Chapter 5 Slides (2) - CS - Y9
Chapter 5 Slides (2) - CS - Y9
Threat
Cyber Security
Threats Solutions/Prevention
B: Brute-Force Attack
Sorry
can't do
x100000 it!
D: Distributed Denial of Service (DDOS)
Signs to detect a DDOS attack
Encryption of data.
Eg. Wired Equivalency privacy (WEP)
• Encryption goes one step further than password protection and is an easy
and effective way to lessen the likelihood of a privacy breach. Encryption
scrambles information so that it is unreadable without a passcode.
H: Hacking
Trojan
Virus Worm Spyware Adware Ransomware
Horse
Virus
V:
• Viruses are programs or program codes that self-replicate
with the intention of deleting or corrupting files, or causing a
computer to malfunction.
• Viruses need an active host program on the target
computer or an operating system that has already been
infected, before they can actually run and cause harm.
• Viruses are often sent as email attachments, reside on infected
websites or on infected software downloaded to the user’s
computer.
Virus
Trojan Horse
T:
• A trojan horse is malware that is hidden away in the code of software
that appears to be harmless. A Trojan horse replaces all or part of
the legitimate software with the intent of carrying out some harm to
the user’s computer system.
• Once installed on the user’s computer, the Trojan horse will give
cyber criminals access to personal information on your computers,
such as IP addresses, passwords and other personal data.
Trojan
Horse
Worm
W:
• A type of stand-alone malware that can self-replicate. Unlike viruses,
they don't need an active host program to be opened in order to do
any damage.
Worm
Spyware
S:
• Spyware is software that gathers information by monitoring a
user’s activities carried out on their computer.
Spyware
Adware
A:
• Adware is a software that will attempt to flood an end-user with
unwanted advertising.
Adware
Ransomware
R:
• Ransomware are programs that encrypt data on a user’s
computer and ‘hold the data hostage’.
Ransomware
P Phishing
• Sending out
legitimate-looking
emails designed to
trick the recipients into
giving their personal
details to the sender of
the email.
• These emails may
contain links or
attachments, when
initiated, take the user to
a fake website to enter Clickbait
personal details.
P Phishing
Ways to prevent phishing