SlideShare a Scribd company logo
1 of 33
Confidential Customized for Lorem Ipsum LLC Version 1.0
Digital
Security Risk
Confidential Customized for Lorem Ipsum LLC Version 1.0
Causes of Computer Damage
Network attacks
Interception
Hardware Theft
Software Theft
Identity Theft
System Failure
Virus Attacks
Digital Security Risk
A digital security risk is any event or action that could
cause a loss of or damage to a computer or mobile device
hardware, software, data, information, or processing
capability which also include computer and cyber crimes.
Internet and Network Attacks/Virus Attacks
Intercepting Wireless Communication
Hardware Theft
Software Theft
Identity Theft
Lightning Strike/System Failure
Cybercrime
Categories for People that
Perpetrate Cybercrimes
Hacker
1
● A computer hacker is any skilled
computer expert that uses their technical
knowledge to overcome a problem.
● While "hacker" can refer to any skilled
computer programmer, the term has
become associated in popular culture
with a "security hacker", someone who,
with their technical knowledge, uses bugs
or exploits to break into computer
systems.
Cracker
2
● someone who breaks into
someone else's computer
system, often on a network;
bypasses passwords or licenses
in computer programs ; or in
other ways intentionally
breaches computer security.
Script Kiddie
3
● a person who uses existing
computer scripts or code to
hack into computers, lacking
the expertise to write their
own.
Corporate Spy
4
● is a form of espionage
(spying, intelligence,
surveillance) conducted for
commercial purposes
instead of purely national
security.
Unethical Employee
5
● is one who illegally accesses
their company network for
numerous reasons.
● one could be the money they
can get from selling top secret
information, or some may be
bitter and want revenge.
Cyberextortionist
6
● someone who uses email as an offensive
force.
● they usually send a company a
threatening email stating that they will
release some confidential information,
exploit a security leak, or launch an attack
that will harm a company network
● they use blackmail to demand a certain
amount of money in exchange for not
launching an attack.
Cyber Terrorist
7
● someone who uses a computer
network or the Internet to destroy
computer systems for political
reasons.
● it is similar to a terrorist attack
because it requires highly skilled
individuals, millions of dollars to
implement and years of planning.
An Open Thought: The Power of The Dark Web
The Cesspool for Cyber Criminals
Monitoring illicit traffic is getting harder. We are starting to see peer-to-peer
technology taking over the dark web – which is far harder to track. If there's no
central hub, then there's nowhere to start. The dark web is changing
underneath us and it's certainly not going to stop any time soon. And this leads
us to new and deadlier attacks in digital security
-Sarah Jamie Lewis, Anonymity Researcher
MALWARE
Malware
Malware, short for
malicious software, consists
of programs that act
without a user’s knowledge
and deliberately alter the
operations of computers
and mobile devices
QUICK TIP
Try right clicking on a photo and
using "Replace Image" to show
your own photo.
Virus
● a type of malicious
software that, when
executed, replicates
itself by modifying other
computer programs and
inserting its own code.
Worm
● A computer worm is a standalone
malware computer program that
replicates itself in order to spread
to other computers
● Often, it uses a computer network
to spread itself, relying on security
failures on the target computer to
access it.
Trojan Horse
● One of the most insidious
types of Trojan horse is a
program that claims to rid
your computer of viruses
but instead introduces
viruses onto your computer.
Phishing
● Phishing is a cyber attack that uses
disguised email as a weapon.
● The goal is to trick the email recipient into
believing that the message is something
they want or need — a request from their
bank, for instance, or a note from someone
in their company — and to click a link or
download an attachment.
Adware
● The term adware is frequently used to
describe a form of malware (malicious
software) which presents unwanted
advertisements to the user of a
computer.
● The advertisements produced by
adware are sometimes in the form of a
pop-up or sometimes in an "unclosable
window".
The State of Cyber Security in the Philippines
In the 3rd quarter of 2015, Kaspersky Lab reports the
Philippines took the 33rd spot out of 233 countries prone to
cybersecurity threats – a huge jump from the previous quarter’s
43rd rank.
INTERNET AND
NETWORK ATTACKS
Botnet
1
● A botnet is a group of compromised
computers or mobile devices
connected to a network
● can be used to perform distributed
denial-of-service attack (DDoS
attack), steal data, send spam, and
allows the attacker to access the
device and its connection.
–A compromised computer or device is
known as a zombie
2
● A denial of service attack (DoS
attack) disrupts computer access
to an Internet service
● In a DoS attack, the attacker
usually sends excessive messages
asking the network or server to
authenticate requests that have
invalid return addresses.
● DDoS attack
DoS Attack
3
● A back door is a program or set of
instructions in a program that allow
users to bypass security controls
● is a method, often secret, of
bypassing normal authentication or
encryption in a computer system, a
product, or an embedded device
Back Door
4
● Spoofing is a technique intruders
use to make their network or
Internet transmission appear
legitimate
● in general, it is a fraudulent or
malicious practice in which
communication is sent from an
unknown source disguised as a
source known to the receiver
Spoofing
End of part 1
Assignment:
What is a software/hardware that
protects a network ‘s resources from
intrusion?
How do/does it work?
- Prepare for a quiz next meeting

More Related Content

Similar to Digital Security Risk.pptx

Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888Varun Mathur
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 

Similar to Digital Security Risk.pptx (20)

Malware
MalwareMalware
Malware
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
computer security
computer securitycomputer security
computer security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
cyber crime and privacy issues by varun call for assistence 8003498888
 cyber crime and privacy issues  by varun call for assistence 8003498888 cyber crime and privacy issues  by varun call for assistence 8003498888
cyber crime and privacy issues by varun call for assistence 8003498888
 
Cyber crime and security (1)
Cyber crime and security (1)Cyber crime and security (1)
Cyber crime and security (1)
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 

More from AdrianVANTOPINA

Chapter05-Control Structures.pptx
Chapter05-Control Structures.pptxChapter05-Control Structures.pptx
Chapter05-Control Structures.pptxAdrianVANTOPINA
 
Communicating-Digital-Content.pptx
Communicating-Digital-Content.pptxCommunicating-Digital-Content.pptx
Communicating-Digital-Content.pptxAdrianVANTOPINA
 
C++ programming Quiz t or f.pptx
C++ programming Quiz t or f.pptxC++ programming Quiz t or f.pptx
C++ programming Quiz t or f.pptxAdrianVANTOPINA
 
Introduction to Animation.ppt
Introduction to Animation.pptIntroduction to Animation.ppt
Introduction to Animation.pptAdrianVANTOPINA
 
Introduction to Animation.ppt
Introduction to Animation.pptIntroduction to Animation.ppt
Introduction to Animation.pptAdrianVANTOPINA
 
C programming Quiz t or f.pptx
C programming Quiz t or f.pptxC programming Quiz t or f.pptx
C programming Quiz t or f.pptxAdrianVANTOPINA
 
Intro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxIntro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxAdrianVANTOPINA
 
iterarative statements.pptx
iterarative statements.pptxiterarative statements.pptx
iterarative statements.pptxAdrianVANTOPINA
 
iterarative statements - Copy.pptx
iterarative statements - Copy.pptxiterarative statements - Copy.pptx
iterarative statements - Copy.pptxAdrianVANTOPINA
 
iterarative statements - Copy.pptx
iterarative statements - Copy.pptxiterarative statements - Copy.pptx
iterarative statements - Copy.pptxAdrianVANTOPINA
 

More from AdrianVANTOPINA (12)

Chapter05-Control Structures.pptx
Chapter05-Control Structures.pptxChapter05-Control Structures.pptx
Chapter05-Control Structures.pptx
 
Communicating-Digital-Content.pptx
Communicating-Digital-Content.pptxCommunicating-Digital-Content.pptx
Communicating-Digital-Content.pptx
 
programming.ppt
programming.pptprogramming.ppt
programming.ppt
 
MS Excel Quiz.pptx
MS Excel Quiz.pptxMS Excel Quiz.pptx
MS Excel Quiz.pptx
 
C++ programming Quiz t or f.pptx
C++ programming Quiz t or f.pptxC++ programming Quiz t or f.pptx
C++ programming Quiz t or f.pptx
 
Introduction to Animation.ppt
Introduction to Animation.pptIntroduction to Animation.ppt
Introduction to Animation.ppt
 
Introduction to Animation.ppt
Introduction to Animation.pptIntroduction to Animation.ppt
Introduction to Animation.ppt
 
C programming Quiz t or f.pptx
C programming Quiz t or f.pptxC programming Quiz t or f.pptx
C programming Quiz t or f.pptx
 
Intro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptxIntro to Computer Chapter 1.pptx
Intro to Computer Chapter 1.pptx
 
iterarative statements.pptx
iterarative statements.pptxiterarative statements.pptx
iterarative statements.pptx
 
iterarative statements - Copy.pptx
iterarative statements - Copy.pptxiterarative statements - Copy.pptx
iterarative statements - Copy.pptx
 
iterarative statements - Copy.pptx
iterarative statements - Copy.pptxiterarative statements - Copy.pptx
iterarative statements - Copy.pptx
 

Recently uploaded

Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Digital Security Risk.pptx

  • 1. Confidential Customized for Lorem Ipsum LLC Version 1.0 Digital Security Risk
  • 2. Confidential Customized for Lorem Ipsum LLC Version 1.0 Causes of Computer Damage Network attacks Interception Hardware Theft Software Theft Identity Theft System Failure Virus Attacks
  • 3. Digital Security Risk A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability which also include computer and cyber crimes.
  • 4. Internet and Network Attacks/Virus Attacks
  • 10. Cybercrime Categories for People that Perpetrate Cybercrimes
  • 11. Hacker 1 ● A computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem. ● While "hacker" can refer to any skilled computer programmer, the term has become associated in popular culture with a "security hacker", someone who, with their technical knowledge, uses bugs or exploits to break into computer systems.
  • 12. Cracker 2 ● someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs ; or in other ways intentionally breaches computer security.
  • 13. Script Kiddie 3 ● a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.
  • 14. Corporate Spy 4 ● is a form of espionage (spying, intelligence, surveillance) conducted for commercial purposes instead of purely national security.
  • 15. Unethical Employee 5 ● is one who illegally accesses their company network for numerous reasons. ● one could be the money they can get from selling top secret information, or some may be bitter and want revenge.
  • 16. Cyberextortionist 6 ● someone who uses email as an offensive force. ● they usually send a company a threatening email stating that they will release some confidential information, exploit a security leak, or launch an attack that will harm a company network ● they use blackmail to demand a certain amount of money in exchange for not launching an attack.
  • 17. Cyber Terrorist 7 ● someone who uses a computer network or the Internet to destroy computer systems for political reasons. ● it is similar to a terrorist attack because it requires highly skilled individuals, millions of dollars to implement and years of planning.
  • 18. An Open Thought: The Power of The Dark Web The Cesspool for Cyber Criminals Monitoring illicit traffic is getting harder. We are starting to see peer-to-peer technology taking over the dark web – which is far harder to track. If there's no central hub, then there's nowhere to start. The dark web is changing underneath us and it's certainly not going to stop any time soon. And this leads us to new and deadlier attacks in digital security -Sarah Jamie Lewis, Anonymity Researcher
  • 20. Malware Malware, short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices QUICK TIP Try right clicking on a photo and using "Replace Image" to show your own photo.
  • 21. Virus ● a type of malicious software that, when executed, replicates itself by modifying other computer programs and inserting its own code.
  • 22. Worm ● A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers ● Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.
  • 23. Trojan Horse ● One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
  • 24. Phishing ● Phishing is a cyber attack that uses disguised email as a weapon. ● The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment.
  • 25. Adware ● The term adware is frequently used to describe a form of malware (malicious software) which presents unwanted advertisements to the user of a computer. ● The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "unclosable window".
  • 26. The State of Cyber Security in the Philippines In the 3rd quarter of 2015, Kaspersky Lab reports the Philippines took the 33rd spot out of 233 countries prone to cybersecurity threats – a huge jump from the previous quarter’s 43rd rank.
  • 28. Botnet 1 ● A botnet is a group of compromised computers or mobile devices connected to a network ● can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send spam, and allows the attacker to access the device and its connection. –A compromised computer or device is known as a zombie
  • 29. 2 ● A denial of service attack (DoS attack) disrupts computer access to an Internet service ● In a DoS attack, the attacker usually sends excessive messages asking the network or server to authenticate requests that have invalid return addresses. ● DDoS attack DoS Attack
  • 30. 3 ● A back door is a program or set of instructions in a program that allow users to bypass security controls ● is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device Back Door
  • 31. 4 ● Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate ● in general, it is a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver Spoofing
  • 33. Assignment: What is a software/hardware that protects a network ‘s resources from intrusion? How do/does it work? - Prepare for a quiz next meeting