You are on page 1of 25

Objective:

1.Define malware.

2.Identify cyber-attacks and its examples.

3.Distinguish different cyber intruders.

4.Determine various ways to ensure online


safety to prevent malwares.
Malware (malicious software)
is a program or code that is designated to
infiltrate a system and execute malicious
operations and controls. Computer viruses,
worms, and Trojan horses are classified as
malware, which are programs that act
without a user’s knowledge and deliberately
alter the computer’s operations.
A computer infected by a virus, worm, or Trojan horse often has
one or more of the following symptoms:
•Screen displays unusual message or image
•Music or unusual sound plays randomly
•Available memory is less than expected
•Existing programs and files disappear
•Files become corrupted
•Programs or files do not work properly
•Unknown programs or files
•System properties change mysteriously appear
Common Types of Cyber Attacks/Malwares

Denial-of-Service Attacks
A denial-of-service (DoS) attack, or distributed
denial-of-service (DDoS) attack, consists of
making repeated requests of a computer system
or network, thereby overloading it and denying
legitimate users access to it.

Worms
A worm is a program that copies itself
repeatedly into a computer’s memory or onto a
disk drive.
Common Types of Cyber Attacks/Malwares

Viruses
A virus is a “deviant” program, stored on a
computer floppy disk, hard drive, or CD, that can
cause unexpected and often undesirable effects,
such as destroying or corrupting data.

Trojan Horses
A Trojan horse is a program that pretends to be
a useful program, usually free, such as a game or
screen saver, but carries viruses, or destructive
instructions, that perpetrate mischief without
your knowledge.
How Malware is spread
•By infected floppies or CDs: The first way is via an infected floppy disk or
CD, perhaps from a friend or a repair person.
•By opening unknown email attachments: The second way is from an
email attachment. This
is why a basic rule of using the internet is: Never click on an email
attachment that comes from someone you don’t know.
•By clicking on infiltrated websites: Some crackers “seed” web pages with
contagious malware that enables them to steal personal data, so that by
simply clicking on a website you can unwittingly compromise your PC.
•Through infiltrated Wi-Fi hot spots: As mentioned earlier, if you’re a user
of Wi-Fi wireless
access points, or hot spots, you have to be aware that your laptop or PDA
could be exposed to wireless transmitted diseases from illegal users.
Ways to Minimize Virus Attacks
•Buying a new computer with antivirus software on it does not mean you are
automatically protected. The software could be six months old and not cover new
viruses. You have to register it with the designer company, and you need to receive
antivirus updates.
•Scan your entire system with antivirus software the first time it’s installed; then
scan it regularly after that. Often the software can be set to scan each time the
computer is rebooted or on a periodic schedule. Also scan any new drives and the
like before using them.
•Update your antivirus software regularly. There are virus and security alerts
almost every day. Most antivirus software is automatically linked to the internet
and will add updated antivirus code to your system whenever the software vendor
discovers a new threat.
•If you discover you have a virus, you can ask McAfee or Norton to scan your
computer online. Then follow the company’s directions for cleaning or deleting it.
Cyber Intruders

Cyber spies
- Cyber espionage, or cyber spying, is a type
of cyberattack in which an unauthorized
user attempts to access sensitive or
classified data or intellectual property (IP)
for economic gain, competitive advantage
or political reasons.
Signs Someone is Trolling

 Off-topic remarks
 Refusal to acknowledge evidence
 Dismissive, condescending tone
 Use of unrelated images or memes
 Seeming obliviousness
Cyber Intruders

Cyber spies
- Cyber espionage, or cyber spying, is
a type of cyberattack in which an
unauthorized user attempts to access
sensitive or classified data or
intellectual property (IP) for
economic gain, competitive
advantage or political reasons.
Cyber spies most commonly attempt to access the following assets:

 Research & Development data and activity


 Academic research data
 IP, such as product formulas or blueprints
 Salaries, bonus structures and other sensitive information regarding
organizational finances and expenditures
 Client or customer lists and payment structures
 Business goals, strategic plans and marketing tactics
 Political strategies, affiliations and communications
 Military intelligence
Cyber Intruders
Hackers
- Hackers are defined (1) as computer
enthusiasts, people who enjoy learning
programming languages and computer
systems, but also (2) as people who gain
unauthorized access to computers or
networks, often just for the challenge of it.

2 Types of Hackers
 Thrill-seeker hackers
 White-hat hackers
Cyber Intruders
Cyber Thieves
- A cyber thief (known as
cybercriminal) is a person who uses
his skills in technology to do
malicious acts and illegal activities
known as cybercrimes. They can be
individuals or teams.

Cyberthieves and cybercriminals are


widely available in what is called the
“Dark Web” where they mostly
provide their illegal services or
products.
Types of Cyber Theft

1.Phishing and Scam


- Phishing is a type of social engineering
attack that targets the user and tricks
them by sending fake messages and emails
to get sensitive information about the user
or trying to download malicious software
and exploit it on the target system.
Types of Cyber Theft

2. Identity Theft
- Identity theft occurs when a
cybercriminal uses another person’s
personal data like credit card numbers
or personal pictures without their
permission to commit a fraud or a
crime.
Types of Cyber Theft

3. Ransomware Attack
- Ransomware attacks are a very
common type of
cybertheft/cybercrime. It is a type
of malware that has the capability
to prevent users from accessing all
of their personal data on the
system by encrypting them and
then asking for a ransom in order
to give access to the encrypted
data.
Types of Cyber Theft

4. Hacking/Misusing Computer
Networks
- This term refers to the crime of
unauthorized access to private
computers or networks and misuse
of it either by shutting it down or
tampering with the data stored or
other illegal approaches.
Types of Cyber Theft

5. Internet Fraud
- Internet fraud is a type of
cybercrimes that makes use of the
internet and it can be considered a
general term that groups all of the
crimes that happen over the
internet like spam, banking frauds,
theft of service, etc.
Online Safety: Antivirus software, Firewalls, Password, Biometric Authentication and
Encryption

ANTIVIRUS SOFTWARE
- Antivirus software scans a computer’s
hard disk, CDs, and main memory to
detect viruses and, sometimes, to
destroy them. Such virus watchdogs
operate in two ways. First, they scan
disk drives for “signatures,”
characteristic strings of 1s and 0s in the
virus that uniquely identify it. Second,
they look for suspicious virus like
behavior, such as attempts to erase or
change areas on your disks.
Online Safety: Antivirus software, Firewalls, Password, Biometric Authentication and
Encryption

FIREWALLS
- A firewall is a system of hardware and/or
software that protects a computer or a network
from intruders. The firewall software monitors
all internet and other network activity, looking
for suspicious data and preventing
unauthorized access. Always-on internet
connections such as cable modem, satellite, and
DSL, as well as some wireless devices, are
particularly susceptible to unauthorized
intrusion.
Online Safety: Antivirus software, Firewalls, Password, Biometric Authentication and
Encryption

PASSWORDS
- Password is the special words,
codes, or symbols required to access
a computer system. Protecting your
internet access accounts and files
with a password isn’t enough.
Passwords (and PINs, too) can be
guessed, forgotten, or stolen.
Online Safety: Antivirus software, Firewalls, Password, Biometric Authentication and
Encryption

BIOMETRIC AUTHENTICATION
- Biometrics, the science of
measuring individual body
characteristics, tries to use these in
security devices. Biometric
authentication devices authenticate a
person’s identity by comparing his or
her physical or behavioral
characteristics with digital code
stored in a computer system.
Online Safety: Antivirus software, Firewalls, Password, Biometric Authentication and
Encryption

ENCRYPTION
- Encryption is the process of altering
readable data into unreadable form
to prevent unauthorized access.
Encryption is able to use powerful
mathematical concepts to create
coded messages that are difficult or
even virtually impossible to break.
Two basic forms of encryption:
• Private key: Private-key (symmetric) encryption means that the
same secret key is used by both sender and receiver to encrypt and
decrypt a message.
• Public key: Public-key encryption means that two keys are used—
a public key, which the receiver has made known beforehand to the
sender, who uses it to encrypt the message, and a private key, which
only the receiver knows and which is required to decrypt the
message.

You might also like