0% found this document useful (0 votes)
37 views

Cyber Security

Cyber security is needed to protect computer systems, networks, and data from cyber attacks such as data theft, viruses, and malware. Common cyber attacks include viruses that can damage systems, hackers who gain unauthorized access, malware like trojan horses that can steal information, and password cracking. Cybercriminals use tools such as different types of malicious software, phishing scams, and botnets to carry out attacks. Strong cyber security practices involving updated antivirus software, firewalls, and unique, strong passwords can help prevent cyber attacks and thefts of personal information.

Uploaded by

zydjadelongno
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

Cyber Security

Cyber security is needed to protect computer systems, networks, and data from cyber attacks such as data theft, viruses, and malware. Common cyber attacks include viruses that can damage systems, hackers who gain unauthorized access, malware like trojan horses that can steal information, and password cracking. Cybercriminals use tools such as different types of malicious software, phishing scams, and botnets to carry out attacks. Strong cyber security practices involving updated antivirus software, firewalls, and unique, strong passwords can help prevent cyber attacks and thefts of personal information.

Uploaded by

zydjadelongno
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 21

CYBER SECURITY

• The term cyber security is used to refer to the security offered through
on-line services to protected your online information.
• With an increasing amount of people getting connected to Internet, the
security threats that cause massive harm are increasing also.
Meaning of the word “CYBER”

• It is a combining form relating to information Technology, the


Internet, and virtual reality.
What is Cyber Security?

• Cyber Security is the state or process of protecting and recovering


computer system, network devices and program from any type of cyber
attack.
Why we need Cyber security?

• Cyber security is necessary since it helps in securing data from threats


such as data theft or misuse ,also safeguards your system form viruses
Major security problems

q Virus

q Hacker

q Malware

q Trojan horses

q Password cracking
Viruses and worms
Ø A virus is a “program that is loaded onto your computer without
your knowledge and runs against your wishes
Solution

ØInstall a security suite that protects the computer against threats such
as viruses and worms.
Hackers
Ø In common a hacker is a person who breaks into computers, usually by gaining
access to administrative controls.
How to PREVENT hacking…
Ø It may be impossible to prevent computer hacking ,however
effective security controls including strong passwords ,and use of
firewalls can help.

T
Malware
Ø The word “malware” comes form the term “MALicious software.”
Ø Malware is any software that infects and damages a computer system
without the owner’s knowledge or permission .

-N
To Stop Malware
• Download an anti-malware program that also helps prevent
infections.
• Activate Network Threat protection ,Firewall , Antivirus.
Trojan Horses
Ø Trojan horses are email viruses that can duplicate themselves, steal
information, or harm the computer system.
Ø These viruses are the most serious threats to computers

C-
How to avoid Trojans
Ø Security suites such as Avast Internet Security , will prevent you
form downloading Trojan Horses.
Password Cracking
Ø Password attacks are attacks by hackers that can determine
passwords or find passwords to different protected electronic areas
and social network sites.
Securing password
Ø Use always strong password.
Ø Never use same password for two different sites.
Toolkit of Cybercriminals

1. Malwares or malicious software – refers to code that causes


damage to computer system. This broad-based category includes;
a. Backdoor – a type of malware that is used to get unauthorized
access to a website by the cybercriminals. The cybercriminals
spread the malware in the system through unsecured points of
entry such as outdated plug-ins or input fields.
b. Trojan horses – type of malwares that tricks the computer user into
thinking that it is legitimate software, but actually contains hidden
functions.
c. Virus – a software program that is designed to spread itself to other
computers and to damage or disrupt a computer, such as
interrupting communications by overwhelming a computer's
resources.
d. Computer worm – a unique form of malware that can spread
autonomously, though they do not necessarily have a payload.
Take note

• 1986 - The emergence of the first computer virus


• Experimentation – The primary motivation behind
the creation of the first computer virus
• 9/11 terrorist attacks – first historical event led
to the formation of cybercrime division within the
FBI
• The theft of ARPANET passwords - first known
instance of cybercrime
Toolkit of Cybercriminals
e. Bundlers – malware which is hidden inside what appears to be legitimate
software or download. Containers often include gaming software or download.
Containers often include gaming software, freeware, image or audio files, or
screensavers.
f. DoS (Denial of Service) Attack – attempt to prevent users a particular service
from effectively using that service. Typically, a network service is bombarded
with authentication requests; the attack overwhelms the resources target
computers, causing them to deny server access to other computers making
legitimate requests.
g. DDoS (Distributed Denial of Service) Attack – occur when a perpetrator seeks
to gain control over multiple computers and then uses these to computers to
launch an attack against a specific target or targets.
h. Botnet or Zombie – are compromised computers attached to the internet
which are often used to remotely perform malicious or criminal tasks. They are
often used in large batches and the majority of owners of zombie computers are
unaware of their usage.
Toolkit of Cybercriminals

i. Spyware – a type of malware that enables the remote monitoring of a


computer user’s activities or information on an individual’s compute where
this software has been installed. It may also gather information on users
without their knowledge and relay it to interested third parties.
o Keyloggers – a type of spyware that records every keystroke of the user
and reports this information back to its source. It is a serious threat to users
and the users data, as they track the keystrokes to intercept passwords
and other sensitive information typed in through the keyboard. This gives
hackers benefit access to PIN Codes and account numbers, passwords to
online sites, email logins, and other confidential information.
o Sniffer – a type of software that is used to monitor and analyzed networks
but can also be used to collect individuals’ usernames, passwords, and
other personal information.
Toolkit of Cybercriminals
2. Phishing – means the solicitation of information via e-mail of the culling of
individuals to fake web sites.
a. Spoofing – a type of scam in which criminals attempt to obtain someone’s
personal information by pretending to be a legitimate business, a neighbor,
or some other innocent party. Involves spoofing using company trademarks
and logos.
b. Pharming – an advanced form of phishing which redirects the connection
between an IP address and its target serve.
c. Redirectors – malicious programs which redirect users’ network traffic to
undesired sites.
d. Advance-fee fraud or 419 fraud – some individuals will willingly divulge
personal and financial information to strangers if they believe that a large
financial windfall will soon follow. This fraud is accomplished when an e-mail
message is distributed to a victim which asks the recipient claiming “found”
money.
e. Floating windows – phishers may place floating windows over the address
bars In web browsers. Although the site appears to be legitimate, it actually a
site designated to steal personal information.

You might also like