You are on page 1of 24

Unit 1: ICT in the Context of Global

Communication for Specific Professional


Track
Online Safety
and Security
Lesson 2
The possibility of a malicious
Cyberthreat attempt to damage or disrupt a
computer network or system.
In 2012, Roger A. Grimes
named the top five common
cyberthreats, namely:

1. Social Engineered Trojan


2. Unpatched Software
3. Phishing
4. Network Travelling Worms
5. Advanced Persistent Threats
Types of
Cyber – Attacks
(Malicious Software) is a program or file that can harm your computer
by stealing data or destroying something in your computer. This can
be prevented by means of a firewall to prevent transfer of large data
files over the network to eliminate attachments that may contain
malware.
Phishing
It is a form of cyberattacks to
obtain sensitive information like
username and passwords through
malicious e-mails. This can be
prevented by verifying the
request from the source
institution.
Note: Personal and sensitive
information are not asked via e-mails.
Password
Attacks
A password attacks happens
when a third party is trying to
gain access to your systems by
cracking a user’s password. This
can be prevented by using a
strong password to keep you
from this attacks.
Denial-of-Service
Attacks
DoS attacks occurs when a malicious
actor (hacker) stops legitimate user
from getting into specific computer
systems, devices, service or other
digital resources. This attack can be
avoided by keeping your system
secure with regular software
updates, online security monitoring
and monitoring your data flow.
Man in the Middle (MITM)
This may happen by impersonating the endpoint in an online
information exchange via smartphone to a website.
Malvertising
Malvertising are done by
malicious actors that upload
infected ads to different website
using advertising networks. The
best way to prevent falling victim
to malvertising is to keep an up-
to-date software and operating
systems.
Roque
Software
Malware that pretends a legitimate
and necessary security software that
will keep you system safe. An updated
firewall is the best defense. It is also
good to install a trusted anti-virus or
anti-spyware software program that
can detect threats like rogue
software.
What is Cyber
Security?

Cyber security refers to the body


of technologies, processes, and
practices designed to protect
networks, computer programs
and data from attack, damage
and unauthorized access.
Things you need to consider
doing to be safe:
Make you If ever the user has same
password for multiple accounts,
password Strong this will enable the hacker to
steal more information since the
and unique. password has been reused.
Get a Virtual A VPN is a type of
Private technology that encrypts a
user’s connection over a less
Network and secure networks such as the
Internet to make it safer.
Use
Turn on Two- Two-factor authentication
provides another layer of security
Factor you need to pass beyond having a
username and password to get
Authentication into your accounts.
Use Passcodes Even if they
are Optional
 A password and a passcode are two
different things when it comes to user
accounts and personal devices.
 A password is a combination of random
letters and numbers to access a specific
account.
 A passcode or a Pin is restricted to
number only and is used as a second
authentication mechanism.
Use Different Using a different address
Email for each in your accounts
requires extra effort but
Addresses for this is a very effective way
in keeping all of your
Different Types accounts safe.
of Accounts
Clear Your Cache
Be sure to delete browser cookies and
clear browser history on a regular basis.
This is done on order to avoid other users
to see you computer activity such as the
webpages you visits and the information
you have either uploaded to or
downloaded from it.
Turn Off
Saving your password online
‘Save
can also enable phishing sites
to steal your saved passwords
and gain to all of your
Password’
accounts. Feature in
Browsers
Don’t Fall Prey to Click Bait
Never trust anything suspicious ads on both trusted
and untrusted sites.
Before using one of
Explore the
these, you have to
make sure that it is safe
Security
to use Tools You
Install
a. All-inclusive protection – protect your device
from malware from web and external devices
attached to yours.
b. Reliable protection – it has conduct regular
security scans without user trigger and
Here are things automatically rejects data from unwanted
you should check sources.

on before c. Performance impact – make sure to choose a


software that will enhance your device’s
installing that performance instead of the other way around.
software. d. Easy to use – the program must be able to
present itself in a way that would be
understood by non-technical users.
e. Available support – Support of the program
should always be available and easy to contact
in case users have a hard time using it.

You might also like