0% found this document useful (0 votes)
250 views6 pages

Unit 9 - Computer and Cybersecurity

Uploaded by

lucky dolphin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
250 views6 pages

Unit 9 - Computer and Cybersecurity

Uploaded by

lucky dolphin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Unit 09: Computer and Cybersecurity

The vulnerabilities of a computer system should not be left alone for


perpetrators. We should prevent perpetrators from gaining access to our
computer systems. To ensure that information presented by your computer
system is reliable and not prone to computer fraud and malware.

Computers and the internet have transformed the lives of many people in many
good ways. Unfortunately, this vast network and its associated technologies
also have a number of security threats. It is our duty to protect ourselves from
these threats and attacks. Scammers, hackers and identity thieves are looking
to steal your personal information - and your money.

Computer security, the protection of computer systems and information from


harm, theft, and unauthorized use. Computer hardware is typically protected by
the same means used to protect other valuable or sensitive equipment, namely,
serial numbers, doors and locks, and alarms. The protection of information and
system access, on the other hand, is achieved through other tactics, some of
them quite complex. Computer security deals with the protection of computer
systems and information from harm, theft, and unauthorized use.

Cyber security is the practice of defending computers, servers, mobile devices,


electronic systems, networks, and data from malicious attacks. It's also known
as information technology security or electronic information security. The term
applies in a variety of contexts, from business to mobile computing, and can be
divided into a few common categories.
● Network security is the practice of securing a computer network from
intruders, whether targeted attackers or opportunistic malware.

● Application security focuses on keeping software and devices free of


threats. A compromised application could provide access to the data its
designed to protect. Successful security begins in the design stage, well
before a program or device is deployed.

● Information security protects the integrity and privacy of data, both in


storage and in transit.

● Operational security includes the processes and decisions for handling


and protecting data assets. The permissions users have when accessing

Page | 1
a network and the procedures that determine how and where data may
be stored or shared all fall under this umbrella.

● Disaster recovery and business continuity define how an organization


responds to a cybersecurity incident or any other event that causes the
loss of operations or data. Disaster recovery policies dictate how the
organization restores its operations and information to return to the same
operating capacity as before the event. Business continuity is the plan
the organization falls back on while trying to operate without certain
resources.

● End-user education addresses the most unpredictable cyber-security


factor: people. Anyone can accidentally introduce a virus to an otherwise
secure system by failing to follow good security practices. Teaching users
to delete suspicious email attachments, not plug in unidentified USB
drives, and various other important lessons is vital for the security of any
organization.

Security is a constant worry when it comes to information technology. Data theft,


hacking, malware and a host of other threats are enough to keep any IT
professional up at night. We’ll look at the basic principles and best practices that
allow users to keep their systems safe. Individuals and companies must employ
the best security measures suitable to their needs to prevent fraudulent
activities.

Figure 02-C: CIA Triad

Page | 2
The goal of information security follows three main principles:
1. Confidentiality is ensuring that information is available only to the
intended audience – An organization obtains or creates a piece of
sensitive data that will be used in the course of its business operations.
Because the data is sensitive, that data should only be able to be seen
by the people in the organization that need to see it in order to do their
jobs. It should be protected from access by unauthorized individuals.
2. Integrity is protecting information from being modified by unauthorized
parties – Integrity involves maintaining the accuracy, consistency and
trustworthiness of data. Data must not be changed whilst at rest or in
transit by unauthorized individuals (which would demonstrate a breach of
confidentiality). Integrity of data is commonly ensured by implementing
security measures such as file permissions and access control models.
Version controls can also be utilized to avoid changes to data made
accidentally by authorized individuals.
3. Availability is protecting information from being modified by unauthorized
parties – When the individual that needs that piece of data to perform a
job duty is ready to utilize it, it must be readily accessible (i.e. online) in
a timely and reliable manner so the job task can be completed on time
and the company can continue its processing. Availability means that
authorized individuals are able to access their data whenever they want.

Effectively executing all three principles of the Security Triad creates an ideal
outcome from an information security perspective.

Good Security Practices for Individuals


1. Install anti-virus and anti-malware software
Software may include bugs as discussed in the previous modules. To limit
the vulnerabilities, make sure that the instructions for install of a software
is followed, the acquisition of the software is legitimate. Anti-virus and
anti-malware should also be installed and kept up to date.

Page | 3
2. Use a strong password
Reusing passwords or having the same password for multiple accounts,
websites, and other systems will become more vulnerable. Do not save
passwords on websites and devices that are unsecure. Remember to
change your passwords on a schedule to keep them fresh.

3. Log off public computers


Yes, the business centers and cybercafes that offer the use of a computer
system is convenient, but not secure. Since anyone can use them for
anything, they have probably been exposed to viruses, worms, trojans,
keyloggers, and other nasty malware. Should you use them at all? When
using a public area computer, be sure to completely log off when you are
finished using it.

4. Save and Back up


Some events may be inevitable like hardware failure and virus infection,
so be sure to save every now and then. Also back up important
information that is important to you. Make sure to verify if the files you’ve
saved can be easily restored.

5. Limit social network information


Facebook, Twitter, Google+, YouTube, Pinterest, LinkedIn and other
social networks have become an integral part of our online lives. Social
networks are a great way to stay connected with others, but you should
be wary about how much personal information you post. Learn how to
use the privacy and security settings to protect yourself, keep personal
information personal, know and manage your friends, know what to do if
you encounter a problem.

6. Download files legally


Avoid peer-to-peer (P2P) networks and remove any file-sharing clients
already installed on your system. Since most P2P applications have
worldwide sharing turned on by default during installation, you run the
risk of downloading viruses or other malware to your computer, and
having your personal and/or confidential information inadvertently shared
across the Internet, which could lead to identity theft.

Page | 4
7. Keep personal information safe
Do not divulge personal information online if you’re not sure about the
sender or the website. A common fraud, called "phishing", sends
messages that appear to be from a bank, shop or auction, giving a link
to a fake website and asking you to follow that link and confirm your
account details.

8. Lock your computer


Whenever you leave our devices unattended, make sure that your
device/s are locked.

9. Do not click on suspicious links or pop-up notifications


Avoid visiting unknown websites or downloading software from untrusted
sources. These sites often host malware that will automatically install
(often silently) and compromise your computer. If attachments or links in
the email are unexpected or suspicious for any reason, don't click on it,
just visit the actual sender website.

10. Keep applications up to date


Turn on automatic updating or make sure that all applications are also up
to date.

Definition of terms
● Firewall: A firewall is a network security device that monitors incoming
and outgoing network traffic and decides whether to allow or block
specific traffic based on a defined set of security rules.
● Hackers: A hacker is a person who breaks into a computer system. The
reasons for hacking can be many: installing malware, stealing or
destroying data, disrupting service, and more. Hacking can also be done
for ethical reasons, such as trying to find software vulnerabilities so they
can be fixed.
● Threats: A threat is anything that can compromise the confidentiality,
integrity, or availability of an information system.
● Vulnerability: A vulnerability is any weakness in the information
technology (IT) infrastructure that hackers can exploit to gain
unauthorized access to data.

Page | 5
Some of the most common threats to cybersecurity include:
● Malware: This refers to malicious software such as viruses, worms, and
Trojan horses that can infect computers and devices, steal sensitive
information, or damage systems.
● Phishing: This is the practice of sending fake emails or messages that
appear to come from a trustworthy source, such as a bank or a popular
website, in order to trick people into revealing sensitive information.
● Ransomware: This is a type of malware that encrypts a victim's files and
demands a ransom payment in exchange for the decryption key.
● Distributed Denial of Service (DDoS) attacks: These attacks overload a
website or online service with traffic, making it inaccessible to users.
● Insider threats: Refers to current or former employees, business
partners, contractors, or anyone who has had access to any systems or
networks in the past. can be considered an insider threat if they abuse
their access permissions.
● Man-in-the-middle attacks: Man-in-the-middle is an eavesdropping
attack, where a hacker/intruder intercepts and relays messages between
two parties in order to steal data.
● Advanced persistent threats (APTs): In an APT, an intruder or group of
intruders sneak into a system and remain undetected for an extended
period. The intruder leaves networks and systems intact to avoid
detection so that the intruder can spy on business activity and steal
sensitive data.
Information security, also known as InfoSec, refers to the processes and
tools designed and deployed to protect sensitive business information from
modification, disruption, destruction, and inspection.

Page | 6

You might also like