Cyber Safety
Cyber Safety
.
SOCIAL NETWORKING
SITES
1. FACEBOOK
2. TWITTER [NOW X]
3. LINKEDIN
4. INSTAGRAM
5. WHATSAPP
6. DISCORD
DIGITAL SOCIETY AND
NETIZEN
A Digital Society is a society that uses digital
technologies to communicate, collaborate,
create, and share information
A Netizen is a citizen of the internet who uses
the internet responsibly, ethically, and
respectfully.
Digital Footprints are the records and traces
individuals leave behind as they use the
internet
Privacy settings allow you to control how much
information is shared about you online
THREATS TO COMPUTER
SECURITY
• Computer society is threatened by many types of cyberattacks,
including malware, ransomware, phishing, and spyware. These attacks can
lead to financial loss, identity theft, and unauthorized access to corporate
systems.
• Malware
• A malicious program that can infect a computer and perform malicious
actions
• Includes viruses, worms, trojans, spyware, and adware
• Can be downloaded from an untrusted website or email, or from an unwanted
software download
• Can destroy data or shut down a system
THREATS TO COMPUTER
SECURITY
• Ransomware
• A type of malware that encrypts a victim's files or data and demands payment to
restore access
• Can be very expensive and frequent
• Can cause companies to lose income while hackers hold system access for ransom
• Phishing
• A social breach that uses deceptive emails, messages, or websites to trick people
into
revealing sensitive information
• Can lead to identity theft, financial loss, and unauthorized access to corporate
systems
• Can be avoided by not opening links from people you don't know
• Spyware
• A type of malware that secretly captures sensitive data and transfers it to attackers
• Can obtain login credentials, credit card information, and other personal details
SOLUTIONS TO COMPUTER
SECURITY
THREATS
• Use strong passwords: Use strong and unique passwords for each account.
• Enable multifactor authentication: Multifactor authentication (MFA)
verifies user access right before accessing corporate information and
resources.
• Update software regularly: Regularly updating software and security
patches minimizes vulnerabilities that attackers might exploit.
• Use a firewall: A firewall acts as a barrier between your computer and
another network, such as the internet.
• Use data encryption: Data encryption ensures that even if cybercriminals
intercept sensitive data, they cannot read or use it.
• Use DDoS protection: DDoS protection solutions can help mitigate the risk
of DDoS attacks, where cybercriminals overwhelm a network with a flood of
Internet traffic.
SOLUTIONS TO COMPUTER
SECURITY
THREATS
• Back up data regularly: Back up your data regularly.
• Train employees: Train employees on cybersecurity best practices.
• Use cloud-based security solutions: Cloud-based security solutions can be
more cost-effective for small businesses.
• Use network access control: Network access control establishes trust with
user identities and devices and enforces access policies for applications.
• Use attack surface management: Attack surface management (ASM)
involves the ongoing discovery, analysis, remediation, and monitoring of
cybersecurity vulnerabilities.
THANK YOU