You are on page 1of 21

Cyber Security

ICT Module
Introduction
• The term cyber security is used to refer to the
security offered through online services to
protect your online information.
• With an increasing amount of people getting
connected to internet, the security threats
that cause massive harm are increasing also
To Understand
• What is the meaning of the word CYBER
• What is the need of Cyber Security
• What are the security problems in Cyber Field
• How to implement and maintain security of a
cyber field around us
Meaning of the word CYBER
•It is a relation between
information technology, the
internet, and virtual reality
Need of Cyber Security
• Cyber security is necessary since it helps in
securing data from threats such as data theft
or misuse, also safeguards your system from
viruses.
Major security problems
• Virus
• Hacker
• Malware
• Trojan Horses
• Password Cracking
Viruses and Worms
(software, hardware)

• Virusis a program that is loaded onto your


computer without your knowledge, and runs
against your wishes

• To solve such a problem, install a security suite


that protects the computer against threats such as
viruses and worms
Hackers

•In common word, a hacker is a


person who breaks into
computers, usually by gaining
access to administrative controls
Types of Hacker
•White hat (Ethical hackers)
•Grey hat (Fame)
•Black hat
How to prevent Hacking
•It may be impossible to prevent computer
hacking, however effecting security
controls including strong passwords and
the use of firewalls can help
Malware
• The word Malware comes from Malicious Software
• Malware is any software that infects and damages a
computer system without the owners knowledge or
permission
Trojans

Ransom
adware
ware

Malware

Crime
worms
ware
Spy
ware
To prevent Malware
• Active Network Threat protection (rules and signatures).

• Active Firewall (prevents accessing unauthorized users, detects hacker


attacks, protects personal info, eliminates network traffic).

• Active Antivirus (not cracked, nor patched)


Trojan Horse
backdoor

•Trojan Horse are email viruses that can


duplicate themselves, steal information,
or harm the computer system.
•The viruses are the most serious threats
to computers
How to avoid Trojans
•Security suites, Internet Security, will prevent you to
download Trojan horses

•Kaspersky internet security, Webroot, Bitdefender,


Kaspersky Anti-virus, Norton 360 life lock . . .
Password cracking
• Password attacks are attacks by hackers that are able to
determine passwords or find passwords to different
protected electronic areas and social network sites.
• to secure your password: never use same password for 2
different websites, never use birthdate, pet names, names
of one of your family member
• Strongpassword holds: upper and lower case, symbols,
and numbers.
Browsing the Net
be
s t
m u
i e s d
o k te
o
C De n le
-
1 Ea t e
2-
• Limit cookies storage
• Don’t save passwords
• Don’t let any websites to remember your online forms
• Disable pop-up
• Limit plug-in and add-on
• Prompt for download
• Clear browser data
• Private browsing window

You might also like