We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 20
Network and Internet Security e.g. router .
= A network traffic management device that, unbek
to the user, sits between subnet works (LANs) and routes
traffic intended for or leaving the network segments to
which it’s attached.Phishing, Carding and Money Laundering
Phishing is the criminally fraudulent proce
attempting to acquire sensitive information such as
usernames, passwords and credit card details by
masquerading
asa Shee pre eta
trustworthy
Daabase
entity in an
electronic
communicatio coals ng Sch ican
n. /- ows ca
wn IG oo
A Phiting EmaChild Exploitation
‘Child Pornography
and [legal Obscenity é
Internet porn is a
multi-billion —dollar-
per-year industry.
* Itis hardly surprising that there is a variety of content in this
area related to cyber crimes. Sexual abuse and exploitation
of children rob the victims of their childhood, permanently
interfering with their emotional and psychological
development.Industrial Espionage ;
Spying to find out valuable information Comp:
projects, client list, research data while the goal is
different than military espionage, the means are the same
as Electronic monitoring, photocopying file.Cyber Terrorism
* Simply, the use of computers to launch a terrorist attack.
* This include:-
-Significant economic damage
-Disruptions to .
communications
Disruptions 9 \
in supply lines += &
-General.
degradation ,
of the >
national
infrastructureTrojan Horses
Is a program that looks benign (caring/gentle) bu
not, looks like an acute screen saver or apparently
login box which can download harmful
useful
software, Install a key logger and open a back door for
hackers,
Competent
programmers can
craft a Trojan
horse to appeal to
a certain person
or to appeal to a
certain
demographicVirus
Is one of the most common type of
‘computer virus usually spreads through
e-mail and uses system resources,
causing slowdown or stoppage of
‘computer system,
‘When it finds a network connection, it
copies itself to other hosts on the
network and mails itself to everyone in
hhost’s address book.
Malware
Is Software with a malicious pu
include;- Virus, Trojan horse, pyre,
Root kit, Malicious Wab-Based Code,
DoS and Teardrop Attack and others.Spyware
Spyware is any software that installs itself o1
computer and starts covertly monitoring your online
behavior without your knowledge or permission.
Spyware is a kind
of malware that
secretly gathers
information about
a person or
organization and
relays this data to
other parties,Root kit :
Is a collection of computer software, typically malicious, desigr
enable access ta a computer or an area of its software that i
otherwise allowed and often masks its existence or the existence of
other software,
Are most dangerous
cyber threats today and
designed to stay
undetected on your
computer.
Cybercriminals use
rootkits to remately access
and control your machine,
digging deep into the
system like a latched-on
tickMalicious Web-Based Code :
" Is a Web-Based mobile code that is portable *
operating systems resulting in poorly scripted code
which Spreads quickly on the Web
Denial of Service attacks
" Is one of the most common types of attacks that
prevent legitimate users from accessing the system
on how it works and how to stop.
Teardrop Attack
" Hacker sends a fragmented message, Victim system
attempts to reconstruct message causing system to
OTModification of data base
Installation errors
Intrusion of unauthorized access to system
could be intentional or unintentional
Jamming of a telecommunication
infrastructure
Misuse of known software weakness
System and application errors
The tempering of a system
ofTechnical threaVerrors ‘
Are threats that results from the technical exploitatic —*
system e.g,
Compromising of system controls like password, user
game
‘arruption by
system errors or
failures
Data and system
condemnation *
Hardware and
equipment failures
Impersonation
Insertion of
malicious code or
softwareBasic steps to overcome computer sect;
threats
Vand tokecre
Backup Dota
Initiate Phishing
Secure Site with
HTTPS
@sccaithtabsDon’t use the same password for many accounts. IF i's stolen from you
‘one of the companies with which you do business — it cam be used 10 ta
‘your accounts.
Dan’t share passwords on the phone, in texts or by email. Legitimate companies
‘will not send you messages asking for your password, If you get such a message,
W's probably a seam,
Keep your passwords in a secure place, out of plain sight.
Back Up Your Files
Na system is completely secure. Copy important files onto a removable dise or an
external hard drive, and store it in a safe place. If your computer is compromised,
‘you'll still have access to your files.(Other steps to overcome computer security include;-
+ Having a policy that clearly sets out permitted and non-permined use of
‘owned mobile devices in relation to access to and use of work-related data
+ Having. a policy that clearly sets out “who owns what’, in terms of data and apps stored
con the device
* Training employees on haw to use their devices in safe ancl policy-compliant ways
+ Providing anti-virus and anti-malware software on employee-owned devices
{installation by the employer at its cost)
+ Using virtual private networks
+ Encrypting data in transit
+ Monitoring and reviewing employees’ use of the devices, within the limits set by
‘workplace surveillance and privacy legislation
+ Lost orstolen devices should be immediately reported.
‘+ Avoid opening unexpected texts messages and emails from unknown senders. on
bbusiness-connected devices, Just like with PCs, malware can infect mobile devices
through such messages.
+ Be aware of surroundings when accessing sensitive information. Whether entering
passwords or viewing sensitive or confidential data, users should be cautious of who
‘might be looking over their shoulder.|, Use security saftware that upelates atornatically
‘The bad guys constantly develop new ways to attack your computer, so you
software must be up-to-date to protect against the latest threats, "
% ‘Treat your personal information like cash
Don't hand it out to just anyone. Your Social Security number, credit card numbers, and
bbank and utility account numbers can be used to steal your money or apen new accounts
in your name.
Check out companies to find out whe you're Really dealing with
* When you're online, a little research can save you a lot of money. IF you see an ad
or an offer looks good to you, take a moment to
check out the company. behind it.
4. Give personal information over encrypted websites only
If you're shopping or banking online, stick to sites that use encryption to protect
‘your information as it travels from yaur computer to their server.
5. Pratect Your Passwords
Here are afew principles tor creating strong passwords and keeping them safe:
‘The longer the password, the tougher i is to crack. Use at least 10 characters; 12 are
ideal for mast home users.
‘+ Mix letiers, numbers, and special characters, Try 10: be unpredictable ~ don’t use
‘your name, birthdates, ar common words.|, Use security saftware that upclates autamaticalty
‘The bad guys constantly develop new ways to attack your computer, 50 you
software muist be up-to-date to protect against the latest threats,
2% ‘Treat your personal information like cash
‘Don’t hand it owt ta just anyone. Your Social Security number, credit card numbers, and
bank and utility account numbers: can be used to steal your money or open new accounts
in your name.
Check out companies to find out whe you're Really dealing with
* When you're online, a litle research can save you a lot of money. If you see an ad
or an offer that looks good to you, take a moment to
‘check out the compsany beth it
4. Give personal information over encrypted websites only
If you're shopping or banking online, stick to sites that use encryption to protect
{your information as it travels from yaur computer to their server.
5. Protect Your Passworsts
Here ace a few principles for creating strong passwords and keeping them se:
‘The longer the password, the tougher itis to crack, Use at least 10 characters; 12 are
ideal for mast home users,
+ Mix levers, numbers, and special characters, Try 10 be unpredictable ~ don’t use
‘your name, birthdates, ar common words.Environment / Physical threats
Are threats caused by environments or physical factor
to cause interruption of the electronic system operation. e.g.
* Electromagnetic interference (E.M.I)
* Environmental conditions as a result of extreme natural
environment
* Hazardous materials like
petrol in a computer room
Physical cable cut
* Power fluctuation
Secondary disaster that
are likely to be generated
by the community like a
strikeNatural threat x
Are threats caused by natural disaster su
earthquake, floods, strong winds etc are likely to cause
damage or destruction of the system hardware and
software.Pay-Per-Click Click Fraud §
Many leading Interet companies earn a majority of their rev =
selling pay-per-click advertisements. In pay-per click ,...,
advertising models, an advertiser agrees to pay whenever someone
clicks on one of their ads.
—3 e—
te
Ss
SSS Ad Network