You are on page 1of 3

IT SECURITY text message by someone posing as a

legitimate institution to lure individuals into


CYBER THREATS providing sensitive data
- Malicious, deliberate attack and - The information is then used to access
unauthorized access on a system or a important and can result in identity theft and
network financial loss
F. Middle in the Middle Attack
Examples of Cyber Threats - A man in the middle (MITM) attack is a
A. Virus general term for when a perpetrato
- A program stored on a computer floppy positions himself in a conversation between
disk, hard drive, or CD, that can cause a user and an application—either to
unexpected and often undesirable effects, eavesdrop or to impersonate one of the
such as destroying or corrupting data parties, making it appear as if a normal
- Often originates from the internet exchange of information is underway
- According to the National Institute of - The ultimate objective of MITM is to steal
Standards and Technology (NIST), the first personal information that could be used for
computer virus, a boot sector virus called many purpose
“Brain”, was developed in 1986
Common Myths in IT Security
B. Worm 1. Any computer error message indicates virus
- A type of malware that copies itself infection
repeatedly into a computers’ memory or 2. Email attachment from known senders are
onto a disk drive safe
- A worm can replicate itself without human 3. Antivirus programs will stop all threats
interaction
- Worms can modify or delete files and can
even inject additional malwares CYBER ATTACKERS
- This deplete system resources by Hackers
overloading a shared network - A computer enthusiast who:
o Enjoy learning programming
C. Trojan Horse languages and computer systems
- Named after the Greek Methodology o Gain unauthorized access to
- It is a program that pretends to be a useful computers or networks, often just
program, usually free, such as a game or for the challenge of it
screen saver, but carries viruses, or A. Thrill-seeker Hackers
destructive instructions, that perpetrate B. White-hat Hackers
mischief without your knowledge
- Some of the most common purpose of Crackers
trojan horse include gaining backdoor - People who break into computers for
access to corporate systems, spying on malicious purposes
users’ online activity, or stealing sensitive A. Script Kiddies
data B. Hacktivists
C. Black-hat hackers
D. Denial-of-service Attack D. Cyberterrorists
- It consists of making repeated request of a
computer system or network, thereby SAFEGUARDS
overloading it, and denying legitimated Antivirus Software
users access to it - Antivirus software scan a computer’s hard
- If the assault comes from a number of disk, CDs, and main memory to detect
computers, it is called “distributed denial-of- viruses and, sometimes, to destroy them
service” or DDoS attack
- Accomplished by flooding the targeted host Firewall
or network with traffic until the target - A firewall is a system of hardware and/or
cannot respond or simply crashes, software that protects a computer or a
preventing access for legitimate users network form intruders
- It monitors and filters incoming and
E. Phishing outgoing network traffic based on an
- Phishing is a cybercrime in which a target or organizations’ previously established
targets are contacted by email, telephone, or security policies
- It serves as a barrier that sits between a A. Manipulation of Sound
private internal network and the public o Manipulated audio has been one of
Internet the main bases for scams that have
ruined other people’s lives and
Password livelihood
- A password is a string of characters used to o Examples of audio manipulation:
verify the identity of a user during the  Altering the speaker’s gender
authentication process  Adjusting the timing
Basic Rules in Creating Passwords:  Modifying the background
o Don’t share password with anyone o How to spot edited sounds?
o Don’t use passwords that are easy to  Listen to other parts of the
guess audio track
o Use long passwords  Note the timing
o Use different passwords for multiple  Look for odd pitch or whine
sites B. Manipulation of photo
o Change passwords often o Modern technology allowed photo
manipulation to be more common
Biometric Authentication and easier to accomplish even by
- Authenticate a person’s identity by beginners
comparing his or her physical or behavioral o In artistic media, manipulation of
characteristics with digital code stored in a photo is acceptable
computer system o However, if images are meant to
- Examples are hang-geometry systems, depict reality, photo manipulation is
fingerprint scanners, iris-recognition not acceptable
systems, face-recognition systems, voice- o How to spot edited photos?
recognition systems  Look out for the details
 Check for signs of pixilation
Encryption or imperfect coloring
- Process of altering readable data into  Observe the shadows
unreadable form to prevent unauthorized
access C. Manipulation of Video
A. Private Key a. Cheapfakes
o Same secret key is used by both o Altered using classical video editing
sender and receiver to encrypt and applications
decrypt a message b. Deepfakes
B. Public Key o Altered using artificial intelligence
o Two keys are used—a public key and machine learning
which is used to encrypt the Categories of Manipulated Videos
message and a private key which A. Missing Context
only the receiver knows, and which a. Misrepresentation
required to decrypt the message o Pertains to the manipulation using
incorrect framing of a video that
misleads the viewer
b. Isolation
THE CHALLENGES IN THE DIGITAL AGE o Pertains to the manipulation by
sharing a brief clip from a longer
TRUTH ISSUES video, creating a false narrative
Fake news B. Deceptive Edit
- The news articles are intentionally or a. Omission
verifiably false o Editing out large portions of a video
Misinformation b. Splicing
- Incorrect or misleading data or information o Editing together different videos to
presented as fact; no intent to harm or fundamentally change a story
deceive
Disinformation C. Malicious Transformation
- Deliberately deceptive; has the purpose to a. Doctoring
harm other people; has the intent to harm or o Changing the speed of the video,
deceive changing the voice
b. Fabrication
o Uses artificial intelligence in order to o Computer applications, drivers,
fake images operating systems
C. Theft of Online Music and Videos
SECURITY ISSUES o Torrent, illegal streaming, piracy
D. Theft of Time and Service
ERRORS AND ACCIDENTS E. Theft of Information
A. Human Errors
o Humans fail to assess their own
information needs MICROSOFT EXCEL
o Human emotions may affect one’s  We use VLOOKUP when we need to find
performance things in a table or row
o Humans act on their perceptions  Ctrl + up arrow key = to go to the top of a
which are often too slow to keep up table
with the device  Ctrl + left/right arrow key = to go the
left/right side of a table which has a content
B. Procedural Errors  1 (true) = approximate match
o Pertain to the failure of failures to  0 (false) = exact match
follow required procedure in a  Use dollar sign to lock in a data (highlight
certain series or steps or the data and press F4)
methodologies  Shift + enter = highlight the whole row
o Some spectacular computer failures (according to sir pero nung sinubukan ko
have occurred because someone did space dapat instead of enter)
not follow procedures  Ctrl + enter = to highlight whole column
C. Software Errors (same situation din ng nasa taas)
o Also known as “software glitches” or  Ctrl + Shift + plus button = to add a whole
“software bugs” row/column above/ side the highlighted
o Can cause a software not to work row/colum
properly  Opposite of VLOOKUP is HLOOKUP
o Can be minimized through  Concatenate = combine or joins texts which
continuous improvement of the are found in different cells
software (i.e. version update)  Instead of dragging down to copy, hover
your mouse in the lower right corner of the
D. Electromechanical Problems cell until it becomes the thin plus sign and
o Mechanical systems, such as double left click
printers, and electrical systems, such  Ctrl + PgUp/PgDn = to navigate from one
as circuit boards, do not always sheet to another
work
o Two examples included electrical
problems and machine breakdowns

NATURAL HAZARDS
- Some disasters do not merely lead to
temporary system downtime; they can
wreck the entire system
- Without power and communications
connections, cellphones, automated teller
machines, credit card verifiers, and bank
computers are useless

COMPUTER CRIMES
- An illegal act perpetrated against computer
or telecommunications
- Use of computer or telecommunications to
accomplish an illegal act
Types of Computer Crimes
A. Theft of Hardware
o Computers, computer parts,
computer accessories
B. Theft of Software

You might also like