17be\u1799\u178f\u1794\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u1798\u17d2\u178f\u1784\u17a0\u17be\u1799\u200b\u200b\u1798\u17d2\u178f\u1784\u1791\u17c0\u178f\u17d4 \u1793\u17c1\u17c7\u200b\u1782\u17ba\u200b\u1787\u17b6\u200b\u1780\u17b6\u179a\u200b\u1798\u17be\u179b\u200b\u1798\u17b7\u1793\u200b\u1783\u17be\u1789\u200b\u179f\u1798\u17d2\u179a\u17b6\u1794\u17cb\u200b\u17a2\u17d2\u1793\u1780\u200b\u1794\u17d2\u179a\u17be\u200b\u17a0\u17be\u1799\u200b\u1780\u17cf\u200b\u1798\u17b6\u1793\u200b\u1782\u17c4\u179b\u200b\u1794\u17c6\u178e\u1784\u200b\u179f\u1798\u17d2\u179a\u17b6\u1794\u17cb\u200b\u1780\u17b6\u179a\u200b\u1792\u17d2\u179c\u17be\u200b\u17b1\u17d2\u1799\u200b\u1794\u17d2\u179a\u179f\u17be\u179a\u200b\u17a1\u17be\u1784\u200b\u1793\u17bc\u179c\u200b\u1794\u1791\u200b\u1796\u17b7\u179f\u17c4\u1792\u200b\u179a\u17bb\u1780\u179a\u1780\u200b\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f \u1793\u17b7\u1784\u179b\u17bf\u1793\u200b\u17d4<\/li>\n<\/ul>\n\n\n\n<p><strong>1<\/strong>&#8211; <strong>\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f (Cybersecurity or Internet Secure\u2026)?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Computer Security, Cyber security, Digital Security <\/strong>or<strong> Information Technology Security (IT security) <\/strong>is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disruption or misdirection of the services they provide (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Computer_security\">By Wikipedia<\/a>).<\/li>\n\n\n\n<li><strong>Cybersecurity<\/strong> is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks, and technologies.&nbsp;(<a href=\"https:\/\/www.itgovernance.co.uk\/what-is-cybersecurity\">By itgovernance.co.uk<\/a>)<\/li>\n<\/ul>\n\n\n\n<p><strong>2-<\/strong>  <span lang=\"EN-GB\" style=\"font-size:12.0pt;line-height:107%;font-family:&quot;Khmer OS Siemreap&quot;;\nmso-fareast-font-family:&quot;Khmer OS Siemreap&quot;;mso-ansi-language:EN-GB\"><strong><span style=\"mso-list:Ignore\"><span style=\"font:7.0pt &quot;Times New Roman&quot;\"> <\/span><\/span><\/strong><\/span><span lang=\"KHM\" style=\"font-size:12.0pt;\nline-height:107%;font-family:&quot;Khmer OS Siemreap&quot;\"><strong>\u1794\u17d2\u179a\u1797\u17c1\u1791\u1793\u17c3\u1780\u17b6\u179a\u1782\u17c6\u179a\u17b6\u1798\u1780\u17c6\u17a0\u17c2\u1784\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f<\/strong><\/span><span lang=\"EN-GB\" style=\"font-size:12.0pt;line-height:107%;font-family:&quot;Khmer OS Siemreap&quot;;\nmso-ansi-language:EN-GB\"><strong> (Cyber Threats)<\/strong><\/span><\/p>\n\n\n\n<p><strong>\u1780\u17b6\u179a\u1782\u17c6\u179a\u17b6\u1798\u1780\u17c6\u17a0\u17c2\u1784\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f\u1791\u17bc\u1791\u17c5\u178a\u17c2\u179b\u178f\u17c2\u1784\u178f\u17c2\u1787\u17bd\u1794\u1794\u17d2\u179a\u1791\u17c7\u179a\u17bd\u1798\u1798\u17b6\u1793:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Malware,<\/strong> \u1798\u17b6\u1793\u178a\u17bc\u1785\u1787\u17b6\u17d6 ransomware, botnet software, RATs (remote access Trojans), rootkits and boot kits, spyware, Trojans, viruses, and worms.<\/li>\n\n\n\n<li><strong>Backdoors, <\/strong>which allow remote access.<\/li>\n\n\n\n<li><strong>Form jacking, <\/strong>which inserts malicious code into online forms.<\/li>\n\n\n\n<li><strong>Crypto jacking,<\/strong> which installs illicit cryptocurrency mining software.<\/li>\n\n\n\n<li><strong>DDoS (distributed denial-of-service) attacks, <\/strong>which flood servers, systems, and networks with traffic to knock them offline.<\/li>\n\n\n\n<li><strong>DNS (domain name system) poisoning attacks, <\/strong>which compromise the DNS to redirect traffic to malicious sites.<\/li>\n<\/ul>\n\n\n\n<p><strong>Security Issues with Instant Messaging<\/strong>:<\/p>\n\n\n\n<p>Instant messages can be a quick, easy way for two people \u2013 or small groups of people \u2013 to chat and share information. &nbsp;Examples include Whatsapp, Skype, Facebook Messenger, Google Hangouts, WeChat, Telegram, Slack \u2013 etc.<\/p>\n\n\n\n<p><strong>There are 2 mains Security Issues with IM that everyone should know:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Social Engineering<\/li>\n\n\n\n<li>Spamming.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image.png\" alt=\"\" class=\"wp-image-186\" style=\"width:261px;height:165px\" width=\"261\" height=\"165\" srcset=\"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image.png 385w, https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-300x189.png 300w, https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-18x12.png 18w\" sizes=\"auto, (max-width: 261px) 100vw, 261px\" \/><\/figure>\n\n\n\n<p><strong>3- \u1780\u17b6\u179a<strong>\u1794\u17b6\u178f\u17cb\u1794\u1784\u17cb\u178a\u17c2\u179b\u1794\u178e\u17d2\u178f\u17b6\u179b\u1798\u1780\u1796\u17b8\u1780\u17b6\u179a\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a\u1795\u17d2\u1793\u17c2\u1780\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781 (Cybersecurity Attacks)<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><em>Financial Loss: \u1780\u17b6\u179a\u1794\u17b6\u178f\u17cb\u1794\u1784\u17cb\u17a0\u17b7\u179a\u1789\u17d2\u1789\u179c\u178f\u17d2\u1790\u17bb<\/em><\/li>\n\n\n\n<li><em>Resource Unavailability: \u1792\u1793\u1792\u17b6\u1793\u1798\u17b7\u1793\u17a2\u17b6\u1785\u1794\u17d2\u179a\u17be\u1794\u17b6\u1793<\/em><\/li>\n\n\n\n<li><em>Identity Theft: \u1780\u17b6\u179a\u179b\u17bd\u1785\u17a2\u178f\u17d2\u178f\u179f\u1789\u17d2\u1789\u17b6\u178e<\/em><\/li>\n\n\n\n<li><em>Data Loss: \u1780\u17b6\u179a\u1794\u17b6\u178f\u17cb\u1794\u1784\u17cb\u1791\u17b7\u1793\u17d2\u1793\u1793\u17d0\u1799<\/em><\/li>\n\n\n\n<li><em>Loss of Trust: \u1780\u17b6\u179a\u1794\u17b6\u178f\u17cb\u1794\u1784\u17cb\u1791\u17c6\u1793\u17bb\u1780\u1785\u17b7\u178f\u17d2\u178f<\/em><\/li>\n\n\n\n<li><em>Resources Misuse: \u1780\u17b6\u179a\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u1792\u1793\u1792\u17b6\u1793\u1798\u17b7\u1793\u178f\u17d2\u179a\u17b9\u1798\u178f\u17d2\u179a\u17bc\u179c.<\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u178a\u17c2\u179b\u1798\u17b6\u1793\u17a0\u17b6\u1793\u17b7\u1797\u17d0\u1799 (Information at risk)<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Name, Address, Phone Numbers, DOB<\/li>\n\n\n\n<li>SSN (Social Security Number)<\/li>\n\n\n\n<li>Driver\u2019s License<\/li>\n\n\n\n<li>Credit Card Details<\/li>\n\n\n\n<li>Bank Details<\/li>\n\n\n\n<li>Passports Details\u2026<\/li>\n<\/ul>\n\n\n\n<p><strong>\u17a0\u17b6\u1793\u17b7\u1797\u17d0\u1799\u1791\u17b6\u1780\u17cb\u1791\u1784\u1793\u17b9\u1784\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u1780\u17d2\u1793\u17bb\u1784\u179f\u17d2\u1790\u17b6\u1794\u17d0\u1793 (Risks pertaining to Domestic Users)<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Email Attacks<\/li>\n\n\n\n<li>Malware Attacks<\/li>\n\n\n\n<li>DDOS Attacks<\/li>\n\n\n\n<li>Identity Theft<\/li>\n\n\n\n<li>Packet Sniffing.<\/li>\n<\/ol>\n\n\n\n<p><strong>\u17a0\u17b6\u1793\u17b7\u1797\u17d0\u1799\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f\u1791\u17c5\u179b\u17be\u1780\u17bb\u1798\u17b6\u179a\u1780\u17d2\u179b\u17b6\u1799\u178a\u17c2\u179b\u1787\u17b6\u1787\u1793\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Misleading URL\u2019s: \u1780\u17b6\u179a\u1785\u17bc\u179b\u1791\u17c5\u1794\u17d2\u179a\u17be\u178f\u17c6\u178e\u179a\u1798\u17b7\u1793\u178f\u17d2\u179a\u17b9\u1798\u178f\u17d2\u179a\u17bc\u179c<\/li>\n\n\n\n<li>Sexual Harassment online: \u1780\u17b6\u179a\u1794\u17c0\u178f\u1794\u17c0\u1793\u1795\u17d2\u179b\u17bc\u179c\u1797\u17c1\u1791\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f<\/li>\n\n\n\n<li>Cyberbullying: \u1780\u17b6\u179a\u1782\u17c6\u179a\u17b6\u1798\u1780\u17c6\u17a0\u17c2\u1784\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f<\/li>\n\n\n\n<li>Child Pornography: \u179a\u17bc\u1794\u17a2\u17b6\u179f\u17a2\u17b6\u1797\u17b6\u179f\u179a\u1794\u179f\u17cb\u1780\u17bb\u1798\u17b6\u179a\u2026.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-1.png\" alt=\"\" class=\"wp-image-187\" style=\"width:538px;height:333px\" width=\"538\" height=\"333\" srcset=\"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-1.png 518w, https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-1-300x186.png 300w, https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-1-18x12.png 18w\" sizes=\"auto, (max-width: 538px) 100vw, 538px\" \/><\/figure>\n\n\n\n<p><strong>\u17a0\u17b6\u1793\u17b7\u1797\u17d0\u1799\u1787\u17b6\u1798\u17bd\u1799\u1794\u178e\u17d2\u178f\u17b6\u1789\u1791\u17c6\u1793\u17b6\u1780\u17cb\u1791\u17c6\u1793\u1784\u179f\u1784\u17d2\u1782\u1798<\/strong><\/p>\n\n\n\n<p>\u2022 \u17a2\u17d2\u1793\u1780\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a\u17a2\u17b6\u1785\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u178a\u17c2\u179b\u1798\u17b6\u1793\u17a2\u17c6\u1796\u17b8\u1787\u1793\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f\u179f\u1798\u17d2\u179a\u17b6\u1794\u17cb\u1780\u17b6\u179a\u1782\u17c6\u179a\u17b6\u1798\u1780\u17c6\u17a0\u17c2\u1784\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f \u1793\u17b7\u1784\u1780\u17b6\u179a\u179b\u17bd\u1785\u17a2\u178f\u17d2\u178f\u179f\u1789\u17d2\u1789\u17b6\u178e<br>\u2022 \u17a2\u17d2\u1793\u1780\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a\u17a2\u17b6\u1785\u1791\u1791\u17bd\u179b\u1794\u17b6\u1793\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u1799\u17c9\u17b6\u1784\u1784\u17b6\u1799\u179f\u17d2\u179a\u17bd\u179b \u178a\u17bc\u1785\u1787\u17b6\u179b\u17c1\u1781\u179f\u1798\u17d2\u1782\u17b6\u179b\u17cb\u17a2\u17ca\u17b8\u1798\u17c2\u179b \u179b\u17c1\u1781\u1791\u17c6\u1793\u17b6\u1780\u17cb\u1791\u17c6\u1793\u1784\u1787\u17b6\u178a\u17be\u1798\u17d4<\/p>\n\n\n\n<p><strong>\u17a2\u17d2\u179c\u17b8\u1781\u17d2\u179b\u17c7\u178a\u17c2\u179b\u1792\u17d2\u179c\u17be\u17b1\u17d2\u1799\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u179a\u1794\u179f\u17cb\u17a2\u17d2\u1793\u1780\u1784\u17b6\u1799\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7\u200b \u200b(Vulnerable)<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Low Security Awareness<\/li>\n\n\n\n<li>No implementation of Security Systems<\/li>\n\n\n\n<li>Default Settings for Applications and Software<\/li>\n\n\n\n<li>Not following the standard security guidelines<\/li>\n\n\n\n<li>Insecure Online Activity.<\/li>\n<\/ul>\n\n\n\n<p><strong>4- \u1780\u17b6\u179a\u1792\u17d2\u179c\u17be\u17b2\u17d2\u1799\u1798\u17b6\u1793\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796<\/strong><\/p>\n\n\n\n<p><strong>\u178f\u17be\u1782\u17bd\u179a\u178f\u17c2\u1798\u17b6\u1793\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u1791\u17c5\u179b\u17be\u17a2\u17d2\u179c\u17b8\u1781\u17d2\u179b\u17c7?<\/strong><\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Hardware<\/li>\n\n\n\n<li>Software<\/li>\n\n\n\n<li>Information<\/li>\n\n\n\n<li>Communication.<\/li>\n<\/ol>\n\n\n\n<p><strong>\u1792\u17d2\u179c\u17be\u17b1\u17d2\u1799\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u179a\u1794\u179f\u17cb\u17a2\u17d2\u1793\u1780\u1798\u17b6\u1793\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Data Access Controls<\/li>\n\n\n\n<li>System and Security Administration<\/li>\n\n\n\n<li>System Access Controls<\/li>\n\n\n\n<li>System Design.<\/li>\n<\/ul>\n\n\n\n<p><strong>\u17a2\u17d2\u179c\u17b8\u1781\u17d2\u179b\u17c7\u1787\u17b6\u1792\u17b6\u178f\u17bb\u1795\u17d2\u179f\u17c6\u1793\u17c3\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796 \u17ac\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f (Cybersecurity)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Confidentiality\u200b(\u1780\u17b6\u179a\u179f\u1798\u17d2\u1784\u17b6\u178f\u17cb): <\/strong>ensuring the information accessible only to those who are authorized and have access. Ex: Access control to the resources, system, information, services, programs, database\u2026..<\/li>\n\n\n\n<li><strong>Integrity\u200b(\u179f\u17bb\u1785\u179a\u17b7\u178f\u1797\u17b6\u1796): <\/strong>make sure the information is accurate and reliable.<\/li>\n\n\n\n<li><strong>Availability(\u1797\u17b6\u1796\u17a2\u17b6\u1785\u179a\u1780\/\u1794\u17d2\u179a\u17be\u1794\u17b6\u1793): <\/strong>make sure the data accessible and modifiable is available anytime for the authorized personnel.<\/li>\n\n\n\n<li><strong>Authenticity(\u1797\u17b6\u1796\u178f\u17d2\u179a\u17b9\u1798\u178f\u17d2\u179a\u17bc\u179c): <\/strong>assurance that a message, transaction, or other exchange of information is from the source it claims to be from. Authenticity involves proof of identity.<\/li>\n\n\n\n<li><strong>Non-Repudiation(\u1780\u17b6\u179a\u1798\u17b7\u1793\u1794\u178a\u17b7\u179f\u17c1\u1792\u1794\u17b6\u1793)<\/strong>: ensure that the message transmission between parties via internet safe and\/or encryption.<\/li>\n<\/ul>\n\n\n\n<p><strong>\u179c\u17b7\u1792\u17b6\u1793\u1780\u17b6\u179a\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u179f\u1798\u17d2\u179a\u17b6\u1794\u17cb\u17a7\u1794\u1780\u179a\u178e\u1780\u17b6\u179a\u1795\u17d2\u1789\u17be\u179f\u17b6\u179a\u1797\u17d2\u179b\u17b6\u1798\u17d7 (Instant Messaging)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Do not reveal\/show personal information.<\/li>\n\n\n\n<li>Do not accept links received from unknown sources<\/li>\n\n\n\n<li>Make sure to Block those users that send you unsolicited web-links<\/li>\n\n\n\n<li>Make sure you use strong a complex password.<\/li>\n\n\n\n<li>Make sure to sign out of the IM\u2019s after use<\/li>\n\n\n\n<li>Always make sure to uncheck the \u201cRemember Password\u201d option.<\/li>\n<\/ul>\n\n\n\n<p><strong>\u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f (Security layers)<\/strong><\/p>\n\n\n\n<p>\u1780\u17d2\u1793\u17bb\u1784\u1795\u17d2\u1793\u17c2\u1780\u1793\u17c1\u17c7 \u1781\u17d2\u1789\u17bb\u17c6\u179f\u17bc\u1798\u179b\u17be\u1780\u1799\u1780\u178f\u17c2 \u17e5 \u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u1793\u17c3\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796 \u17ac\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f \u178a\u17c2\u179b\u17a2\u17d2\u1793\u1780\u179a\u17b6\u179b\u17cb\u1782\u17d2\u1793\u17b6\u1782\u17bd\u179a\u178a\u17b9\u1784\u17d6<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>User Security: \u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u1793\u17c1\u17c7\u1791\u17b6\u1780\u17cb\u1791\u1784\u1793\u17b9\u1784\u17a2\u17b6\u1780\u1794\u17d2\u1794\u1780\u17b7\u179a\u17b7\u1799\u17b6\u179a\u1794\u179f\u17cb\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792 \u1793\u17b7\u1784\u179a\u1794\u17c0\u1794\u178a\u17c2\u179b\u1796\u17bd\u1780\u1782\u17c1\u1780\u17b6\u179a\u1796\u17b6\u179a\u1791\u17b7\u1793\u17d2\u1793\u1793\u17d0\u1799\u179a\u1794\u179f\u17cb\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u17d4 \u178a\u17be\u1798\u17d2\u1794\u17b8\u1794\u1784\u17d2\u1780\u17be\u1793\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796 \u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u1782\u17bd\u179a\u178f\u17c2\u178a\u17b9\u1784\u1791\u17b6\u17c6\u1784\u179f\u17d2\u179a\u17bb\u1784\u17a2\u17c6\u1796\u17b8\u1782\u17d2\u179a\u17c4\u17c7\u1790\u17d2\u1793\u17b6\u1780\u17cb\u178a\u17c2\u179b\u1780\u17b6\u179a\u1782\u17c6\u179a\u17b6\u1798\u1780\u17c6\u17a0\u17c2\u1784\u17a2\u17b6\u1785\u1794\u1784\u17d2\u1780\u17a1\u17be\u1784\u178a\u179b\u17cb\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u17d4 \u1796\u17bd\u1780\u1782\u17c1\u1782\u17bd\u179a\u178f\u17c2\u1798\u17b6\u1793\u1780\u17b6\u179a\u17a2\u1793\u17bb\u179c\u178f\u17d2\u178f\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u17a2\u17c4\u1799\u1794\u17b6\u1793\u179b\u17d2\u17a2 \u178a\u17bc\u1785\u1787\u17b6\u1780\u17b6\u179a\u1794\u17d2\u179a\u17be\u1796\u17b6\u1780\u17d2\u1799\u179f\u1798\u17d2\u1784\u17b6\u178f\u17cb\u1781\u17d2\u179b\u17b6\u17c6\u1784 \u179a\u1780\u17a2\u17c4\u1799\u1783\u17be\u1789\u1780\u17b6\u179a\u1794\u17c9\u17bb\u1793\u1794\u17c9\u1784\u1794\u1793\u17d2\u179b\u17c6 \u1793\u17b7\u1784\u178a\u17c4\u17c7\u179f\u17d2\u179a\u17b6\u1799\u1780\u17b6\u179a\u1782\u17c6\u179a\u17b6\u1798\u1780\u17c6\u17a0\u17c2\u1784 \u1794\u17d2\u179a\u179f\u17b7\u1793\u1794\u17be\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u179a\u17c6\u179b\u17c4\u1797\u1794\u17c6\u1796\u17b6\u1793\u1785\u17bc\u179b\u17d4 \u179f\u179a\u17bb\u1794\u1798\u1780 \u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u1793\u17c1\u17c7\u179a\u17bd\u1798\u1794\u1789\u17d2\u1785\u17bc\u179b\u1780\u17b6\u179a\u1782\u17d2\u179a\u1794\u17cb\u1782\u17d2\u179a\u1784\u179a\u1794\u179f\u17cb\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u17d4<\/li>\n\n\n\n<li>Endpoint System Security: \u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u1793\u17c1\u17c7\u1792\u17b6\u1793\u17b6\u1790\u17b6\u1780\u17b6\u179a\u1782\u17c6\u179a\u17b6\u1798\u1780\u17c6\u17a0\u17c2\u1784\u17a7\u1794\u1780\u179a\u178e\u17cd\u179a\u1794\u179f\u17cb\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb (endpoints devices)\u17d4 \u1798\u17b6\u1793\u178a\u17bc\u1785\u1787\u17b6\u1780\u17b6\u179a\u178a\u17c6\u17a1\u17be\u1784\u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8\u1780\u17c6\u1785\u17b6\u178f\u17cb\u1798\u17c1\u179a\u17c4\u1782\u178a\u17be\u1798\u17d2\u1794\u17b8\u1780\u17b6\u179a\u1796\u17b6\u179a\u17a7\u1794\u1780\u179a\u178e\u17cd\u1785\u179b\u17d0\u178f \u1791\u17bc\u179a\u179f\u17d0\u1796\u17d2\u1791 \u1793\u17b7\u1784\u1780\u17bb\u17c6\u1796\u17d2\u1799\u17bc\u1791\u17d0\u179a\u1787\u17b6\u178a\u17be\u1798\u17d4 \u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u1793\u17c1\u17c7\u17a2\u17b6\u1785\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u17a2\u1793\u17bb\u179c\u178f\u17d2\u178f\u1793\u17c5\u179b\u17be\u1794\u178e\u17d2\u178f\u17b6\u1789Network \u17acCloud \u17a2\u17b6\u179f\u17d2\u179a\u17d0\u1799\u179b\u17be\u178f\u1798\u17d2\u179a\u17bc\u179c\u1780\u17b6\u179a\u1793\u17c3\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u17d4 Endpoint encryption \u1782\u17ba\u1787\u17b6\u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u1793\u17c3\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u1793\u17c5\u179b\u17be\u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u1793\u17c1\u17c7 \u178a\u17c4\u1799\u1792\u17b6\u1793\u17b6\u1790\u17b6\u17a7\u1794\u1780\u179a\u178e\u17cd\u178a\u17c6\u178e\u17be\u179a\u1780\u17b6\u179a\u1794\u17d2\u179a\u1780\u1794\u178a\u17c4\u1799\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u17d4<\/li>\n\n\n\n<li>Network Security: \u1787\u17b6\u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u178a\u17c2\u179b\u1798\u17b6\u1793\u179a\u17b6\u179b\u17cb\u1798\u17bb\u1781\u1784\u17b6\u179a\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u1796\u17b6\u1780\u17cb\u1796\u17d0\u1793\u17d2\u1792\u1791\u17b6\u17c6\u1784\u17a2\u179f\u17cb\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u178a\u17b6\u1780\u17cb\u178a\u17be\u1798\u17d2\u1794\u17b8\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u178e\u17d2\u178f\u17b6\u1789Network\u1796\u17b8\u1780\u17b6\u179a\u1785\u17bc\u179b\u178a\u17c4\u1799\u1782\u17d2\u1798\u17b6\u1793\u1780\u17b6\u179a\u17a2\u1793\u17bb\u1789\u17d2\u1789\u17b6\u178f\u17d4 \u1780\u17b6\u179a\u1785\u17bc\u179b\u1794\u17d2\u179a\u17be\u178a\u17c2\u179b\u1794\u17b6\u1793\u178a\u17b6\u1780\u17cb\u1780\u1798\u17d2\u179a\u17b7\u178f\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u1795\u17d2\u178f\u179b\u17cb\u17b1\u17d2\u1799\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb \u178a\u17bc\u1785\u17d2\u1793\u17c1\u17c7\u1794\u17d2\u179a\u179f\u17b7\u1793\u1794\u17be\u1798\u17b6\u1793\u1780\u17b6\u179a\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a\u1781\u17d2\u179b\u17c7\u17d7\u1785\u17bc\u179b\u1798\u1780 \u1793\u17c4\u17c7\u179c\u17b6\u1798\u17b7\u1793\u1798\u17b6\u1793\u1782\u17d2\u179a\u17c4\u17c7\u1790\u17d2\u1793\u17b6\u1780\u17cb\u178a\u179b\u17cb\u1794\u178e\u17d2\u178f\u17b6\u1789\u1791\u17b6\u17c6\u1784\u1798\u17bc\u179b\u1791\u17c1 \u17a0\u17be\u1799\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u178a\u17b6\u1780\u17cb\u1780\u1798\u17d2\u179a\u17b7\u178f\u179f\u1798\u17d2\u179a\u17b6\u1794\u17cb\u178f\u17c2\u178a\u17c2\u1793\u1794\u178e\u17d2\u178f\u17b6\u1789 (Network Domain) \u1793\u17c4\u17c7\u1794\u17c9\u17bb\u178e\u17d2\u178e\u17c4\u17c7\u17d4<\/li>\n\n\n\n<li>Application Security: \u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u1793\u17c1\u17c7\u1782\u17d2\u179a\u1794\u17cb\u1782\u17d2\u179a\u1784\u1780\u17b6\u179a\u1785\u17bc\u179b\u1794\u17d2\u179a\u17be\u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8 \u178a\u17c2\u179b\u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8\u1793\u17c4\u17c7\u1785\u17bc\u179b\u1794\u17d2\u179a\u17be\u1794\u17b6\u1793\u178f\u17c2\u1791\u17c5\u1780\u17b6\u1793\u17cbsystem\u2019s data \u1793\u17b7\u1784\u178a\u17c2\u179b\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u178a\u17c2\u179b\u1794\u17b6\u1793\u1780\u17c6\u178e\u178f\u17cb\u179a\u1794\u179f\u17cb\u1781\u17d2\u179b\u17bd\u1793\u178f\u17c2\u1794\u17c9\u17bb\u178e\u17d2\u178e\u17c4\u17c7\u17d4 \u178a\u17be\u1798\u17d2\u1794\u17b8\u1792\u17b6\u1793\u17b6\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u1793\u17c5\u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u1793\u17c1\u17c7 \u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8\u1782\u17bd\u179a\u178f\u17c2update\/install latest version \u178a\u17be\u1798\u17d2\u1794\u17b8\u17b1\u17d2\u1799\u1798\u17b6\u1793\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u178f\u17b6\u1798\u178a\u17c2\u179b\u17a2\u17b6\u1785\u1792\u17d2\u179c\u17be\u1791\u17c5\u1794\u17b6\u1793 (new versions have minor bugs fixed if present)\u17d4<\/li>\n\n\n\n<li>Physical Security: \u1793\u17c1\u17c7\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u1794\u1784\u17d2\u1780\u17be\u178f\u17a1\u17be\u1784\u178a\u17c4\u1799\u1792\u17b6\u178f\u17bb\u1795\u17d2\u179f\u17c6\u179f\u17c6\u1781\u17b6\u1793\u17cb\u17d7\u1785\u17c6\u1793\u17bd\u1793\u1794\u17b8\u17d6 \u1780\u17b6\u179a\u178f\u17d2\u179a\u17bd\u178f\u1796\u17b7\u1793\u17b7\u178f\u17d2\u1799\u1780\u17b6\u179a\u1785\u17bc\u179b\u1794\u17d2\u179a\u17be(access control), \u1780\u17b6\u179a\u1783\u17d2\u179b\u17b6\u17c6\u1798\u17be\u179b(surveillance) \u1793\u17b7\u1784\u1780\u17b6\u179a\u1792\u17d2\u179c\u17be\u178f\u17c1\u179f\u17d2\u178f(testing)\u17d4<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"975\" height=\"392\" src=\"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-2.png\" alt=\"\" class=\"wp-image-198\" srcset=\"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-2.png 975w, https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-2-300x121.png 300w, https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-2-768x309.png 768w, https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-2-18x7.png 18w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/figure>\n\n\n\n<p><strong>4- \u17a2\u17d2\u179c\u17b8\u1787\u17b6 Identity Theft<\/strong><\/p>\n\n\n\n<p>Identity Theft (\u1780\u17b6\u179a\u179b\u17bd\u1785\u17a2\u178f\u17d2\u178f\u179f\u1789\u17d2\u1789\u17b6\u178e) \u1782\u17ba\u1787\u17b6\u17a7\u1780\u17d2\u179a\u17b7\u178a\u17d2\u178b\u1780\u1798\u17d2\u1798\u1798\u17bd\u1799\u178a\u17c2\u179b\u17a2\u17d2\u1793\u1780\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a (Attacker)\u1791\u1791\u17bd\u179b\u1794\u17b6\u1793\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u178a\u17c2\u179b\u1791\u17b6\u1780\u17cb\u1791\u1784\u1793\u17b9\u1784\u17a2\u178f\u17d2\u178f\u179f\u1789\u17d2\u1789\u17b6\u178e\u1787\u1793\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7\u178a\u17bc\u1785\u1787\u17b6 SSN, BOD, Driver&#8217;s License \u1787\u17b6\u178a\u17be\u1798 \u17a0\u17be\u1799\u179a\u17c0\u1794\u1785\u17c6\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u1791\u17b6\u17c6\u1784\u1793\u17c4\u17c7\u178a\u17be\u1798\u17d2\u1794\u17b8\u1795\u179b\u1794\u17d2\u179a\u1799\u17c4\u1787\u1793\u17cd\u1795\u17d2\u1791\u17b6\u179b\u17cb\u1781\u17d2\u179b\u17bd\u1793\u179a\u1794\u179f\u17cb\u1782\u17c1\u17d4<\/p>\n\n\n\n<p><strong>+<\/strong> <strong>\u178f\u17be\u17a2\u17d2\u1793\u1780\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a\u1793\u17b9\u1784\u1792\u17d2\u179c\u17be\u179c\u17b6\u178a\u17c4\u1799\u179a\u1794\u17c0\u1794\u178e\u17b6\u178a\u17be\u1798\u17d2\u1794\u17b8\u179b\u17bd\u1785\u17a2\u178f\u17d2\u178f\u179f\u1789\u17d2\u1789\u17b6\u178e\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing: \u1780\u17b6\u179a\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a\u1787\u17b6\u1791\u17bc\u1791\u17c5\u1796\u17b6\u1780\u17cb\u1796\u17d0\u1793\u17d2\u1792\u1793\u17b9\u1784\u1782\u17c1\u17a0\u1791\u17c6\u1796\u17d0\u179a\u1780\u17d2\u179b\u17c2\u1784\u1780\u17d2\u179b\u17b6\u1799 (fake sites) \u178a\u17c2\u179b\u1794\u1784\u17d2\u1780\u17be\u178f\u17a1\u17be\u1784\u178a\u17c4\u1799\u17a2\u17d2\u1793\u1780\u1794\u17c4\u1780\u1794\u17d2\u179a\u17b6\u179f\u17cb(fraudsters) \u178a\u17c2\u179b\u1793\u17b9\u1784\u1794\u17c4\u1780\u1794\u1789\u17d2\u1786\u17c4\u178f\u1787\u1793\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7\u1780\u17d2\u1793\u17bb\u1784\u1780\u17b6\u179a\u1795\u17d2\u178f\u179b\u17cb\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u179a\u1794\u179f\u17cb\u1796\u17bd\u1780\u1782\u17c1\u17d4<\/li>\n\n\n\n<li>Social Engineering: \u1782\u17ba\u1787\u17b6\u17a7\u1794\u1780\u179a\u178e\u17cd\u1795\u17d2\u179b\u17bc\u179c\u1785\u17b7\u178f\u17d2\u178f\u178a\u17c2\u179b\u1796\u17bd\u1780 Hacker \u1794\u17d2\u179a\u17be\u178a\u17be\u1798\u17d2\u1794\u17b8\u1791\u17b6\u1789\u1799\u1780\u1794\u17d2\u179a\u1799\u17c4\u1787\u1793\u17cd\u1796\u17b8\u1782\u17c6\u179a\u17bc\u1793\u17c3\u17a2\u17b6\u1780\u1794\u17d2\u1794\u1780\u17b7\u179a\u17b7\u1799\u17b6\u179a\u1794\u179f\u17cb\u1798\u1793\u17bb\u179f\u17d2\u179f \u178a\u17be\u1798\u17d2\u1794\u17b8\u1791\u1791\u17bd\u179b\u1794\u17b6\u1793\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u179f\u17c6\u1781\u17b6\u1793\u17cb\u17ac\u179f\u17c6\u1784\u17b6\u178f\u17cb\u179a\u1794\u179f\u17cb\u1796\u17bd\u1780\u1782\u17c1\u17d4<\/li>\n\n\n\n<li>Hacking: \u1782\u17ba\u1787\u17b6\u1780\u17b6\u179a\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u179a\u1796\u17b8\u179f\u17c6\u178e\u17b6\u1780\u17cb attackers \u178a\u17be\u1798\u17d2\u1794\u17b8\u17a2\u17b6\u1785\u1791\u1791\u17bd\u179b\u1794\u17b6\u1793\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u1795\u17d2\u1791\u17b6\u179b\u17cb\u1781\u17d2\u179b\u17bd\u1793\u1797\u17b6\u1782\u1785\u17d2\u179a\u17be\u1793\u1791\u17b6\u1780\u17cb\u1791\u1784\u1793\u17b9\u1784\u1787\u1793\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7 \u1794\u17d2\u179a\u179f\u17b7\u1793\u1794\u17be\u1796\u17bd\u1780\u1782\u17c1\u1787\u17c4\u1782\u1787\u17d0\u1799\u1780\u17d2\u1793\u17bb\u1784\u1780\u17b6\u179a\u179f\u1798\u17d2\u179a\u1794\u179f\u1798\u17d2\u179a\u17bd\u179b\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792 \u17ac\u1791\u17bc\u179a\u179f\u1796\u17d2\u1791\u179a\u1794\u179f\u17cb\u1787\u1793\u179a\u1784 \u1782\u17d2\u179a\u17c4\u17c7\u17d4<\/li>\n\n\n\n<li>Personal Data Theft: \u1798\u17b6\u1793\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u178a\u17bc\u1785\u1787\u17b6 \u1794\u17d0\u178e\u17d2\u178e\u17a5\u178e\u1791\u17b6\u1793 \u1794\u17d0\u178e\u17d2\u178e\u1794\u17be\u1780\u1794\u179a \u179c\u17b7\u1780\u17d0\u1799\u1794\u17d0\u178f\u17d2\u179a \u1798\u17bc\u179b\u1794\u17d2\u1794\u1791\u17b6\u1793\u1794\u17d0\u178f\u17d2\u179a \u17ac\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u179f\u17c6\u1781\u17b6\u1793\u17cb\u1795\u17d2\u179f\u17c1\u1784\u17d7\u1791\u17c0\u178f \u1793\u17b9\u1784\u178f\u17d2\u179a\u17bc\u179c\u1791\u1791\u17bd\u179b\u1794\u17b6\u1793\u179b\u17bd\u1785\u1796\u17b8\u1780\u17b6\u1794\u17bc\u1794(digital wallet\u2026) \u17ac Smartphone\u17d4<\/li>\n<\/ul>\n\n\n\n<p><strong>+ \u1780\u17b6\u179a\u1780\u17d2\u179b\u17c2\u1784\u1794\u1793\u17d2\u179b\u17c6(frauds)\u178a\u17c2\u179b\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u17ab\u1787\u1793\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7\u178f\u17c2\u1784\u1787\u17bd\u1794\u1794\u17d2\u179a\u1791\u17c7<\/strong><\/p>\n\n\n\n<p><strong>Social Engineering <\/strong>\u178f\u17d2\u179a\u17bc\u179c\u1794\u17b6\u1793\u1782\u17c1\u179f\u17d2\u1782\u17b6\u179b\u17cb\u1790\u17b6\u1787\u17b6\u179f\u17b7\u179b\u17d2\u1794\u17c8\u1793\u17c3\u1780\u17b6\u179a\u179a\u17c0\u1794\u1785\u17c6\u179b\u17bd\u1784\u179b\u17c4\u1798\u1798\u1793\u17bb\u179f\u17d2\u179f\u1780\u17d2\u1793\u17bb\u1784\u1780\u17b6\u179a\u1795\u17d2\u178f\u179b\u17cb\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u179f\u1798\u17d2\u1784\u17b6\u178f\u17cb\u179a\u1794\u179f\u17cb\u1796\u17bd\u1780\u1782\u17c1 \u17d4 \u1787\u17b6\u1791\u17bc\u1791\u17c5\u1787\u17b6\u17a2\u17b6\u179f\u17d2\u179a\u17d0\u1799\u179b\u17be\u179f\u1798\u17d2\u1790\u178f\u17d2\u1790\u1797\u17b6\u1796\u179a\u1794\u179f\u17cb\u17a2\u17d2\u1793\u1780\u179c\u17b6\u1799\u1794\u17d2\u179a\u17a0\u17b6\u1780\u17d2\u1793\u17bb\u1784\u1780\u17b6\u179a\u1791\u1791\u17bd\u179b\u1794\u17b6\u1793\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u1796\u17b8\u1787\u1793\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7 \u17a0\u17be\u1799\u179a\u17b6\u179b\u17cb\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u1791\u17b6\u17c6\u1784\u1793\u17c4\u17c7\u1798\u17b6\u1793\u178a\u17bc\u1785\u1787\u17b6\u1780\u17b6\u178f\u1792\u1793\u17b6\u1782\u17b6, \u179b\u17c1\u1781\u179f\u17c6\u1781\u17b6\u178f\u17cb\u1795\u17d2\u179f\u17c1\u1784\u17d7\u179a\u1794\u179f\u17cb\u1787\u1793\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7\u1787\u17b6\u178a\u17be\u1798\u17d4<\/p>\n\n\n\n<p><strong>+ \u1794\u17d2\u179a\u1797\u17c1\u1791 Social Engineering (SE)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Human Based SE<\/li>\n\n\n\n<li>Computer\/Machine Based SE.<\/li>\n<\/ul>\n\n\n\n<p><strong>+ \u1794\u17d2\u179a\u1797\u17c1\u1791 Social Engineering Attack<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Baiting: is a social engineering attack designed to lure or cheat the victim into clicking on links, opening attachments, or downloading malware. it does like giving a free gift to the clients by clicking the link\u2026<\/li>\n\n\n\n<li>Scareware: is a type of malware attack that claims to have detected a virus or other issue on a device and directs the user to download or buy malicious software to resolve the problem.<\/li>\n\n\n\n<li>Pretexting: it&#8217;s a type of social engineering attack that involves a fraudster impersonating an authority \u2014 law personnel, colleagues, banking institutions, tax persons, insurance investigators, etc. \u2014 to gain a victim&#8217;s trust and, ultimately, their valuable information.<\/li>\n\n\n\n<li>Phishing: scams by email &amp; text message campaigns aimed at creating a sense of urgency, curiosity or fear in victims. It then makes them into revealing sensitive information, clicking on links to malicious website, or opening attachments that contain malware.<\/li>\n\n\n\n<li>Spear phishing: a spear phishing scenario might involve an attacker who, in impersonating an organization\u2019s IT consultant, sends an email to one or more employees. It\u2019s worded and signed exactly as the consultant normally dose, thereby deceiving recipients into thinking it\u2019s an authentic message. So once users click on the link and key in their information on their website, all the data will send to attacker.<\/li>\n\n\n\n<li>Email hacking and contact spamming, etc.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"653\" height=\"391\" src=\"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-3.png\" alt=\"\" class=\"wp-image-199\" srcset=\"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-3.png 653w, https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-3-300x180.png 300w, https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image-3-18x12.png 18w\" sizes=\"auto, (max-width: 653px) 100vw, 653px\" \/><\/figure>\n\n\n\n<p><strong>+<\/strong> <strong>\u178f\u17be\u1799\u17be\u1784\u1794\u17d2\u179a\u1799\u17bb\u1791\u17d2\u1792\u1794\u17d2\u179a\u1786\u17b6\u17c6\u1784\u1793\u17b9\u1784\u1780\u17b6\u179a\u179b\u17bd\u1785\u17a2\u178f\u17d2\u178f\u179f\u1789\u17d2\u1789\u17b6\u178e\u178a\u17c4\u1799\u179a\u1794\u17c0\u1794\u178e\u17b6?<\/strong><\/p>\n\n\n\n<p>\u2022 \u1791\u17b6\u1780\u17cb\u1791\u1784\u1791\u17c5\u1780\u17b6\u1793\u17cb\u1792\u1793\u17b6\u1782\u17b6\u1792\u17d2\u179c\u17be\u1780\u17b6\u179a\u1794\u17b7\u1791credit and debit cards\u179a\u1794\u179f\u17cb\u17a2\u17d2\u1793\u1780<br>\u2022 \u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1791\u17c5\u1780\u17b6\u1793\u17cb\u1793\u17b6\u1799\u1780\u178a\u17d2\u178b\u17b6\u1793\u1794\u17d2\u179a\u1786\u17b6\u17c6\u1784\u1794\u1791\u179b\u17d2\u1798\u17be\u179f\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\u1793\u17b7\u1784\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u179c\u17b7\u1791\u17d2\u1799\u17b6\u179f\u1798\u17d2\u179a\u17b6\u1794\u17cb\u1780\u17b6\u179a\u1792\u17d2\u179c\u17be\u179f\u1798\u17d2\u1790\u1780\u17b7\u1785\u17d2\u1785\u179b\u17be\u1794\u1791\u179b\u17d2\u1798\u17be\u179f<br>\u2022 \u1794\u1784\u17d2\u1780\u1780\u179a\u17b6\u179b\u17cb\u1780\u17b6\u178f\u1792\u1793\u17b6\u1782\u17b6\u178a\u17c2\u179b\u1796\u17b6\u1780\u17cb\u1796\u17d0\u1793\u17d2\u1792\u1793\u17b9\u1784\u1780\u17b6\u179a\u179b\u17c1\u1785\u1792\u17d2\u179b\u17b6\u1799\u179b\u17c1\u1781\u179f\u17c6\u1784\u17b6\u178f\u17cb<br>\u2022 \u1795\u17d2\u178f\u179b\u17cb\u178a\u17c6\u178e\u17b9\u1784\u1791\u17c5\u179a\u17b6\u179b\u17cb\u1797\u17b6\u1782\u17d2\u1782\u17b8\u1796\u17b6\u1780\u17cb\u1796\u17d0\u1793\u17d2\u1792\u1787\u17b6\u1796\u17b7\u179f\u17c1\u179f\u1798\u17d2\u1785\u17b6\u179f\u17cb\u17ab\u1780\u17bc\u1793\u1794\u17c6\u178e\u17bb\u179b\u1796\u17b8Identity Theft<br>\u2022 \u1795\u17d2\u179b\u17b6\u179f\u17cb\u1794\u17d2\u178f\u17bc\u179a\u179a\u17b6\u179b\u17cb\u179b\u17c1\u1781\u1780\u17bc\u178a\u179f\u17c6\u1784\u17b6\u178f\u17cb\u179b\u17be\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u1795\u17d2\u179f\u17c1\u1784\u17d7 \u1793\u17b7\u1784\u1782\u178e\u1793\u17c1\u1799\u17d2\u1799\u17a2\u1793\u17a1\u17b6\u1789\u2026\u17d4<\/p>\n\n\n\n<p>+ <strong>\u1798\u17b6\u1793 \u17e5 \u1799\u17c9\u17b6\u1784\u200b\u178a\u17be\u1798\u17d2\u1794\u17b8\u200b\u179a\u1780\u17d2\u179f\u17b6\u200b\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u200b\u178f\u17b6\u1798\u200b\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f\u179a\u1794\u179f\u17cb\u1794\u17bb\u1782\u17d2\u1782\u179b\u178a\u17c2\u179b\u1787\u17b6\u1798\u17d2\u1785\u17b6\u179f\u17cb\u179a\u1794\u179f\u17cb\u1782\u178e\u1793\u17c1\u1799\u17d2\u1799 \u17ab\u1791\u17c6\u179a\u1784\u17cb\u1795\u17d2\u179f\u17c1\u1784\u17d7\u179a\u1794\u179f\u17cb\u1781\u17d2\u179b\u17bd\u1793\u17d6<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u1794\u17be\u1780\u1780\u17b6\u179a\u1795\u17d2\u1791\u17c0\u1784\u1795\u17d2\u1791\u17b6\u178f\u17cb\u1796\u17a0\u17bb\u1780\u178f\u17d2\u178f\u17b6 (Turn on Multifactor Authentication): \u1795\u17d2\u1791\u17c0\u1784\u1795\u17d2\u178f\u17b6\u178f\u17cb\u1796\u17cd\u178f\u1798\u17b6\u1793\u179f\u17c6\u1781\u17b6\u1793\u17cb\u1794\u1793\u17d2\u1791\u17b6\u1794\u17cb\u178f\u17b6\u1798\u179a\u1799\u17c8PIN, Authentication App, Email, SMS, \u1793\u17b7\u1784 \u1780\u17d2\u179a\u1799\u17c9\u17c5\u178a\u17c3 \u17ab\u1795\u17d2\u1791\u17c3\u1798\u17bb\u1781&#8230;..\u17d4 \u179c\u17b6\u1787\u17b6\u1795\u17d2\u1793\u17c2\u1780\u1794\u1793\u17d2\u1790\u17c2\u1798\u1798\u17bd\u1799\u1794\u1793\u17d2\u1791\u17b6\u1794\u17cb\u1796\u17b8\u1796\u17b6\u1780\u17d2\u1799\u179f\u17c6\u1784\u17b6\u178f\u17cb\u178a\u17be\u1798\u17d2\u1794\u17b8\u17a2\u17b6\u1785\u1785\u17bc\u179b\u1791\u17c5\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u1782\u178e\u1793\u17c1\u1799\u17d2\u1799 \u17ab\u1791\u17c6\u179a\u1784\u17cb\u1795\u17d2\u179f\u17c1\u1784\u17d7\u1794\u17b6\u1793\u17d4<\/li>\n\n\n\n<li>\u1792\u17d2\u179c\u17be\u1794\u1785\u17d2\u1785\u17bb\u1794\u17d2\u1794\u1793\u17d2\u1793\u1797\u17b6\u1796\u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8\u179a\u1794\u179f\u17cb\u17a2\u17d2\u1793\u1780 (Update Your Software): \u179a\u17b6\u179b\u17cb\u1780\u17b6\u179a\u1791\u17b6\u1798\u1791\u17b6\u1792\u17d2\u179c\u17be\u1794\u1785\u17d2\u1785\u17bb\u1794\u17d2\u1794\u1793\u17d2\u1793\u1797\u17b6\u1796\u179a\u17b6\u179b\u17cb\u1791\u17c6\u179a\u1784\u17cb\u1791\u17b6\u17c6\u1784\u17a2\u179f\u17cb\u1796\u17b7\u178f\u1787\u17b6\u1798\u17b6\u1793\u1780\u17b6\u179a\u179f\u17c6\u1781\u17b6\u1793\u17cb \u178a\u17be\u1798\u17d2\u1794\u17b8\u1787\u17bd\u179f\u1787\u17bb\u179b\u1795\u17d2\u1793\u17c2\u1780\u178a\u17c2\u179b\u1784\u17b6\u1799\u179a\u1784\u1782\u17d2\u179a\u17c4\u17c7\u179a\u1794\u179f\u17cb\u1794\u17d2\u179a\u1796\u17d0\u1793\u17d2\u1792\u1794\u17d2\u179a\u178f\u17b7\u1794\u178f\u17d2\u178f\u17b7\u1780\u17b6\u179a \u1793\u17b7\u1784\u1780\u1798\u17d2\u1798\u179c\u17b7\u1792\u17b8\u1795\u17d2\u179f\u17c1\u1784\u17d7\u17d4<\/li>\n\n\n\n<li>\u1792\u17d2\u179c\u17be\u1780\u17b6\u179a\u1795\u17d2\u1791\u17c0\u1784\u1795\u17d2\u1791\u17b6\u178f\u17cb\u1787\u17b6\u1794\u17d2\u179a\u1785\u17b6\u17c6\u179f\u1798\u17d2\u179a\u17b6\u1794\u17cb\u179a\u17b6\u179b\u17cb\u1780\u17b6\u179a\u1794\u17d2\u179a\u178f\u17b7\u1794\u178f\u17d2\u178f\u17b7\u1780\u17b6\u179a\u1780\u17b6\u178f\u1792\u1793\u17b6\u1782\u17b6\u1798\u17d2\u178f\u1784\u17d7<\/li>\n\n\n\n<li>\u1782\u17b7\u178f\u1798\u17bb\u1793\u1796\u17c1\u179b\u17a2\u17d2\u1793\u1780\u1785\u17bb\u1785 (Think Before You Click)\u17d6 \u179a\u17b6\u179b\u17cb\u1780\u17b6\u179a\u1785\u17bb\u1785 \u17ab\u178f\u1794\u17a2\u17d2\u179c\u17b8\u1798\u17bd\u1799\u178a\u17c2\u179b\u1796\u17b6\u1780\u17cb\u1796\u17d0\u1793\u17d2\u1792\u1793\u17b9\u1784\u1791\u17c6\u179a\u1784\u17cb\u178a\u17c2\u179b\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u200b(email, telegram or bank account verifications)\u178a\u17c4\u1799\u1798\u17b7\u1793\u179f\u17d2\u1782\u17b6\u179b\u17cb \u17ab\u179f\u1784\u17cb\u179f\u17c3\u179a\u1790\u17b6\u1798\u17b7\u1793\u1794\u17d2\u179a\u1780\u17d2\u179a\u178f\u17b8 \u1782\u17bd\u179a\u178e\u17b6\u178f\u17c2\u179f\u17bd\u179a\u178f\u17b6\u1798\u179a\u1799\u17c8\u1780\u17b6\u179a\u1781\u179b\u1791\u17c5\u1780\u17b6\u1793\u17cb\u17a2\u17d2\u1793\u1780\u178a\u17c2\u179b\u1799\u17be\u1784\u179f\u17d2\u1782\u17b6\u179b\u17cb \u17ab\u17a2\u17b6\u1785\u179f\u17bd\u179a\u1791\u17c5\u1780\u17b6\u1793\u17cb\u1780\u17d2\u179a\u17bb\u1798\u1780\u17b6\u179a\u1784\u17b6\u179a\u178a\u17c2\u179b\u1798\u17b6\u1793\u1787\u17c6\u1793\u17b6\u1789 \u1780\u17d2\u1793\u17bb\u1784\u1780\u179a\u178e\u17b8\u17a2\u17d2\u1793\u1780\u1798\u17b7\u1793\u1785\u17d2\u1794\u17b6\u179f\u17cb\u1790\u17b6\u1796\u17b7\u178f\u17ab\u1798\u17b7\u1793\u1796\u17b7\u178f\u17d4<\/li>\n\n\n\n<li>\u1794\u17d2\u179a\u17be\u1796\u17b6\u1780\u17d2\u1799\u179f\u1798\u17d2\u1784\u17b6\u178f\u17cb\u1781\u17d2\u179b\u17b6\u17c6\u1784 (Use Strong Passwords): \u179c\u17b6\u1787\u17b6\u1795\u17d2\u1793\u17c2\u1780\u1798\u17bd\u1799\u1799\u17c9\u17b6\u1784\u179f\u17c6\u1781\u17b6\u1793\u17cb\u179f\u1798\u17d2\u179a\u17b6\u1794\u17cb\u1780\u17b6\u179a\u1796\u17b6\u179a\u1782\u178e\u1793\u17c1\u1799\u17d2\u1799\u178a\u17bc\u1785\u1787\u17b6Email account, Bank account, \u1793\u17b7\u1784\u1791\u17c6\u179a\u1784\u17cb\u1795\u17d2\u179f\u17c1\u1784\u17d7\u1791\u17c0\u178f\u178a\u17c2\u179b\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u17d4 \u1796\u17b6\u1780\u17d2\u1799\u179f\u1798\u17d2\u1784\u17b6\u178f\u17cb\u178a\u17c2\u179b\u179a\u17b9\u1784\u1798\u17c9\u17b6\u17c6\u1782\u17bd\u179a\u178f\u17c2\u17d6<ul><li>\u179c\u17c2\u1784\u17c8 \u1799\u17c9\u17b6\u1784\u17a0\u17c4\u1785\u178e\u17b6\u179f\u17cb\u17e1\u17e5\u178f\u17bd\u179a (\u1798\u17b6\u1793\u1787\u17b6\u179b\u17c1\u1781 \u17a2\u1780\u17d2\u179f\u179a \u1793\u17b7\u1784\u1793\u17b7\u1798\u17b7\u178f\u17d2\u178f\u179f\u1789\u17d2\u1789\u17b6\u1795\u17d2\u179f\u17c1\u1784\u17d7 \u178a\u17bc\u1785\u1787\u17b6 \u201c@; $;&amp;;%&#8230;..\u201d)<\/li><\/ul><ul><li>Unique\u200b: \u1798\u17b7\u1793\u178a\u17c2\u179b\u1794\u17d2\u179a\u17be\u1787\u17b6\u1798\u17bd\u1799\u1793\u17b9\u1784\u1791\u17c6\u179a\u1784\u17cb\u1795\u17d2\u179f\u17c1\u1784 \u17ab\u1794\u17d2\u179a\u17be\u178a\u178a\u17c2\u179b\u17d7\u1785\u17d2\u179a\u17be\u1793\u178a\u1784 \u1793\u17b7\u1784\u1796\u17b7\u1794\u17b6\u1780\u1780\u17d2\u1793\u17bb\u1784\u1780\u17b6\u179a\u1791\u17b6\u1799\u1796\u17b8\u17a2\u17d2\u1793\u1780\u178a\u1791\u17c3\u1787\u17b6\u178a\u17be\u1798\u17d4<\/li><\/ul>\n<ul class=\"wp-block-list\">\n<li>\u1793\u17b7\u1784\u17a2\u17b6\u1785\u1787\u17b6\u1780\u17b6\u179a\u1794\u1784\u17d2\u1780\u17be\u178f\u178a\u17c4\u1799\u1785\u17c3\u178a\u1793\u17d2\u1799 (randomly generated) \u178f\u17b6\u1798\u179a\u1799\u17c8\u1791\u17c6\u179a\u1784\u17cb\u178a\u17c2\u179b\u17a2\u17d2\u1793\u1780\u1791\u17c6\u179a\u1784\u17cb\u178a\u17c2\u179b\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be (Ex: Computer or password manager\u2026) \u1796\u17d2\u179a\u17c4\u17c7\u179c\u17b6\u17a2\u17b6\u1785\u1793\u17c1\u1784\u1794\u17d2\u179a\u179f\u17be\u179a\u1787\u17b6\u1784\u1780\u17b6\u179a\u1794\u1784\u17d2\u1780\u17be\u178f\u178a\u17c4\u1799\u1798\u1793\u17bb\u179f\u17d2\u179f\u17d4<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p>( <strong>\u1794\u17d2\u179a\u1797\u1796\u178a\u17be\u1798\u17d6 \u1780\u17b6\u179a\u17b7\u1799\u17b6\u179b\u17d0\u1799\u17a2\u1794\u17cb\u179a\u17c6 \u1793\u17b7\u1784\u1794\u178e\u17d2\u178f\u17bb\u17c7\u1794\u178e\u17d2\u178f\u17b6\u179b\u200b \u1793\u17c3\u179f\u1798\u17b6\u1782\u1798\u179f\u1798\u17d2\u1796\u17d0\u1793\u17d2\u1792\u179f\u17b6\u179a\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u17af\u1780\u179a\u17b6\u1787\u17d2\u1799 (IPA)<\/strong> )<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udce2 \u1798\u17bb\u1793\u1788\u17b6\u1793\u1791\u17c5\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1790\u17b6 \u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f Cybersecurity?\u179f\u17bc\u1798\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1796\u17b6\u1780\u17d2\u1799\u1782\u1793\u17d2\u179b\u17b9\u17c7\u1798\u17bd\u1799\u1785\u17c6\u1793\u17bd\u1793\u1787\u17b6\u1798\u17bc\u179b\u178a\u17d2\u178b\u17b6\u1793\u179f\u1798\u17d2\u179a\u17b6\u1794\u17cb\u17a2\u17d2\u1793\u1780\u1798\u17b7\u1793\u1798\u17c2\u1793\u17a2\u17d2\u1793\u1780\u179f\u17b7\u1780\u17d2\u179f\u17b6\u17ac\u17a2\u17d2\u1793\u1780\u1780\u17b6\u1793\u17cb\u1780\u17b6\u179a\u1784\u17b6\u179a\u1787\u17c6\u1793\u17b6\u1789 IT \u178a\u17bc\u1785\u178f\u1791\u17c5\u17d6 1&#8211; \u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6\u179f\u1793\u17d2\u178f\u17b7\u179f\u17bb\u1781\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f (Cybersecurity or Internet Secure\u2026)? 2- \u1794\u17d2\u179a\u1797\u17c1\u1791\u1793\u17c3\u1780\u17b6\u179a\u1782\u17c6\u179a\u17b6\u1798\u1780\u17c6\u17a0\u17c2\u1784\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f (Cyber Threats) \u1780\u17b6\u179a\u1782\u17c6\u179a\u17b6\u1798\u1780\u17c6\u17a0\u17c2\u1784\u178f\u17b6\u1798\u17a2\u17ca\u17b8\u1793\u1792\u17ba\u178e\u17b7\u178f\u1791\u17bc\u1791\u17c5\u178a\u17c2\u179b\u178f\u17c2\u1784\u178f\u17c2\u1787\u17bd\u1794\u1794\u17d2\u179a\u1791\u17c7\u179a\u17bd\u1798\u1798\u17b6\u1793: Security Issues with Instant Messaging: Instant messages can be a quick, easy way &hellip; <a href=\"https:\/\/reporternews.news\/?p=185\" class=\"more-link\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":{"facebook_122107988090211131_101559774641454":""},"rop_publish_now_history":[],"rop_publish_now_status":"pending","footnotes":""},"categories":[23],"tags":[],"class_list":["post-185","post","type-post","status-publish","format-standard","hentry","category-technology","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793<\/title>\n<meta name=\"description\" content=\"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/reporternews.news\/?p=185\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\" \/>\n<meta property=\"og:description\" content=\"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\" \/>\n<meta property=\"og:url\" content=\"https:\/\/reporternews.news\/?p=185\" \/>\n<meta property=\"og:site_name\" content=\"\u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NRPNewsKH\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-16T02:50:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T03:26:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image.png\" \/>\n<meta name=\"author\" content=\"NRP-NEWS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NRP-NEWS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/reporternews.news\\\/?p=185#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/reporternews.news\\\/?p=185\"},\"author\":{\"name\":\"NRP-NEWS\",\"@id\":\"https:\\\/\\\/reporternews.news\\\/#\\\/schema\\\/person\\\/b79da7daf253de42ffe4d55e6c413d0a\"},\"headline\":\"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6?\",\"datePublished\":\"2023-08-16T02:50:29+00:00\",\"dateModified\":\"2023-08-16T03:26:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/reporternews.news\\\/?p=185\"},\"wordCount\":847,\"publisher\":{\"@id\":\"https:\\\/\\\/reporternews.news\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/reporternews.news\\\/?p=185#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/reporternews.news\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/image.png\",\"articleSection\":[\"\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/reporternews.news\\\/?p=185\",\"url\":\"https:\\\/\\\/reporternews.news\\\/?p=185\",\"name\":\"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/reporternews.news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/reporternews.news\\\/?p=185#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/reporternews.news\\\/?p=185#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/reporternews.news\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/image.png\",\"datePublished\":\"2023-08-16T02:50:29+00:00\",\"dateModified\":\"2023-08-16T03:26:42+00:00\",\"description\":\"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/reporternews.news\\\/?p=185#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/reporternews.news\\\/?p=185\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/reporternews.news\\\/?p=185#primaryimage\",\"url\":\"https:\\\/\\\/reporternews.news\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/image.png\",\"contentUrl\":\"https:\\\/\\\/reporternews.news\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/image.png\",\"width\":385,\"height\":243},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/reporternews.news\\\/?p=185#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/reporternews.news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/reporternews.news\\\/#website\",\"url\":\"https:\\\/\\\/reporternews.news\\\/\",\"name\":\"\u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\",\"description\":\"NRP NEWS\",\"publisher\":{\"@id\":\"https:\\\/\\\/reporternews.news\\\/#organization\"},\"alternateName\":\"NRP NEWS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/reporternews.news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/reporternews.news\\\/#organization\",\"name\":\"NRP NEWS\",\"alternateName\":\"\u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\",\"url\":\"https:\\\/\\\/reporternews.news\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/reporternews.news\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/reporternews.news\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cropped-cropped-cropped-LogoNRP-NEWS-e1692324877332.png\",\"contentUrl\":\"https:\\\/\\\/reporternews.news\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/cropped-cropped-cropped-LogoNRP-NEWS-e1692324877332.png\",\"width\":100,\"height\":100,\"caption\":\"NRP NEWS\"},\"image\":{\"@id\":\"https:\\\/\\\/reporternews.news\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/NRPNewsKH\\\/\",\"https:\\\/\\\/t.me\\\/reporternewsdotnews\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCR3rxipxLqK-J6dassukMmQ?sub_confirmation=1\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/reporternews.news\\\/#\\\/schema\\\/person\\\/b79da7daf253de42ffe4d55e6c413d0a\",\"name\":\"NRP-NEWS\",\"sameAs\":[\"https:\\\/\\\/reporternews.news\"],\"url\":\"https:\\\/\\\/reporternews.news\\\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793","description":"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/reporternews.news\/?p=185","og_locale":"en_US","og_type":"article","og_title":"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793","og_description":"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793","og_url":"https:\/\/reporternews.news\/?p=185","og_site_name":"\u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793","article_publisher":"https:\/\/www.facebook.com\/NRPNewsKH\/","article_published_time":"2023-08-16T02:50:29+00:00","article_modified_time":"2023-08-16T03:26:42+00:00","og_image":[{"url":"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image.png","type":"","width":"","height":""}],"author":"NRP-NEWS","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NRP-NEWS","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/reporternews.news\/?p=185#article","isPartOf":{"@id":"https:\/\/reporternews.news\/?p=185"},"author":{"name":"NRP-NEWS","@id":"https:\/\/reporternews.news\/#\/schema\/person\/b79da7daf253de42ffe4d55e6c413d0a"},"headline":"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6?","datePublished":"2023-08-16T02:50:29+00:00","dateModified":"2023-08-16T03:26:42+00:00","mainEntityOfPage":{"@id":"https:\/\/reporternews.news\/?p=185"},"wordCount":847,"publisher":{"@id":"https:\/\/reporternews.news\/#organization"},"image":{"@id":"https:\/\/reporternews.news\/?p=185#primaryimage"},"thumbnailUrl":"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image.png","articleSection":["\u1794\u1785\u17d2\u1785\u17c1\u1780\u179c\u17b7\u1791\u17d2\u1799\u17b6"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/reporternews.news\/?p=185","url":"https:\/\/reporternews.news\/?p=185","name":"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793","isPartOf":{"@id":"https:\/\/reporternews.news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/reporternews.news\/?p=185#primaryimage"},"image":{"@id":"https:\/\/reporternews.news\/?p=185#primaryimage"},"thumbnailUrl":"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image.png","datePublished":"2023-08-16T02:50:29+00:00","dateModified":"2023-08-16T03:26:42+00:00","description":"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6? \u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793","breadcrumb":{"@id":"https:\/\/reporternews.news\/?p=185#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/reporternews.news\/?p=185"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/reporternews.news\/?p=185#primaryimage","url":"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image.png","contentUrl":"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/image.png","width":385,"height":243},{"@type":"BreadcrumbList","@id":"https:\/\/reporternews.news\/?p=185#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/reporternews.news\/"},{"@type":"ListItem","position":2,"name":"\u178f\u17be\u17a2\u17d2\u179c\u17b8\u1791\u17c5\u1787\u17b6Cybersecurity? \u17a0\u17be\u1799\u1799\u17be\u1784\u1782\u17bd\u179a\u179f\u17d2\u179c\u17c2\u1784\u1799\u179b\u17cb\u1796\u17b8\u1780\u17b6\u179a\u1780\u17b6\u179a\u1796\u17b6\u179a\u1794\u17c2\u1794\u178e\u17b6?"}]},{"@type":"WebSite","@id":"https:\/\/reporternews.news\/#website","url":"https:\/\/reporternews.news\/","name":"\u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793","description":"NRP NEWS","publisher":{"@id":"https:\/\/reporternews.news\/#organization"},"alternateName":"NRP NEWS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/reporternews.news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/reporternews.news\/#organization","name":"NRP NEWS","alternateName":"\u17a2\u17d2\u1793\u1780\u179a\u17b6\u1799\u1780\u17b6\u179a\u178e\u17cd\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793","url":"https:\/\/reporternews.news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/reporternews.news\/#\/schema\/logo\/image\/","url":"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/cropped-cropped-cropped-LogoNRP-NEWS-e1692324877332.png","contentUrl":"https:\/\/reporternews.news\/wp-content\/uploads\/2023\/08\/cropped-cropped-cropped-LogoNRP-NEWS-e1692324877332.png","width":100,"height":100,"caption":"NRP NEWS"},"image":{"@id":"https:\/\/reporternews.news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NRPNewsKH\/","https:\/\/t.me\/reporternewsdotnews","https:\/\/www.youtube.com\/channel\/UCR3rxipxLqK-J6dassukMmQ?sub_confirmation=1"]},{"@type":"Person","@id":"https:\/\/reporternews.news\/#\/schema\/person\/b79da7daf253de42ffe4d55e6c413d0a","name":"NRP-NEWS","sameAs":["https:\/\/reporternews.news"],"url":"https:\/\/reporternews.news\/?author=1"}]}},"_links":{"self":[{"href":"https:\/\/reporternews.news\/index.php?rest_route=\/wp\/v2\/posts\/185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/reporternews.news\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/reporternews.news\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/reporternews.news\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/reporternews.news\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=185"}],"version-history":[{"count":5,"href":"https:\/\/reporternews.news\/index.php?rest_route=\/wp\/v2\/posts\/185\/revisions"}],"predecessor-version":[{"id":209,"href":"https:\/\/reporternews.news\/index.php?rest_route=\/wp\/v2\/posts\/185\/revisions\/209"}],"wp:attachment":[{"href":"https:\/\/reporternews.news\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/reporternews.news\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/reporternews.news\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}