Nowadays, many people seemed to have forgotten the importance (and the inherent dangers) of their computers browser. They forgot that the browser, per se, works like a two-way street. It is where cyber security should police the two-way cyber traffic.
A web browsers main job is to find and display web pages. From there, it makes possible the communication between your computer and the web server where a site is located.
Cyber security risks
But, your browser is also and this is the dangerous part the gateway of the cyber world into your computer. And, not all of the things from the Internet going inside your computer are good. Some are downright risky.
Todays browser is sophisticated enough, through the years of innovation, to handle the multiple applications needed to surf the Internet. Many of these try to boost up and heighten the surfing experience by enabling your browsers functionalities.
But sometimes, these functionalities are not needed and they can leave your computer vulnerable. It is therefore safe to disable them until they are needed.
In a perfect world, one should set ones browser security to the highest level possible. But these settings may restrict the functionality of other features and prevents some web pages to load properly. The best compromise solution would be to set your browser to the highest security level (to prevent attacks) but at the same time enabling some features to work when you need them.
Todays many browsers are mostly graphical browsers (Internet Explorer, Firefox, AOL, Opera, Safari for the Macintosh, and Lynx for the visually-impaired users.) These are capable of playing video and audio clips, aside from displaying texts and graphics. Most have user-friendly tabs and options in choosing your preferred security level setting.
It is important to know and be familiar with your browser and how it is different from the others. It will come in handy when you evaluate and determine the features and setting most appropriate for your use.
For instance, to explore the basic security options in Windows Internet Explorer, you click Tools on the menu bar, select Internet Options, choose the Security tab, and click the Custom level. In Firefox, you click Tools first, select Options, and then click Content Privacy and Security tabs. The others have their own path systems.
Choosing your browser
Security should be paramount in choosing your browser. But, of course, given ones particular needs in surfing and using the Internet, other considerations are just as important. Sometimes, a browser comes packaged with the operating system. It should not limit, however, your choice.
Compatibility does your browser work with the OS (operating system) of your computer?
Ease are you comfortable and familiar with the options, menus, system of your browser?
Function will it still work if other plug-ins or other devices are installed?
Appeal do you like how your browser looks and works?
Functionalities – Your browser should be able to give you the option of putting web sites into different segments, or zones, and define different security restrictions for each. The best protection should be to set the security to the highest level, or maintain it at a medium level.
If you know of some sites which can be classified as trusted, you can set your browser setting accordingly. You may require them to implement SSL or Secure Sockets Layer so you can verify if they are what they claim to be. Note, however, that it is good to avoid lowering your security levels with them. If they are attacked, you might be included.
You may restrict particular sites you are not sure of. Prevention is always the best cure for any disease, real-life or online.
Be careful about your Java and ActiveX controls. These scripts, used to achieve certain appearances or functionality, can be used in attacking your computer. This is also true about Plug-ins, those additional software that enhances the function of some programs. Make sure that the sites that installing them are trustworthy.
For safety, it is advisable to disable Cookies and enable them only if the site you trust requires them.
Cyber Security starts first in your browser. It is best that you start the safeguarding process from there, your computers door to the wide, wild world of cyber space.
Why do we need cyber security? There a number of reasons. The cyber community changes in an unbelievable pace. Unfortunately, along with these changes are equally unbelievable threats. The nature of the Internet as a tool for communication and education has been used and misused for personal gain, which resulted in cyber attacks and unprecedented rise in cyber crime rates. These rates are expected to increase more rapidly in the coming years if cyber security is not put in place. So, why exactly do we need cyber security? Let us count the reasons.
1.) Hackers are everywhere. He can be your business rival, your neighbor, or simply a person out to take over your computer. He makes use of software loopholes and hijacks your computer through backdoors, usually installed programs, or through cracking software. When he finally marches into your computer, he can gain access to possibly all your personal and confidential information such as bank accounts, credit cards, or top trade secret. He can also use your computer to attack other networks, with you apparently oblivious to all his malicious operations.
2.) Internet scams and frauds are rampant. These include phishing, a very organized cyber crime, which deceives people into giving their banking details. Cyber criminals, pretending to be representatives from legitimate financial institutions, send e-mail messages and ask unsuspecting people to verify their passwords, account numbers, and other vital information. According to a report, in 2006 alone, phishing attempts increased by 81%. These attempts could effectively be counterattacked if they werent too sophisticated to actually deaden spam filters.
3.) Cyber theft is a common cyber crime. In fact, it is the most reported. Over time, it has increasingly become so easy for cyber criminals to steal information from computers, not only from individuals but for companies, banks, and other organizations as well. Though they hardly report the case, big companies lose large amounts of money.
4.) Virus can slow down your computer. Worse, it can cause system crash. Virus reaches your system through a number of entryways. One is through unsecured and unknown websites from which you download files, programs, applications, or tools for free. As much as it can infect home computers, virus can leave damaging effects to companies, both big and small. For instance, Melissa virus hit Microsoft and other big companies in 1999, which led them to temporarily terminate their e-mail systems.
5.) Spyware, as the name hints, can spy on you. A computer program automatically installed on your computer, spyware tracks personal information you entered and sends it to its creator. In most cases, spyware is used to steal big sum of money. Unlike computer viruses, spyware leaves the computer owners totally unaware of its presence. A study revealed that 92% of users with infected systems dont know that spyware has broken into their computers.
6.) Adware can keep unwanted ads to show up. Like spyware, adware penetrates the system through shareware. On its own, it downloads ads and allows them to run and pop up. This proves to be quite annoying for computer owners. But whats even more troubling is that adware can sometimes contain spyware. This increases the risk for cyber threats.
Why do we need cyber security? Cyber criminals are smart beings. They find ways to get into our systems and create havoc in less time than we expect. And because they dont cease to innovate and produce more sophisticated threats, we should always put our guard on and reinforce whatever cyber security measures we have these days.
Every important transaction could be coursed online these days. You could shop across different Websites, do banking transactions, transfer money, pay electronically, and do just about anything. The importance of the Internet has become more concrete and more obvious. Many personal data are now stored and retrieved online. You could get access through your computer or though someones system. Thus, cybersecurity is very significant.
Cybersecurity involves protection of sensitive personal and business information through prevention, detection, and response to different online attacks. As mentioned, because most important transactions are conducted across the Internet these days, there is a need to impose effective protection and measures to counter and repel cybercrimes, especially fraud.
You have probably heard of news stories about many credit card users who complain of overcharging because hackers use their accounts online. There are also different types of destructive email viruses that are not just aimed at destroying files, but also at hacking personal security codes and information like passwords. If you have been a victim of such cyber crimes, you surely would understand the necessity for stronger cybersecurity measures.
The best defense against cyber crimes is to understand risks and basic terms. You should also know about certain measures to achieve protection against cyber piracy and crimes. Cybersecurity is not a simple concept. It could get complicated because its scope is constantly and is aggressively expanding.
So what are the identified risks of cyber crimes? Many risks are more serious and pressing than the others. Email viruses could erase your entire computer system without you knowing it. There are even viruses that are designed to break into computer systems to alter files and to further spread the reach of destruction. Some malicious software are made to steal credit card information of private individuals and make unauthorized purchases. As an active Internet user, there is definitely no guarantee that you would be fully exempted from experiencing such problems. But you could always take measures to minimize chances.
The first effective step to protect your self from cyber crimes and proliferation of computer viruses is to identify cyber criminals. Hackers, intruders, and attackers are people who seek to principally exploit weaknesses of computer systems and software for their own advantage. Their actions are always violating intended usage of computer systems. Many of them are motivated by curiosity, but still violations are punishable whatever the scale. Results of hacking and intruding activities could range from malicious to mere mischief consequences.
Malicious codes (also called malware) include codes that are used to attack any computer system. They come in various forms. Some are guised as email attachments, while others claim to do other activities. More dangerously, some malwares are contracted without the computer users knowledge. Propagation of such malicious codes is getting more and more rampant these days. Classic and popular examples of malwares or malicious codes are worms and viruses.
Vulnerability is one issue computer users should always confront. In most cases, it is caused by softwares programming errors. When such errors happen, attackers get the chance to infect your computer system. Thus, cybersecurity measures and programs should be installed and used to provide effective protection. You should always aim to protect yourself from online and computer attacks.
There are now many options that could help you address vulnerabilities.
The computer was originally created as a harmless aid to do complex processes. Over the years, however, the harmless machine, which is charged with almost limitless potential, has become the ground work for cyber crimes. These crimes, which affect individuals, organizations, and even governments, call for tight cyber security to cut short the possibilities of inflicting further harm. But what is cyber security exactly? And how does this protect the whole cyber community?
The proliferation of cyber crimes
In 2007, a report identified 500,000 computers as zombies after being hijacked by hackers. Zombie computers respond to the prompting of the hackers and allow them to freely break into the systems and gain access to important files and personal information through backdoors. This can inflict dangerfrom making unauthorized purchases through someone elses credit card to imposing threats to the national security.
There is no solid figure just how many affected computers there are now today, but reports said the numbers are higher. In fact, there was not a point of dwindling down; hacking has been projecting an upward trend. Proof to that is the unbelievably high cyber crime rate in 2008.
The current crisis in cyber insecurity puts many banks, airports, hospitals, and governments in the danger zone. It opens more opportunities to identity theft, virus dissemination, system breakdown, and other similar cyber crimes. In a much larger scale, it makes launching highly sophisticated terrorist attacks much easier.
Here comes the rescuer
To avoid such threats, computer users are advised to take cyber security measures. Cyber security is a set of techniques or guides that aim at protecting systems from any form of cyber attacks, which may creep into the system in the form of malware (virus and spyware), intruders, and hackers. Cyber security also lessens the risk of falling prey to Internet frauds, scams, and bogus transactions.
Individual users and organizations are liable to keep their computers updated, loaded with the latest security technologies, and regularly checked by a security technician. The goal here is for every computer owner to be individually responsible for his systems security. And education plays a major part. Authorities recommend every computer owner to be informed about the latest trends in cyber crimes as well as the latest security technologies to abort any threat of attacks.
There are also efforts from the government, computer companies, digital experts, and other parties to come up with a more secure, stricter, and restructured cyber environment that is regulated by enforced laws and technological systems. With the existing setup, hackers and other cyber criminals reign free in the Internet, but further security and system developments in the cyber community will allow for more fluid Internet usage and transactions with lesser risk for frauds and cyber attacks.
Globally, however, much should be done. Currently, law enforcement faces limitations in many countries for many reasons. In some instances, local concerns and issues overshadow the need for implementing efficient cyber security measures. But cyber security cant be employed by only two to three governments alone. Cyber crimes affect all nations where the Internet holds a primary place in running the government, military, economy, business, and other vital sectors. And if one nation is heavily compromised, it is not impossible for the world as a whole to become a cyber crime victim.
So, what is cyber security? It is the worlds counterattack to the damaging threats of the virtual world called the Internet. And it calls everyone to action.
In this age of technology and communication convergence, you cannot help but be involved in technologies and innovations that revolve around computers, cellular phones and the World Wide Web. But as we go around our daily lives with these technologies and what not, there are times that we begin to feel really paranoid on our own safety.
May it be our physical safety or the security of our personal hardware and software. What is cyber security all about? It is in fact protecting your personal information or any kind of digital asset stored in your computer or in any digital storage device.
The first thing that you will have to understand is the kinds of threats that you could encounter in cyber space. There are different kinds of threats and each one has their own degrees of seriousness which require their own levels of solutions. The higher level the threat, the more advance or complicated the approach to implement safety measures to protect yourself from such harm.
From simple malicious codes, otherwise called as malware and spywares to serious virus that can erase the whole contents of your computer and hackers that can access and use your personal information for their own personal gain, these are the risks that you will need to address.
Oftentimes, those malicious codes or malware pass through your security system when you access a particular website or even when you open an email. These codes, exploit the loopholes in various applications and insert themselves within the computer system which enable them to replicate and infect other computers by attaching themselves to the emails that you send out or through your local network. These malicious codes are sometimes quite tricky. They claim to do something but instead they will go on a totally different path in infecting your system. These malicious codes are not isolated to malware and spyware but also refer to virus and worms which are deadlier and cause more harm.
Even though those malicious codes are quite harmful, another dangerous intruder would be hackers or attackers. No matter how you look at it, virus and worms can only do what the original programmer has intended it to do. But hackers are people and they can get the information they want and use it for their own benefit. Sometimes hackers are just testing their skills and deliberately invade your system not because they want your info for personal gain but because they are just plain curious or are just doing some mischief.
It is these kinds of things that you need to avoid that is why you have to know about cyber security and know how to handle the various threats. You will need to know how vulnerable your computers are. You have to loon into your firewall and virus protection software to se if your current setup can prevent attacks from the outside.
This is why it is important to continuously update your software since new threats are being created everyday and having an updated system can help protect you from being attacked. Another precautionary measure would be to create passwords. The passwords will serve as a deterrent and help you keep your whole system protected.
With proper protection installed, you can keep your files and information safe. It is very important that you keep in mind cyber security. Cyber security is all about keeping your information safe from those who wish to access them. It is an important aspect of our lives and should never be disregarded most especially in todays computer age.
The United States is the leader of all nations not for nothing. The government of President Barack Obama has announced establishment of a top-level government office in the White House to handle specific cybersecurity functions and initiatives. The announcement of the new post is apparently aimed at protecting the countrys information networks and infrastructure.
The new office would be led by an appointed special advisor, to be called the Cybersecurity Coordinator. He would be part of the National Security Staff. The new office would be tasked to produce and manage national strategies for boosting, strengthening, and improving computer defenses. The proposed Cybersecurity Coordinators office would work together with the Office of Management and Budget in keeping federal bodies maintain focus in keeping up national cybersecurity posture.
The cybersecurity czar would be vested specific powers and authorities. Aside from being an adviser to the president, the cybersecurity coordinator would also gain full backing from the Office of the President. He would have an extraordinary and guaranteed access to the president especially when there are pressing issues about Internet security challenges. If cyber attacks would transpire, the coordinator would also emerge to manage appropriate and needed government response.
The creation of the new office is expected to be a pioneer in cybersecurity practices in global countries. At present, almost all developed and developing nations are recognizing the need for concrete Internet security measures. However, governments are yet to institute organizations and agencies that would be specifically tasked to handle online security measures and issues. The US is again leading the pack. It is expected that sooner, other countries would aggressively follow suit. Many regions are also acting together to identify common cyber threats and issues. In the coming few years, more measures are expected to address pressing IT security concerns.
The Obama administrations move is expected to serve as a model for other national governments in addressing security problems across the virtual world. The US move is seen as a proof of commitment to the overall online security of national networks and individuals (and businesses) computer systems. Among the immediate and actual priorities of the initiative are creation of national strategies, establishment of frameworks for unified responses to cyber incidents, promotion of national awareness about cybersecurity, development of strong relationships between public and private sectors, and bolstering of research and development regarding cybersecurity.
President Obama only acted on the pressing calls for heightened Internet security. In the US alone, millions of dollars are now being lost annually due to cyber crimes. Many individuals and businesses are being defrauded across the online media. The move to create a cybersecurity office is aligned with a vision to treat digital infrastructure as an important national asset. Thus, protection of IT infrastructure across the US would be a top national security priority, no less. The Cybersecurity Coordinators Office would always ensure networks are resilient, trustworthy, and highly secured.
However, there are restrictions to US cybersecurity measures. President Obama asserted that cybersecurity pursuits of the government would not include monitoring of Internet traffic and of private sectors networks. The government still aims to protect and preserve civil liberties and personal privacy that Americans very much cherish.
Commitment to neutrality, Mr. Obama ended, would leave online media as it should always be: free and very much open.
How many times have we heard about cyber security problems? Credit card information and identify stolen, viruses spreading, everybody is falling victims of cyber security crimes. The more that we depend on computers and internet, the higher possibility that we are putting ourselves at risk.
Cyber security is very much needed to be improved and reinforced, most especially since most of activities are moved by technology nowadays. Email, cellphones and instant messengers are big parts of our communications. While, technology like mp3s, mp4s, and digitized entertainment are very much in demand. Transportation would use GPS and you can even do online shopping and pay for your internet.
Cyberspace is utilized for our needs. But how safe is our information stored in computers? Cyber securitys function is to prevent, detect and fight off any attacks to our systems that could put our personal and working information in jeopardy.
The risks of storing too much information in our computers are increasing over the years. These are bad news especially if your are managing your finances online, storing personal data or any work-related activities. Viruses and hacking is so common, that we should take necessary precautions to prevent it from happening to us.
According to Consumer Reports, published in 2006, there is about 1 out of 3 computer users who have fallen victims of viruses, spyware or phishing. These cyber security attacks costs consumers to spent $7.8 billion in years 2005 and 2006 for computer repairs, parts and replacements.
How do you defend yourself from these cyber security breaches? How do you protect your data? To protect your personal and work-related data, here are some easy steps that you could do.
Use and regularly update your anti-virus software. Viruses are among the major problems, they could slow down computers, send data to other units and completely make your system unusable. If you already have an anti-virus software installed in your computer, then you would have to keep in updated.
Spyware alert. Another huge problem is the spyware or the adware. These are computer software that could partially control or intercept your computer functions. This software is secretly installed on computer, especially if you are frequently downloading something from the internet. The good thing is that anti-virus softwares are also offering spyware detection.
Any computer program that is being unused can be deleted or uninstalled. Too many unnecessary programs can even make your computer vulnerable to security attacks. Since you are not using them anyway, then it is better to uninstall them.
If you are not the only person using your computer, then it would be best to separate your documents from the other users of the computer. This would prevent anybody from accessing, changing, deleting your files. Some would have two computers, one for personal and the other one for work-related data and information.
Use passwords, but avoid writing passwords in pieces of paper for easy reference. When choosing passwords, choose those that are easy to remember and personalized. If you have sensitive files, there are encryption programs that would enable to protect your data.
When deleting documents, make sure that you have completely removed it from the system. There are times when hackers can still restore the information. So make sure that it is totally removed.
These cyber security measures should be taken seriously and are actually very easy to do. These would help you protect data and information, that tool you for a long time and effort to finish.
Cyber criminals are growing phenomenally. Cyber security professionals and police, however, are in a depressing number. This is because cyber security, for the most part, is a relatively new area of information technology, recently pushed over the top by the increasing number of Internet frauds and scams, cyber thefts, system crash, and other forms of cyber attacks. The lack of focus on this area inevitably resulted in a limited number of cyber security experts. Today, there is a pressing need to create more and new cyber security jobs, which hopefully can bring leverage to the uncontrollable rise of cyber crimes.
Growth of the industry
Now that computer and the Internet have become integral parts of transactions and execution of functions in many companies and organizationsthe government includedmore cyber security personnel and experts are needed to keep systems and sensitive information off the hand of cyber criminals. This means creation of more jobs, which likewise means growth of the cyber security industry.
Such jobs are necessary in both public and private sectors. Government posts are more inclined to law enforcement, military, and state protection. Jobs in the corporate world, on the other hand, are available in possibly all industrieswhich include business and trade, banks, and food manufacturingto solve all kinds of cyber crimes. The growing dependence of most companies on information technology opens up more job opportunities.
Schools now see the need and are beginning to offer cyber security degree programs, although most schools still identify these courses under different terms like network security and information security.
There are students who take associates degrees and immediately take on a job, while others continue their way to university level. Still others take masters degree or doctorate. There are also those who stay in the academe to mentor future generations of cyber security experts.
Cyber security is not all about computer and nothing else. In fact, it also involves a lot of mathematics and laws. This is why cyber security professionals are also coming from other fields such as engineering and law enforcement. A cyber security practitioner, for instance, has to approach data encryption with a lot of mathematical principles. Other professionals, on the other hand, are tasked to uphold justice and take part in legal procedures, so it is necessary for them to be well acquainted with the cyber laws.
Cyber security jobs come in different names: cyber security technical analyst, cyber security research scientist, cyber security policy analyst, among other things. In the coming years, more titles are expected to be defined and structured as the industry starts to expand. But a recent development in the cyber security industry proved that it has been having a strong foothold in the community. A few years back, the post Chief Security Officer was given a new job description. Aside from maintaining the physical properties of a company, he is also responsible for securing its electronic information and data.
The task to secure computer dependent-infrastructures and systems is a complex process, which is why rigorous training and extensive experience are necessary. Cyber security jobs combine the work of a cop, investigator, and computer scientist.
Exciting it may sound, and maybe it really is, but dedication and the will to preserve the integrity of cyber transactions should come as top motivation.
Most people in the civilized world these days use computers. The devices are not just accessories and equipment aiding academic studies. Computers are made to connect online, which in turn could facilitate actual and basic transactions. You could shop, bank, pay bills, transfer funds, reserve tickets, conduct businesses, and do just about anything you need to do online. Cybersecurity would help make you secured and safe all the time.
Because there is money across the Internet, defrauders, thieves, and burglars now focus on online crimes. Online transactions are mostly using credit card accounts, debit cards, and Internet accessible bank accounts. Thus, expect hackers and attackers to strive their best to be able to access your sensitive personal information. You might not know it but as you use your personal computer today, you might already be exposed to several Internet security problems.
How are cyber crimes committed? Usually, hackers, intruders, and attackers design and deploy computer viruses, computer programs, or software to penetrate into systems that are aimed at searching computer systems for important personal data of users without proper authorization. Viruses are rampant. They spread like wildfire and most infected computers are not identified. Thus, as you use your computer for basic online transactions, your information might also be tapped by unscrupulous cyber criminals.
Some viruses are spread through using removable hardware like discs and flash derives. Some are propagated through opening attachments in suspicious email messages. Some are most dangerous as they are automatically coming with pop up screens when you enter or open specific Websites. Downloading unsecured data online could also be a culprit. If you want to take instant cybersecurity measures, you should resolve not to get viruses from the abovementioned venues and occasions. However, you may find it difficult not to be exposed to computer virus risks.
Aside from refraining to avoid the mentioned risks, it would also do wonders if you purchase effective anti-virus programs. There are specific products that provide protection against common computer viruses. Some have protection against spread and vulnerability to malicious codes, also known as malwares. To provide you better and more options, there are many virus protection brands and products available across the market today. Their proliferation makes cybersecurity rampant and more competitive these days.
Speaking of being competitive, many anti-virus software are now made accessible to most individuals. Cost is a primary issue because not all products are affordable. The best and most effective protection is of course premium priced. If you could not afford to purchase such software, you could opt for the more affordable ones. There are even brands and products that are offered for free. All you have to do is to be patient in finding them.
You should constantly have your computer system checked. As an added protection, it would be better if you would install or activate firewall protection naturally imbedded in your system. You could also hire services of computer and IT experts to help you ensure your total online and computer protection.
Cybersecurity should never be neglected. In fact, it should be accorded with utmost importance. These days when security across the Internet is getting more serious, it is just appropriate if you would aim not to be victimized by cyber criminals and cyber threats. Cyber crimes and risks could be avoided if you know how. Explore options.
Cyber security is among the toughest issues to resolve. It has proven to be difficult since it is constantly evolving and most of our daily activities can be hit by it. How much do we rely on computers nowadays? A lot. Whether it is transportation, entertainment, communication, finance, and even daily needs. Everything seems to be computerized. What do you think would happen if these systems would crash? Catastrophe would ensue.
There are simple things that we could do to ensure the safety of our systems and computers. For your accounts and computer:
Make sure that the passwords you are using cannot be immediately guessed. Another common mistake made is that they would be jotting their passwords. Surveys said that about 1 out of 3 workers would write their passwords. Inside attack is one of cyber security attacks, this could mean that a disgruntled employee could use other peoples passwords to access the system.
There are companies, especially outsourcing companies, that strongly prohibit any kind of written password, like mentioned in the example.
Aside from the password, there are also operating systems and applications that could protect your account and computer. Firewall for starters, should be installed and used. A firewall is a program that blocks unauthorized Internet traffic, just like how a physical firewall works. Setting up and configuring a firewall, will actually help you maximize its full potential.
Anti-virus software can be your best shot to make sure that your computer is protected, you just have to make sure that it is regularly updated. Anti-virus software would come with spyware detecting programs. There are new computers, nowadays, that are offering or already have an installed anti-virus software.
If you have sensitive documents in your account and computer, it would be better if you would be encrypting the data. When deleting sensitive documents, then you make sure that it has been totally removed from the system. Hackers are capable of restoring or retrieving any deleted documents especially if it is not totally removed from the documents.
Electronic mails are also vulnerable to cyber security attacks. Different styles and types of e-mail scams are being developed everyday, so everybody has to be prepared and alert whenever we receive emails. Here are some signs that these e-mails are possible sources of cyber security attacks.
The email is not addressed to you personally and aside from that the sender of the email is somebody you are not even familiar with. Most of phishing e-mails would have an attachments along with the email. These attachments do not even have a clear title or clear purpose.
As your read the email, you will notice a lot of spelling and grammatical errors which indicates how unprofessional it is.
Emails that ask you to provide financial information like credit card number, social security number, password and asking you to send some money, is totally a scam. Banks and other institutions do not ask you these kinds of information over an email.
When you received this kind of email, do not click on any links or attachments. These links and attachments would bring you to sites that have high risks of viruses and spyware. For example, experts would say that attachments ending in “.vbs,” “.scr,” “.exe,” or “.pif” can have viruses. It is best to immediately delete the email, do not even open or respond to the email.
Another assurance that even if your computer and cyber security has been attacked is by regularly saving your data and making a back-up disk. So, if ever your computer crashes because or loses some information because of viruses, you would be prepared for it since you have a back-up.