This document summarizes key areas of cyber security including computer security, application security, information security, disaster security, disaster recovery planning, and network security. It describes common cyber threats such as viruses, worms, spyware, Trojans, and ransomware and provides examples of each. The document also outlines best practices for avoiding being hacked such as deleting suspicious emails, using secure devices, creating strong passwords, using multifactor authentication, and signing up for account alerts.
This document summarizes key areas of cyber security including computer security, application security, information security, disaster security, disaster recovery planning, and network security. It describes common cyber threats such as viruses, worms, spyware, Trojans, and ransomware and provides examples of each. The document also outlines best practices for avoiding being hacked such as deleting suspicious emails, using secure devices, creating strong passwords, using multifactor authentication, and signing up for account alerts.
This document summarizes key areas of cyber security including computer security, application security, information security, disaster security, disaster recovery planning, and network security. It describes common cyber threats such as viruses, worms, spyware, Trojans, and ransomware and provides examples of each. The document also outlines best practices for avoiding being hacked such as deleting suspicious emails, using secure devices, creating strong passwords, using multifactor authentication, and signing up for account alerts.
This document summarizes key areas of cyber security including computer security, application security, information security, disaster security, disaster recovery planning, and network security. It describes common cyber threats such as viruses, worms, spyware, Trojans, and ransomware and provides examples of each. The document also outlines best practices for avoiding being hacked such as deleting suspicious emails, using secure devices, creating strong passwords, using multifactor authentication, and signing up for account alerts.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1of 20
Cyber Security
Group 12 Computer Security
the protection of computer systems and
information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms. Major areas covered in cyber security
security features within applications to prevent security vulnerabilities against threats such as unauthorized access and modification. Application Security Examples
Firewall VPN Cleaner
Security Antivirus
•Protects confidential information from data thefts.
•Reduces the attack surface and vulnerabilities in the application. Information Security
protects sensitive information from unauthorized
activities, including inspection, modification, recording, and any disruption or destruction. The goal is to ensure the safety and privacy of critical data such as customer account details, financial data or intellectual property. Disaster Security
Types of disasters can include: Natural disasters
(for example, earthquakes, floods, tornados, hurricanes, or wildfires) Pandemics and epidemics. Cyber attacks (for example, malware, DDoS, and ransomware attacks) Other intentional, human- caused threats such as terrorist or biochemical attacks. Disaster recovery planning
A disaster recovery plan (DR or DRP) is a formal
document created by an organization that contains detailed instructions on how to respond to unplanned incidents such as natural disasters, power outages, cyber attacks and any other disruptive events. Disaster Recovery: 5 Key Features and Building Your DR Plan Risk Assessment. Evaluate Critical Needs. Set Disaster Recovery Plan Objectives. Collect Data and Create the Written Document. Test and Revise. Network Security
any activity designed to protect the usability and
integrity of your network and data. It includes both hardware and software technologies. It targets a variety of threats. It stops them from entering or spreading on your network. Effective network security manages access to the network. Common methods attackers use to control computer or networks Virus Worms Spyware Trojan Ransomware Virus
a type of malicious software, or malware, that
spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage. Virus example
Common name ILOVEYOU
Aliases Love Bug, Loveletter Type Computer worm Point of origin Manila, Philippines Author(s) Onel de Guzman Worms
type of malware that can automatically propagate
or self-replicate without human interaction, enabling its spread to other computers across a network. A worm often uses the victim organization's internet or a local area network (LAN) connection to spread itself. Spyware
is malicious software that enters a user's computer,
gathers data from the device and user, and sends it to third parties without their consent. A commonly accepted spyware definition is a strand of malware designed to access and damage a device without the user's consent. Some of the most common examples of spyware
Adware keyloggers infostealers
Trojan
A Trojan Horse Virus is a type of malware that
downloads onto a computer disguised as a legitimate program. The delivery method typically sees an attacker use social engineering to hide malicious code within legitimate software to try and gain users' system access with their software. Ransomware
a type of malware that locks and encrypts a
victim's data, files, devices or systems, rendering them inaccessible and unusable until the attacker receives a ransom payment. The first iterations of ransomware used only encryption to prevent victims from accessing their files and systems. What can you do to avoid being hacked ? Delete suspicious emails. It is best to delete spam or dubious- looking emails without opening them. ... Use secure devices. ... Create strong passwords. ... Use multifactor authentication on your accounts. ... Sign up for account alerts.