Track Online Safety and Security Lesson 2 The possibility of a malicious Cyberthreat attempt to damage or disrupt a computer network or system. In 2012, Roger A. Grimes named the top five common cyberthreats, namely:
1. Social Engineered Trojan
2. Unpatched Software 3. Phishing 4. Network Travelling Worms 5. Advanced Persistent Threats Types of Cyber – Attacks (Malicious Software) is a program or file that can harm your computer by stealing data or destroying something in your computer. This can be prevented by means of a firewall to prevent transfer of large data files over the network to eliminate attachments that may contain malware. Phishing It is a form of cyberattacks to obtain sensitive information like username and passwords through malicious e-mails. This can be prevented by verifying the request from the source institution. Note: Personal and sensitive information are not asked via e-mails. Password Attacks A password attacks happens when a third party is trying to gain access to your systems by cracking a user’s password. This can be prevented by using a strong password to keep you from this attacks. Denial-of-Service Attacks DoS attacks occurs when a malicious actor (hacker) stops legitimate user from getting into specific computer systems, devices, service or other digital resources. This attack can be avoided by keeping your system secure with regular software updates, online security monitoring and monitoring your data flow. Man in the Middle (MITM) This may happen by impersonating the endpoint in an online information exchange via smartphone to a website. Malvertising Malvertising are done by malicious actors that upload infected ads to different website using advertising networks. The best way to prevent falling victim to malvertising is to keep an up- to-date software and operating systems. Roque Software Malware that pretends a legitimate and necessary security software that will keep you system safe. An updated firewall is the best defense. It is also good to install a trusted anti-virus or anti-spyware software program that can detect threats like rogue software. What is Cyber Security?
Cyber security refers to the body
of technologies, processes, and practices designed to protect networks, computer programs and data from attack, damage and unauthorized access. Things you need to consider doing to be safe: Make you If ever the user has same password for multiple accounts, password Strong this will enable the hacker to steal more information since the and unique. password has been reused. Get a Virtual A VPN is a type of Private technology that encrypts a user’s connection over a less Network and secure networks such as the Internet to make it safer. Use Turn on Two- Two-factor authentication provides another layer of security Factor you need to pass beyond having a username and password to get Authentication into your accounts. Use Passcodes Even if they are Optional A password and a passcode are two different things when it comes to user accounts and personal devices. A password is a combination of random letters and numbers to access a specific account. A passcode or a Pin is restricted to number only and is used as a second authentication mechanism. Use Different Using a different address Email for each in your accounts requires extra effort but Addresses for this is a very effective way in keeping all of your Different Types accounts safe. of Accounts Clear Your Cache Be sure to delete browser cookies and clear browser history on a regular basis. This is done on order to avoid other users to see you computer activity such as the webpages you visits and the information you have either uploaded to or downloaded from it. Turn Off Saving your password online ‘Save can also enable phishing sites to steal your saved passwords and gain to all of your Password’ accounts. Feature in Browsers Don’t Fall Prey to Click Bait Never trust anything suspicious ads on both trusted and untrusted sites. Before using one of Explore the these, you have to make sure that it is safe Security to use Tools You Install a. All-inclusive protection – protect your device from malware from web and external devices attached to yours. b. Reliable protection – it has conduct regular security scans without user trigger and Here are things automatically rejects data from unwanted you should check sources.
on before c. Performance impact – make sure to choose a
software that will enhance your device’s installing that performance instead of the other way around. software. d. Easy to use – the program must be able to present itself in a way that would be understood by non-technical users. e. Available support – Support of the program should always be available and easy to contact in case users have a hard time using it.