0% found this document useful (0 votes)
21 views20 pages

Ict Tree ? Day

Ict notes

Uploaded by

winmusau774
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
21 views20 pages

Ict Tree ? Day

Ict notes

Uploaded by

winmusau774
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 20
Network and Internet Security e.g. router . = A network traffic management device that, unbek to the user, sits between subnet works (LANs) and routes traffic intended for or leaving the network segments to which it’s attached. Phishing, Carding and Money Laundering Phishing is the criminally fraudulent proce attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading asa Shee pre eta trustworthy Daabase entity in an electronic communicatio coals ng Sch ican n. /- ows ca wn IG oo A Phiting Ema Child Exploitation ‘Child Pornography and [legal Obscenity é Internet porn is a multi-billion —dollar- per-year industry. * Itis hardly surprising that there is a variety of content in this area related to cyber crimes. Sexual abuse and exploitation of children rob the victims of their childhood, permanently interfering with their emotional and psychological development. Industrial Espionage ; Spying to find out valuable information Comp: projects, client list, research data while the goal is different than military espionage, the means are the same as Electronic monitoring, photocopying file. Cyber Terrorism * Simply, the use of computers to launch a terrorist attack. * This include:- -Significant economic damage -Disruptions to . communications Disruptions 9 \ in supply lines += & -General. degradation , of the > national infrastructure Trojan Horses Is a program that looks benign (caring/gentle) bu not, looks like an acute screen saver or apparently login box which can download harmful useful software, Install a key logger and open a back door for hackers, Competent programmers can craft a Trojan horse to appeal to a certain person or to appeal to a certain demographic Virus Is one of the most common type of ‘computer virus usually spreads through e-mail and uses system resources, causing slowdown or stoppage of ‘computer system, ‘When it finds a network connection, it copies itself to other hosts on the network and mails itself to everyone in hhost’s address book. Malware Is Software with a malicious pu include;- Virus, Trojan horse, pyre, Root kit, Malicious Wab-Based Code, DoS and Teardrop Attack and others. Spyware Spyware is any software that installs itself o1 computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties, Root kit : Is a collection of computer software, typically malicious, desigr enable access ta a computer or an area of its software that i otherwise allowed and often masks its existence or the existence of other software, Are most dangerous cyber threats today and designed to stay undetected on your computer. Cybercriminals use rootkits to remately access and control your machine, digging deep into the system like a latched-on tick Malicious Web-Based Code : " Is a Web-Based mobile code that is portable * operating systems resulting in poorly scripted code which Spreads quickly on the Web Denial of Service attacks " Is one of the most common types of attacks that prevent legitimate users from accessing the system on how it works and how to stop. Teardrop Attack " Hacker sends a fragmented message, Victim system attempts to reconstruct message causing system to OT Modification of data base Installation errors Intrusion of unauthorized access to system could be intentional or unintentional Jamming of a telecommunication infrastructure Misuse of known software weakness System and application errors The tempering of a system of Technical threaVerrors ‘ Are threats that results from the technical exploitatic —* system e.g, Compromising of system controls like password, user game ‘arruption by system errors or failures Data and system condemnation * Hardware and equipment failures Impersonation Insertion of malicious code or software Basic steps to overcome computer sect; threats Vand tokecre Backup Dota Initiate Phishing Secure Site with HTTPS @sccaithtabs Don’t use the same password for many accounts. IF i's stolen from you ‘one of the companies with which you do business — it cam be used 10 ta ‘your accounts. Dan’t share passwords on the phone, in texts or by email. Legitimate companies ‘will not send you messages asking for your password, If you get such a message, W's probably a seam, Keep your passwords in a secure place, out of plain sight. Back Up Your Files Na system is completely secure. Copy important files onto a removable dise or an external hard drive, and store it in a safe place. If your computer is compromised, ‘you'll still have access to your files. (Other steps to overcome computer security include;- + Having a policy that clearly sets out permitted and non-permined use of ‘owned mobile devices in relation to access to and use of work-related data + Having. a policy that clearly sets out “who owns what’, in terms of data and apps stored con the device * Training employees on haw to use their devices in safe ancl policy-compliant ways + Providing anti-virus and anti-malware software on employee-owned devices {installation by the employer at its cost) + Using virtual private networks + Encrypting data in transit + Monitoring and reviewing employees’ use of the devices, within the limits set by ‘workplace surveillance and privacy legislation + Lost orstolen devices should be immediately reported. ‘+ Avoid opening unexpected texts messages and emails from unknown senders. on bbusiness-connected devices, Just like with PCs, malware can infect mobile devices through such messages. + Be aware of surroundings when accessing sensitive information. Whether entering passwords or viewing sensitive or confidential data, users should be cautious of who ‘might be looking over their shoulder. |, Use security saftware that upelates atornatically ‘The bad guys constantly develop new ways to attack your computer, so you software must be up-to-date to protect against the latest threats, " % ‘Treat your personal information like cash Don't hand it out to just anyone. Your Social Security number, credit card numbers, and bbank and utility account numbers can be used to steal your money or apen new accounts in your name. Check out companies to find out whe you're Really dealing with * When you're online, a little research can save you a lot of money. IF you see an ad or an offer looks good to you, take a moment to check out the company. behind it. 4. Give personal information over encrypted websites only If you're shopping or banking online, stick to sites that use encryption to protect ‘your information as it travels from yaur computer to their server. 5. Pratect Your Passwords Here are afew principles tor creating strong passwords and keeping them safe: ‘The longer the password, the tougher i is to crack. Use at least 10 characters; 12 are ideal for mast home users. ‘+ Mix letiers, numbers, and special characters, Try 10: be unpredictable ~ don’t use ‘your name, birthdates, ar common words. |, Use security saftware that upclates autamaticalty ‘The bad guys constantly develop new ways to attack your computer, 50 you software muist be up-to-date to protect against the latest threats, 2% ‘Treat your personal information like cash ‘Don’t hand it owt ta just anyone. Your Social Security number, credit card numbers, and bank and utility account numbers: can be used to steal your money or open new accounts in your name. Check out companies to find out whe you're Really dealing with * When you're online, a litle research can save you a lot of money. If you see an ad or an offer that looks good to you, take a moment to ‘check out the compsany beth it 4. Give personal information over encrypted websites only If you're shopping or banking online, stick to sites that use encryption to protect {your information as it travels from yaur computer to their server. 5. Protect Your Passworsts Here ace a few principles for creating strong passwords and keeping them se: ‘The longer the password, the tougher itis to crack, Use at least 10 characters; 12 are ideal for mast home users, + Mix levers, numbers, and special characters, Try 10 be unpredictable ~ don’t use ‘your name, birthdates, ar common words. Environment / Physical threats Are threats caused by environments or physical factor to cause interruption of the electronic system operation. e.g. * Electromagnetic interference (E.M.I) * Environmental conditions as a result of extreme natural environment * Hazardous materials like petrol in a computer room Physical cable cut * Power fluctuation Secondary disaster that are likely to be generated by the community like a strike Natural threat x Are threats caused by natural disaster su earthquake, floods, strong winds etc are likely to cause damage or destruction of the system hardware and software. Pay-Per-Click Click Fraud § Many leading Interet companies earn a majority of their rev = selling pay-per-click advertisements. In pay-per click ,..., advertising models, an advertiser agrees to pay whenever someone clicks on one of their ads. —3 e— te Ss SSS Ad Network

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy