The slide describes the cybersecurity terms at a personal level, threats, and how best any worker with or without I.T knowledge can protect their online privacy over the internet.
https://tmwanje.blogspot.com
2. WHAT IS CYBER SECURITY?
also known as INFORMATION TECHNOLOGY SECURITY /
ELECTRONIC INFORMATION SECURITY
Cyber security is the practice of defending
computers, servers, mobile devices,
electronic systems, networks, and data from
malicious attacks. It aims to reduce the risk
of cyber attacks and protect against the
unauthorized exploitation of systems,
networks, and technologies.
Defending / protecting your online personality
3. COMMON TYPES OF CYBER ATTACKS
MALWARE short for “malicious software”; ware >product
Adware: Advertising software which can be used to spread
malware.
Virus: A self-replicating program that attaches itself to
clean files and spreads throughout the computer files
without the knowledge of a user , infecting files with
malicious code. “From nowhere your PC blacks out or fails
to operate.”
Spyware: A program that secretly records what a user does,
so that cybercriminals can make use of this information. For
example, spyware could capture credit card details.
Ransomware: Malware which locks down a user’s files and
4. COMMON TYPES OF CYBER ATTACKS
PHISHING / SCAM/ JUNK: where someone (criminal) using internet services or
software to take advantage of victims, typically for financial gain or revealing
their personal information (for example, passwords, phone numbers, or social
security numbers).
SOCIAL MEDIA ATTACKS: Social media can give attackers a platform to
impersonate trusted people and brands or the information they need carry out
additional attacks, including social engineering and phishing
SOCIAL ENGINEERING ATTACKS: attackers uses psychological manipulation to
trick users into making security mistakes or giving away sensitive information
PASSWORD CRACKING ATTACKS: involves hackers attempting to crack or
determine a password.
PHONE HACKING … SIM JACKING
5.
6. IMPACTS OF CYBER CRIMES:
THIS STARTS FROM AN INDIVIDUAL, BUT AFFECTS THE ENTIRE
ORGANIZATION – or your Circle / connections .
COSTS for retrieving lost data., purchasing new device..
Loss of identity to a hacker,
Financial stress due to a hacker getting loans with your cards.
Miscommunications with your circle due to a middle man
intercepting your data transfer.
WHAT ARE WE FIGHTING AGAINST ?
> CYBER CRIMINALS
Cyber crime is any criminal act dealing with computers and
networks.
7. GOALS OF CYBER SECURITY
• To protect information from being
stolen, compromised or attacked.
• Protect the confidentiality of
data.
• Preserve the integrity of data.
• Promote the availability of data
for authorized users.
• Maintaining safe and stable organizational operations
8. SECURITY TIPS TO PROTECT YOUR
INFORMATION
INDIVIDUAL-ORGANIZATIONAL LEVEL:
• Regular update of software and operating systems:
• Use anti-virus software.
• Use strong passwords > passphrases (Protect Document on Microsoft, doc/excel, BitLocker on
drive /files lock) change passwords periodically .
• Do not open email attachments from unknown senders / always confirm the sender.
• Do not click on links in emails from unknown senders or unfamiliar websites / confirm the URL.
• Avoid using unsecure Wi-Fi networks in public places. -- VPN
• Raise awareness among staff.
• Use VPN
• Turn on your firewalls.
• Always back up files.
• Inquire from a colleague they might have been victims and can help or suspect danger. Eg sim
jacking.