Professional Documents
Culture Documents
• an unauthorized party
Interception (person/program/computer) gains
access to an asset
• Malware
• Cyber attacks
• Online scams and frauds
• Botnets
• Hacking and cracking
• Information, hardware and software theft
• Unauthorized access and use
• Cyberextortion
• Cyberterrorism and cyberwarfare
• Humans
• Social engineering
WORM ROOTKIT
VIRUS Self-replicates without Hides itself in a computer
Attaches itself to files attaching itself and can to allow someone in a
and programs; not send itself to other remote location to access
capable of sending itself computers in a network the computer
KEYLOGGER/
TROJAN HORSE
RANSOMWARE PASSWORD STEALER
Hides within a program
Encrypts data or locks Records keystrokes,
that looks legitimate; not
computer until a ransom usually for passwords
capable of replicating
is paid and credit card
itself
information
http://www.thestar.com.my/business/business-news/2012/02/14/bursa-website-target-of-ddos-attack/
Online scams and frauds
• Strategies used by cybercriminals to exploit people and
steal information
SPAM SPOOFING
Unsolicited emails or messages; may
The attacker impersonates a
contain links or attachment with
legitimate source to the user
malware
PHISHING PHREAKING
Hacking phone networks for free
Official-looking emails sent to try to
calls or have calls charged to another
obtain personal/financial information
account
PHARMING
Redirecting user to a fake website
that looks legitimate and designed
to obtain usernames and passwords
Online scams and frauds
• Examples of online scams and frauds
https://www.theguardian.com/technology/2016/dec/14/yahoo-hack-security-of-one-billion-accounts-breached
Information, hardware & software
theft
• Information theft occurs when someone steals personal
or confidential information from individuals or
organisations
• Examples:
• Steal credit card numbers to make fraudulent purchases
• Steal personal details to create fake identities
• Steal a rival company’s confidential information
• Examples:
• An intruder gaining access to a bank’s computer and performing
unauthorized money transfer
https://www.welivesecurity.com/2014/06/19/nokia-paid-millions-blackmailing-hackers/
Cyberterrorism & cyberwarfare
Cyberterrorism Cyberwarfare
using computer and Internet technology to
using computer and Internet technology for
destroy, damage or disrupt computer
attacking and targeting nations/governments
systems for political reasons, or causing
in war or conflict activities
widespread fear in society
• Examples:
• Disable a government’s computer systems
• Disrupt a nation’s infrastructure for power grid,
telecommunications, electricity generation, air
traffic control etc.
https://www.dailydot.com/layer8/web-war-cyberattack-russia-estonia/
Humans
• People (users) can pose threats to
cybersecurity too:
Unethical
employees:
Corporate
financial gains Disgruntled
Mediocre or espionage:
through selling former
Human error/ bad corporate
confidential employees:
negligence cybersecurity spying to gain
information or may seek
practice competitive
exposing flaws revenge
advantage
in the company
to competitors
• Examples:
• Impersonating administrators/acquaintances
• Faking emergency situations
• Pretending to befriend or court the victim
• CAPTCHA
• Completely Automated Public Turing to Tell Humans and Computers Apart
• A program that displays image of a series of distorted characters for a user to
identify and enter in order to verify user input is from human not computer
generated
• Biometric devices
• Authenticates a person’s identity by translating a personal characteristic,
usually physical, into a digital code
• E.g. fingerprint reader, iris recognition system, hand geometry system, voice
recognition system, face recognition system, signature recognition system
• Green computing
• Involves reducing electricity and environment waste while using
computers, mobile devices and related technologies
• Organisations can implement measures to use energy efficiently
and reduce electrical waste
Cybersecurity Cybersecurity
Privacy
threats measures
Ethics Netiquettes
References/Credits
• Vermaat, M.E., Sebok, S.L., Freund, S.M., Campbell, J.T., and
Frydenberg, M. (2016). Discovering Computers 2016: Tools, Apps,
Devices, and the Impact of Technology. Singapore: CENGAGE
Learning.
• Vermaat, M.E., Sebok, S.L., Freund, S.M., Campbell, J.T., and
Frydenberg, M. (2018). Discovering Computers 2018: Digital
Technology, Data, and Devices. Singapore: CENGAGE Learning.