This document discusses computer security and various cyber threats. It begins by explaining how computer security became increasingly important with the development of modems and personal computers in the late 20th century. It then discusses different methods used to protect computer systems and information, including serial numbers, locks, alarms, and various security strategies to address threats like data theft, vandalism, fraud, and privacy invasion. The document also provides definitions and examples of cryptography, encryption, malware, and other cyber attacks like phishing, watering hole attacks, and cybercrime. It concludes by listing some common reasons for web threats and tips to protect against web service attacks, such as backups, multi-factor authentication, malware scanning, and keeping software updated.
2. INTRODUCTION
• Computer security has become increasingly
important since the late 1960s, when modems
(devices that allow computers to communicate over
telephone lines) were introduced. In the 1980s, the
development of personal computers exacerbated
the problem by allowing hackers (irresponsible
computerphiles) to gain unlawful access to big
computer systems from the comfort of their own
homes.
3. Computer security became a common worry as
the Internet grew rapidly in the late twentieth and
early twenty-first centuries. The development of
enhanced security systems tries to reduce such
vulnerabilities, yet computer crime methods are
always evolving, posing new risks.
5. • The protection of computer systems and information
from harm, theft, and illegal use is known as computer
security, or cybersecurity.
• Serial numbers, doors and locks, and alarms are
commonly employed to protect computer gear, just as
they are for other important or sensitive equipment.
• Information and system access, on the other hand, are
protected using a variety of strategies, some of which are fairly
complicated.
6. Four key hazards are addressed by the
security procedures connected to computer
information and access:
9. (3) fraud, such as bank personnel
routing funds into their own
accounts; and
10. (4)invasion of privacy, such as unauthorized access to
protected personal financial or medical data from a huge
database.
13. What is Cryptography?
Cryptography is the practice of protecting
information through the use of coded
algorithms, hashes, and signatures. The
information can be at rest (such as a file on
a hard drive), in transit (such as electronic
communication exchanged between two or
more parties), or in use (while computing on
data). Cryptography has four primary goals:
14. •Confidentiality – Makes information
available to only authorized users.
•Integrity – Ensures that information
has not been manipulated.
•Authentication – Confirms the
authenticity of information or the
identity of a user.
•Non-repudiation – Prevents a user
from denying prior commitments or
actions.
15. Decryption is a process that transforms
encrypted information into its original
format. The process of encryption
transforms information from its original
format — called plaintext — into an
unreadable format — called ciphertext
— while it is being shared or
transmitted.
16. encryption is the process of encoding
information. This process converts the
original representation of the information,
known as plaintext, into an alternative form
known as ciphertext.
18. What Is Data Encryption: Algorithms, Methods and Techniques
19. What is security threat is a potential
negative action or event facilitated by
a vulnerability that results in an
unwanted impact to a computer
system or application
20. What Is Network Security?
Network security incorporates
various technologies, processes,
and devices into a broad strategy
that protects the integrity,
confidentiality, and accessibility of
computer networks.
21. MALWARE
• [Malware] is a catch-all phrase for any software that is
intended to harm a single machine, server, or computer
network." To put it another way, malware is classified
based on its intended use rather than the technique or
technology used to create it.
22. • Malware can also be placed "manually" on a
computer by the attackers, either by physical
access or by privilege escalation to achieve
remote administrator access.
23. Type of Malwares
Malware can be classified in a variety of
ways, the first of which is by how the
malicious software distributes. You've
certainly seen the terms virus, trojan, and
worm used interchangeably, although they
describe three subtly distinct ways malware
can infect target computers, according to
Symantec:
27. Malware Attack Methods
Each piece of malware has a method of
infection as well as a behavioral
categorization. WannaCry, for example,
is a ransomware worm. And a single
piece of malware can take on multiple
forms with different attack vector.
28. • Spyware is any software with
malicious behavior that aims to
gather information about a person or
organization and send it to another
entity in a way that harms the user
by violating their privacy,
endangering their device's security,
or other means.
33. Malvertising
When a user clicks on the advertisement, the code
in the advertisement either takes them to a
malicious website or installs malware on their
machine. In some situations, malware hidden in an
ad may run automatically without the user's
knowledge, a practice known as "drive-by
download."
34. How do I clean malware off my computer?
Follow these six steps to malware removal on a
PC.
1.Step 1: Disconnect from the internet. ...
2.Step 2: Enter safe mode. ...
3.Step 3: Check your activity monitor for malicious
applications. ...
4.Step 4: Run a malware scanner. ...
5.Step 5: Fix your web browser. ...
6.Step 6: Clear your cache.
36. How hackers can be detected?
Look for any suspicious usernames in the
password file and monitor all additions,
especially on a multi-user system.
Suspicious services added to
/etc/services. Opening a backdoor in a
Unix system is sometimes a matter of
adding two text lines. This is
accomplished by modifying /etc/services
as well as /etc/ined.
37. How do we know if we have
been hacked?
You get signed out of your online accounts
(social media, email, online banking, etc.), or
you try to log in and discover your passwords
don't work anymore. You receive emails or text
messages about login attempts, password
resets, or two-factor authentication (2FA) codes
that you didn't request
38. What are signs of a hacker?
Am I Hacked?: Clear Warning Signs
•Your email has been sending messages you
didn't create.
•Your passwords have changed without you
knowing.
•Your device is installing the software you didn't
authorize.
•You get fake antivirus messages asking you to
install.
•Your personal data is leaked.
39. How long does it take to detect a hacker?
In IBM's 2022 data security report, it was reported
that it took an average of 277 days – roughly 9
months – for businesses to identify and report a
data breach. Stolen or compromised credentials
were the most common cause of a data breach in
2022, and these types of attacks took around 327
days to identify.
40. Can a hacker can be traced?
Tracking hackers down is laborious and
often takes a lot of time, collaboration,
and investigative research. Specialist
cybercrime units need to be assembled
in order to retrieve and analyse any
potential evidence. Encrypted files will
need to be decrypted, deleted files
recovered and passwords cracked.
42. Who do I contact if my computer has
been hacked?
Report the scam to the FTC. Every
complaint and report matters when
trying to stop hackers. Report the issue
to the FBI via their Internet Crime
Complaint Center. And lastly, contact
your State Attorney General's Office.
43. Is it hard to track hackers?
The very nature of cybercrimes makes them
difficult to track, as well as sometimes difficult
to detect. Through the internet, cyber criminals
can remain anonymous. They do not need to
be physically close to their victims to commit a
crime.
44. Types of Web Security Threats
Web threats typically include human and
technical manipulation in order to attack. This
attack sometime involves social engineering,
which includes deception of users to act
unknowingly against their own best interests.
45. What is the definition of phishing?
Phishing is a type of social engineering and cybersecurity attack
where the attacker impersonates someone else via email or other
electronic communication methods, including social networks and
Short Message Service (SMS) text messages, to reveal sensitive
information.
46. A watering hole attack is a targeted
attack designed to compromise users
within a specific industry or group of
users by infecting websites they
typically visit and luring them to a
malicious site.
47. Computer worms
Scripts that run, replicate, and spread autonomously without
the help of a related program.
48. What is Cybercrime?
Cybercrime refers to any
unlawful activity
conducted via computer
systems. These threats
often use the web to enact
their plans.
50. Unauthorized data disclosure involves
the release of private information,
such as email leaks, intimate photos,
and significant corporate data leaks.
51. Cyber libel: Also known as online
defamation, this can involve attacking
individuals or organizations' reputations.
This can be done through disinformation
(deliberate distribution of inaccurate
information) or misinformation (mistaken
distribution of inaccurate information).
52. Common Reasons for Web
Threats
Human error
Technical error
Tips to Protect Web Service Attacks
a.Always create backups: All valuable data should be copied and
stored safely to prevent data loss in case of an incident.
Websites, device drives, and even web servers can be backed
up.
53. B. Enable multi-factor authentication (MFA): MFA
allows for additional layers of user authentication
on top of traditional passwords. Organizations
should enable this protection for users, while end-
users should be sure to make use of it.
54. C. Scan for malware: Regular scans for
infections will keep your computer devices
secured. Personal devices can all be
covered through an antivirus solution like
Kaspersky Total Security. Enterprise
endpoint machines and computer networks
should use this protection as well.
55. D. Keep all tools, software, and OS up to date:
Computer systems are more vulnerable when
they’ve been unpatched against undiscovered
holes in their programming. Software
developers regularly probe for weaknesses and
issue updates for this purpose. Protect yourself
by downloading these updates.
56. Smishing is a type of assault that employs text messaging or
SMS to attract your attention. A smishing attack is when a
message arrives on your cell phone via SMS and contains a link to
click or a phone number to call.
57. Vishing
Vishing follows the same pattern as previous phishing scams.
Assailants are still wanting your personal information or
sensitive company data. A voice call is used to carry out this
attack.
58. Email Phishing
The most popular sort of phishing is email phishing, which has
been around since the 1990s.