Implications of Misuse & Cyber Security discusses various forms of computer misuse including using stolen credit cards, financial fraud, and vulnerabilities in computer systems. It covers topics like cybersecurity, computer system vulnerabilities, threats like spyware, hackers and viruses. It also discusses countermeasures to prevent threats like strong passwords, firewalls, anti-virus software and keeping software updated. Distributed denial of service (DDoS) attacks are explained as attempts to overwhelm networks through large traffic volumes. Internal vulnerabilities include access control issues, malware, and vulnerability scanning. Computer misuse related to cyberbullying can psychologically impact individuals and negatively affect organizations.
Designated IT security experts in Europe and Asia have been interviewed by RadarServices, the European market leader for managed security services, with regards to future IT security trends and challenges. They shared their views concerning the development of cyber attacks and security technologies until 2025.
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
This presentation is designed to give an insight into cyber risk.
The importance of protecting your data has never been more significant. Every week the media features stories of companies suffering data breeches leading to financial difficulties and unhappy customers.
Designated IT security experts in Europe and Asia have been interviewed by RadarServices, the European market leader for managed security services, with regards to future IT security trends and challenges. They shared their views concerning the development of cyber attacks and security technologies until 2025.
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
This presentation is designed to give an insight into cyber risk.
The importance of protecting your data has never been more significant. Every week the media features stories of companies suffering data breeches leading to financial difficulties and unhappy customers.
This is a summary of what cyber crime is all about, the history of cyber crime; motivation behind cyber attack as well as the various techniques used in committing those crimes; Cybercrime groups starting to operate like the Mafia; how cyber crimes exploits Web2.0 opportunites and Top Computer Secuity Actions.
Learn about the different types of Phishing Attacks; like Content-Injection, and MiTM attack, that can target you and your organization.
To know more about phishing prevention, read our in-depth article "How to Prevent a Phishing Attack? 17 Easy Hacks for Administrators"
https://blog.syscloud.com/phishing-attack/
Infections cost organizations billions of dollars in lost time and productivity, as well as ransom payments and other indirect costs, like damage to a business’s reputation.
End-users will learn about password management, multi-factor authentication and how to secure their laptops and desktops while working remotely.
This session will teach professionals how to avoid becoming a statistic.
Agenda: Foundations of security awareness | Common threats | Three ways to secure your work environment | Best practices for users | The work from home checklist
Information Security Awareness for everyoneYasir Nafees
SAFE (which stands for Security Awareness For Everyone) is an information security awareness program designed to help organizations creating a well informed and risk-aware culture. SAFE focuses on learning to make it important for everyone to be fully informed and take responsibility to protect organization’s most important asset, “The Information”.
This is a summary of what cyber crime is all about, the history of cyber crime; motivation behind cyber attack as well as the various techniques used in committing those crimes; Cybercrime groups starting to operate like the Mafia; how cyber crimes exploits Web2.0 opportunites and Top Computer Secuity Actions.
Learn about the different types of Phishing Attacks; like Content-Injection, and MiTM attack, that can target you and your organization.
To know more about phishing prevention, read our in-depth article "How to Prevent a Phishing Attack? 17 Easy Hacks for Administrators"
https://blog.syscloud.com/phishing-attack/
Infections cost organizations billions of dollars in lost time and productivity, as well as ransom payments and other indirect costs, like damage to a business’s reputation.
End-users will learn about password management, multi-factor authentication and how to secure their laptops and desktops while working remotely.
This session will teach professionals how to avoid becoming a statistic.
Agenda: Foundations of security awareness | Common threats | Three ways to secure your work environment | Best practices for users | The work from home checklist
Information Security Awareness for everyoneYasir Nafees
SAFE (which stands for Security Awareness For Everyone) is an information security awareness program designed to help organizations creating a well informed and risk-aware culture. SAFE focuses on learning to make it important for everyone to be fully informed and take responsibility to protect organization’s most important asset, “The Information”.
Mitisol is the perfect solution for Cyber security and risk management, Cyber security and risk management, Cyber Security Company in Dhaka, Bangladesh.
We are the best instutute for Cyber security courses, Cyber Security Course Training, Advanced Cyber security courses in Dhaka, Bangladesh. So keep visiting our websites to get update on regular basis.
Best BCA colleges in Delhi NCR JIMS Vasant Kunj New Delhi.
cyber ethics is a part of curriculum of BCA 6TH Sem of BESTBCACOLLGE IN DELHI NCR.
JIMS Vasant KunjII is the Top institute for BCA. JIMS is one of the Best BCA Colleges in Delhi which offers best placements in Top IT Companies in Delhi NCR. It is amongst the top A+ Category highest ranked colleges in Delhi, provides 3 years Regular Degree from UGC Approved University
Cybersecurity is the practice of defending computers and servers, mobile devices, electronic systems, networks and data from malicious attacks.
Topic Covered:
Cyber Security Introduction
Online & Offline Identities
Hackers and their types
Cyberwarfare
Cyber Attacks Concepts & Techniques
System, Software & Hardware Vulnerabilities
Security Vulnerabilities Categories
The body of technologies, processes and practices designed to protect networks, devices, programs and data from attack, damage, or unauthorized access is referred to as cyber security. It is also known as information technology security. The practice is used by individuals and enterprises to protect against unauthorized access to data centers and other computerized systems.
Top 10 Cyber Security Threats and How to Prevent ThemChinmayee Behera
Modern business has been altered by growth of the Internet. Organizations are increasingly making news due to cyber security threats and how to prevent them. Organizations are increasingly making news due to cybersecurity breaches.Every year, these attacks cause damage to corporate networks, equipment, business processes, and data, costing companies billions of dollars in losses and missed opportunities. Today, firms must invest in deterrents to these cybersecurity dangers. Here are the top ten most common and costly cyber security threats today, as well as the actions a business may take to avoid them.
1.Phishing
Because it can be high-tech or low-tech, phishing is a widespread yet severe cyberthreat. Criminals act as genuine companies in these assaults to take advantage of victims’ trust, curiosity, greed, or charity. They send bogus emails in order to persuade their victims to submit sensitive information such as passwords, social security numbers, or bank account information.
Some of the most frequent phishing scam strategies used by hackers nowadays include:
Spear phishing is the use of personalized messaging to target certain organizations or individuals.
Pretexting is creating fictitious but realistic events in order to gain the target’s trust and obtain sensitive information.
Mortgage fraud entails defrauding individuals by using stolen identities or fabricated income and asset data.
Baiting is the use of enticing incentives or possible rewards to entice people to provide sensitive information.
Pharming is the practice of redirecting website users to bogus websites that seem authentic in order to collect sensitive personal information.
Whaling – Phishing assaults targeting an organization’s top leadership or high-profile workers, such as the Chief Executive Officer or Chief Financial Officer.
2.Malware
Malware is an abbreviation for harmful software. As the name implies, they are computer programs that are meant to harm a computer system, network, or device. Malware may take many forms, from innocuous bothersome pranksters to deadly and sophisticated programs that can leave a whole computer system inoperable.
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
In essence, computer security is the safeguarding of data and computer systems against loss, theft, and unauthorized access. It involves keeping an eye out for and stopping illegal use of your computer system.
A variety of computer security techniques are frequently employed to safeguard the critical data held by an organization cyber security.
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
In essence, computer security is the safeguarding of data and computer systems against loss, theft, and unauthorized access. It involves keeping an eye out for and stopping illegal use of your computer system.
A variety of computer security techniques are frequently employed to safeguard the critical data held by an organization cyber security.
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
IT security, hackers,IT security and risks and safe guards, password, how to create password, bio-metric authentication , virus , antivirus software ,how to safe a devices from virus.types of viruses
Type of Security Threats and its Preventionijsrd.com
Security is a branch of computer technology known as information security as applied to computers and networks. The objective of online security includes protection of information and property from theft, corruption, or threats attack, while allowing the information and property to remain accessible and productive to its intended users. The term online system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The basic aim of this article is to Prevention against unauthorized security Attack and Threats.
A Presentation On Basic Network Security And Viruses For College Level. Basics on Networking, Network Security, Virus, Spyware, Vulnerability, Hacking And Indian Laws To Prevent Hacking
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
Cyber security professionals are in high demand, and those willing to learn new skills to enter the area will have plenty of opportunities. Our goal is to present you with the most comprehensive selection of cybersecurity interview questions available.
Things to remember while upgrading the brakes of your carjennifermiller8137
Upgrading the brakes of your car? Keep these things in mind before doing so. Additionally, start using an OBD 2 GPS tracker so that you never miss a vehicle maintenance appointment. On top of this, a car GPS tracker will also let you master good driving habits that will let you increase the operational life of your car’s brakes.
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs AttentionBertini's German Motors
IBS monitors and manages your BMW’s battery performance. If it malfunctions, you will have to deal with an array of electrical issues in your vehicle. Recognize warning signs like dimming headlights, frequent battery replacements, and electrical malfunctions to address potential IBS issues promptly.
Why Is Your BMW X3 Hood Not Responding To Release CommandsDart Auto
Experiencing difficulty opening your BMW X3's hood? This guide explores potential issues like mechanical obstruction, hood release mechanism failure, electrical problems, and emergency release malfunctions. Troubleshooting tips include basic checks, clearing obstructions, applying pressure, and using the emergency release.
"Trans Failsafe Prog" on your BMW X5 indicates potential transmission issues requiring immediate action. This safety feature activates in response to abnormalities like low fluid levels, leaks, faulty sensors, electrical or mechanical failures, and overheating.
Symptoms like intermittent starting and key recognition errors signal potential problems with your Mercedes’ EIS. Use diagnostic steps like error code checks and spare key tests. Professional diagnosis and solutions like EIS replacement ensure safe driving. Consult a qualified technician for accurate diagnosis and repair.
Ever been troubled by the blinking sign and didn’t know what to do?
Here’s a handy guide to dashboard symbols so that you’ll never be confused again!
Save them for later and save the trouble!
Core technology of Hyundai Motor Group's EV platform 'E-GMP'Hyundai Motor Group
What’s the force behind Hyundai Motor Group's EV performance and quality?
Maximized driving performance and quick charging time through high-density battery pack and fast charging technology and applicable to various vehicle types!
Discover more about Hyundai Motor Group’s EV platform ‘E-GMP’!
𝘼𝙣𝙩𝙞𝙦𝙪𝙚 𝙋𝙡𝙖𝙨𝙩𝙞𝙘 𝙏𝙧𝙖𝙙𝙚𝙧𝙨 𝙞𝙨 𝙫𝙚𝙧𝙮 𝙛𝙖𝙢𝙤𝙪𝙨 𝙛𝙤𝙧 𝙢𝙖𝙣𝙪𝙛𝙖𝙘𝙩𝙪𝙧𝙞𝙣𝙜 𝙩𝙝𝙚𝙞𝙧 𝙥𝙧𝙤𝙙𝙪𝙘𝙩𝙨. 𝙒𝙚 𝙝𝙖𝙫𝙚 𝙖𝙡𝙡 𝙩𝙝𝙚 𝙥𝙡𝙖𝙨𝙩𝙞𝙘 𝙜𝙧𝙖𝙣𝙪𝙡𝙚𝙨 𝙪𝙨𝙚𝙙 𝙞𝙣 𝙖𝙪𝙩𝙤𝙢𝙤𝙩𝙞𝙫𝙚 𝙖𝙣𝙙 𝙖𝙪𝙩𝙤 𝙥𝙖𝙧𝙩𝙨 𝙖𝙣𝙙 𝙖𝙡𝙡 𝙩𝙝𝙚 𝙛𝙖𝙢𝙤𝙪𝙨 𝙘𝙤𝙢𝙥𝙖𝙣𝙞𝙚𝙨 𝙗𝙪𝙮 𝙩𝙝𝙚 𝙜𝙧𝙖𝙣𝙪𝙡𝙚𝙨 𝙛𝙧𝙤𝙢 𝙪𝙨.
Over the 10 years, we have gained a strong foothold in the market due to our range's high quality, competitive prices, and time-lined delivery schedules.
Fleet management these days is next to impossible without connected vehicle solutions. Why? Well, fleet trackers and accompanying connected vehicle management solutions tend to offer quite a few hard-to-ignore benefits to fleet managers and businesses alike. Let’s check them out!
In this presentation, we have discussed a very important feature of BMW X5 cars… the Comfort Access. Things that can significantly limit its functionality. And things that you can try to restore the functionality of such a convenient feature of your vehicle.
What Exactly Is The Common Rail Direct Injection System & How Does It WorkMotor Cars International
Learn about Common Rail Direct Injection (CRDi) - the revolutionary technology that has made diesel engines more efficient. Explore its workings, advantages like enhanced fuel efficiency and increased power output, along with drawbacks such as complexity and higher initial cost. Compare CRDi with traditional diesel engines and discover why it's the preferred choice for modern engines.
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...Autohaus Service and Sales
Learn what "PARKTRONIC Inoperative, See Owner's Manual" means for your Mercedes-Benz. This message indicates a malfunction in the parking assistance system, potentially due to sensor issues or electrical faults. Prompt attention is crucial to ensure safety and functionality. Follow steps outlined for diagnosis and repair in the owner's manual.
Comprehensive program for Agricultural Finance, the Automotive Sector, and Empowerment . We will define the full scope and provide a detailed two-week plan for identifying strategic partners in each area within Limpopo, including target areas.:
1. Agricultural : Supporting Primary and Secondary Agriculture
• Scope: Provide support solutions to enhance agricultural productivity and sustainability.
• Target Areas: Polokwane, Tzaneen, Thohoyandou, Makhado, and Giyani.
2. Automotive Sector: Partnerships with Mechanics and Panel Beater Shops
• Scope: Develop collaborations with automotive service providers to improve service quality and business operations.
• Target Areas: Polokwane, Lephalale, Mokopane, Phalaborwa, and Bela-Bela.
3. Empowerment : Focusing on Women Empowerment
• Scope: Provide business support support and training to women-owned businesses, promoting economic inclusion.
• Target Areas: Polokwane, Thohoyandou, Musina, Burgersfort, and Louis Trichardt.
We will also prioritize Industrial Economic Zone areas and their priorities.
Sign up on https://profilesmes.online/welcome/
To be eligible:
1. You must have a registered business and operate in Limpopo
2. Generate revenue
3. Sectors : Agriculture ( primary and secondary) and Automative
Women and Youth are encouraged to apply even if you don't fall in those sectors.
2. Computer Misuse
This topic includes misuse of
stolen or fictional credit card
numbers to obtain goods or
services on the internet, and
use of computers in financial
frauds. Cybersecurity
Cyber security is the application of
technologies, processes and controls to protect
systems, networks, programs, devices and data
from cyber attacks. It aims to reduce the risk of
cyber attacks and protect against the
unauthorised exploitation of systems, networks
and technologies.
4. Computer Vulnerability
A computer system has several points of vulnerability; these include its hardware, software, data
communications, and personnel. Computer security refers to the protection of hardware and software
resources against their accidental or deliberate damage, theft, or corruption(in the case of software).
Data security is the protection of data against intentional or accidental damage
The importance of the security of computer systems and their data cannot be overstated.
Organizations spend very considerable amounts of time and money trying to make sure that their
information systems are secure against various hazards, both natural and man-made.
Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack.
A vulnerability may also refer to any type of weakness in a computer system itself, in a set of
procedures, or in anything that leaves information security exposed to a threat.
Computer users and network personnels can protect computer systems from vulnerabilities by
keeping software security patches up to date. These patches can remedy flaws or security holes that
were found in the initial release. Computer and network personnel should also stay informed about
current vulnerabilities in the software they use and seek out ways to protect against them.
5. Threats
What are Threats?
In computer security, a threat is a potential negative
action or event facilitated by a vulnerability that results
in an unwanted impact to a computer system or
application. In simpler terms, a computer threat refers
to a term that speaks to or speaks about a computer
system being compromised. These threats can lead to
lost or edited data being stolen or even cyber-attacks.
6. Type of Threats
Spyware
A spyware threat is any program that monitors
your online activities or installs programs
without your consent or knowledge to capture
personalised information. This personalised
information can be downloaded from email
messages, instant messages and web sites.
Spyware, as the word suggests, “spy”, is aimed
so that it remains entirely discreet to the user. It
is actively hidden away or is simply not
recognisable by the user.
7. Hackers
Hackers are programmers who exploit
others for their own selfish and malicious
intents by breaking into computer systems
to steal, destroy or change information as a
form of cyber-terrorism. They can
compromise your credit card information,
steal your identity and lock you out of your
data.
8. Viruses
A computer virus is a written program
that alters the way a computer operates
without the permission or knowledge of
the user. The virus replicates and
executes itself, usually doing damage to
your computer in the process like
corrupting files and stealing
passwords.
9. ★ Anti-Spyware
★ Firewalls
★ Strong Passwords
★ Anti-Virus
★ Plug Information
Leaks
How to Prevent/ Avoid These Threats
10. Anti-spyware
Anti-spyware software detects and prevents any unwanted spyware program installations that are
in your computer system. It can act much like an antivirus program by providing real-time
protection and preventing spyware from being downloaded in the first place.
Firewalls
Firewalls enforce rules about what data packets will be allowed to enter or leave a network.
Firewalls are incorporated into a wide variety of networked devices to filter traffic and lower the
security risks from malicious packets travelling over the public internet.
Strong Passwords
Password cracking technology is quite advanced, and passwords that are easy to guess are
potential security risks. Simply making sure employees are using passwords that are sufficient
length and a mix of character types and numbers can be a huge detractor for hackers.
11. Anti-Virus
Antivirus software was originally designed to detect and remove viruses from computers, but also
protect against other types of malicious software, such as keyloggers, browser hijackers, Trojan
horses, worms, rootkits spyware, adware and botnets.
Plug Information Leaks
Sensitive information can flow out of your organisation through emails, printed copies, instant
messaging or by people simply talking about things they should keep to themselves, but
technology can help. Starting with the intrusion detection system (IDS). Scan your business plan
for unique phrases that you wouldn't expect to find anywhere else and configure your IDS to alert
you whenever it sees these telltale snippets on the network. Installing email firewalls can scan the
full text of all outgoing emails and alert the user if anything suspicious is found.
12. What is an attack?
An attack or cyber attack is any attempt to gain unauthorized access to a computer, computing
system or computer network with the intent to cause damage. Cyber attacks aim to disable,
disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the
data held within these systems. These attacks can be launched from anywhere by any
individual or group using one or more various attack strategies. People who carry out cyber
attacks are generally regarded as cybercriminals or who are also popularly known as hackers,
they include individuals who act alone, drawing on their computer skills to design and
execute malicious attacks. They can also belong to a criminal syndicate, working with other
threat actors to find weaknesses or problems in the computer systems called vulnerabilities
that can be exploited for criminal gain. Government-sponsored groups of computer experts
also launch cyber attacks. They're identified as nation-state attackers, and they have been
accused of attacking the information technology (IT) infrastructure of other governments, as
well as non government entities, such as businesses, nonprofits and utilities.
Attack
13. Why do cyber attacks happen?
Cyber attacks are designed to cause damage. They can have
various objectives, including the following:
➢ Financial gain
Most cyber attacks today, especially those against
commercial entities, are launched by cybercriminals
for financial gain. These attacks often aim to steal
sensitive data, such as customer credit card numbers or
employee personal information, which the
cybercriminals then use to access money or goods
using the victims' identities. Still other attacks aim to
gain valuable corporate data, such as proprietary
information; these types of cyber attacks are a modern,
computerized form of corporate espionage.
14. ➢ Disruption and revenge
Some hackers also launch attacks specifically to sow chaos, confusion, discontent, frustration
or mistrust. They could be taking such action as a way to get revenge for acts taken against
them. They could be aiming to publicly embarrass the attacked entities or to damage the
organizations' reputation. These attacks are often directed at government entities but can also
hit commercial entities or nonprofit organizations.
➢ Cyberwarfare
Governments around the world are also involved in cyber attacks, with many national
governments acknowledging or suspected of designing and executing attacks against other
countries as part of ongoing political, economic and social disputes. These types of attacks
are classified as cyberwarfare.
15. How can you prevent a cyber attack?
There is no guaranteed way for any organization to prevent
a cyber attack, but there are numerous cybersecurity best
practices that organizations can follow to reduce the risk.
Reducing the risk of a cyber attack relies on using a
combination of skilled security professionals, processes and
technology.
Reducing risk also involves three broad categories of
defensive action:
1. preventing attempted attacks from actually entering
the organization's IT systems;
2. detecting intrusions; and
3. disrupting attacks already in motion -- ideally, at the
earliest possible time.
16. Best practices include the following:
● implementing perimeter defenses, such as firewalls, to help block attack
attempts and to block access to known malicious domains;
● using software to protect against malware, namely antivirus software,
thereby adding another layer of protection against cyber attacks;
● having a patch management program to address known software
vulnerabilities that could be exploited by hackers;
● setting appropriate security configurations, password policies and user
access controls;
● maintaining a monitoring and detection program to identify and alert to
suspicious activity;
● creating incident response plans to guide reaction to a breach; and
● training and educating individual users about attack scenarios and how
they as individuals have a role to play in protecting the organization.
17. Countermeasure
What is
Countermeasure?
In computer and cyber security a
countermeasure can be defined as an
action, device or technique that reduces a
threat, vulnerability, or an attack by
eliminating it or by minimizing the
damage it may cause.
18. Why do we need Countermeasures?
A countermeasure is an action, process, device, or system that can prevent, or mitigate the effects
of, threats to a computer, server or network. In this context, a threat is a potential or actual adverse
event that may be malicious or incidental, and that can compromise the assets of an enterprise or
the integrity of a computer or network.
Countermeasures can take the form of software, hardware and modes of behavior. Software
countermeasures include:
● personal firewalls
● application firewalls
● anti-virus software
● pop-up blockers
● spyware detection/removal programs.
19. The most common hardware
countermeasure is a router that can prevent
the IP address of an individual computer
from being directly visible on the Internet.
Other hardware countermeasures include:
● biometric authentication systems
● physical restriction of access to
computers and peripherals
● intrusion detectors
● alarms
20. What are the Categories of a Countermeasure?
These countermeasures can be classified into three groups. These are:
❖ Cryptography methods- (Cryptography is associated with the process of converting ordinary
plain text into unintelligible text and vice-versa. It is a method of storing and transmitting
data in a particular form so that only those for whom it is intended can read and process it.)
❖ Human factors- (The 'human factor' has been recognized as the weakest link in creating safe
and secure digital environments though, human intuition may also be the solution to
thwarting many cyber threats. Every software or security monitoring system requires human
interpretation of alerts.)
❖ Detection Methods- (Threat detection is the practice of analyzing the entirety of a security
ecosystem to identify any malicious activity that could compromise the network. If a threat is
detected, then mitigation efforts must be enacted to properly neutralize the threat before it
can exploit any present vulnerabilities.)
21. External Computer Vulnerability Sources
★ Password Attack
What are Password Attacks? A password attack
refers to any of the various methods used to
maliciously authenticate into
password-protected accounts. These attacks
are typically facilitated through the use of
software that expedites cracking or guessing
passwords.
22. ➢ Brute Force Attack. A brute force
attack is a hacking method that uses
trial and error to crack passwords,
login credentials, and encryption keys.
It is a simple yet reliable tactic for
gaining unauthorized access to
individual accounts and organizations'
systems and networks.
Different types of Password attacks
➢ Dictionary Attack. A dictionary attack is a
method of breaking into a
password-protected computer, network or
other IT resource by systematically entering
every word in a dictionary as a password. A
dictionary attack can also be used in an
attempt to find the key necessary to decrypt
an encrypted message or document.
23. ➢ Keyloggers
Keyloggers are activity-monitoring software
programs that give hackers access to your
personal data. The passwords and credit
card numbers you type, the web pages you
visit – all by logging your keyboard strokes.
The software is installed on your computer,
and records everything you type.
➢ Man- In-The-Middle Attack.
A man in the middle (MITM) attack is a
general term for when a perpetrator positions
himself in a conversation between a user and
an application—either to eavesdrop or to
impersonate one of the parties, making it
appear as if a normal exchange of information
is underway.
24. A DDoS attack happens when a network or system becomes overwhelmed
and it cannot respond to service requests. A DDoS attack happens when a
massive number of machines are directed to bombard the target with traffic.
These machines are typically infected with viruses controlled by one over all
attacker.
While DDoS offer a less complicated attack mode than other forms of cyber
attacks, they are growing stronger and more sophisticated. There are three
basic categories of attack:
● Volume-based attacks, which use high traffic to inundate the
network bandwidth
● Protocol attacks, which focus on exploiting server resources
● Application attacks, which focus on web applications and are
considered the most sophisticated and serious type of attacks
★ (DDoS)
Distributed
denial-of-s
ervice
attacks
25. How DDos perform?
A distributed denial-of-service (DDoS) attack occurs when multiple
machines are operating together to attack one target. DDoS attackers often
leverage the use of a botnet, a group of hijacked internet-connected devices to
carry out large scale attacks.
Most popular types of DDoS attacks:
● SYN Flood
● Smurf Attack
● Fraggle Attack
● Slowloris
● Application Level Attack
26. ★ File protocol
The File Transfer Protocol (FTP) is a standard communication protocol used for the
transfer of computer files from a server to a client on a computer network. FTP is built on a
client–server model architecture using separate control and data connections between the
client and the server. FTP users may authenticate themselves with a clear-text sign-in
protocol, normally in the form of a username and password, but can connect anonymously
if the server is configured to allow it. For secure transmission that protects the username
and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or
replaced with SSH File Transfer Protocol (SFTP).
27. Internal Vulnerability Source
★ Access Control Issues/Information Leakage
What is Access Control Issues? Access control enforces policy such that users cannot act outside of their
intended permissions. Failures typically lead to unauthorized information disclosure, modification or destruction
of all data, or performing a business function outside of the limits of the user.
What are some causes? The majority of access control problems stem from outdated equipment, keycards
falling into the wrong hands, and a lack of integration with other building systems. To some degree, all
three issues might be causing problems.
How can this problem be improved?
1. Evaluate Your Access Control System Features.
2. Determine Your Access Levels.
3. Audit Who Has Access.
4. Update Your Technology.
5. Perform Periodic Access Control Systems Testing.
6. No Tailgating Allowed.
28. ★ Malware/Malicious cyber attacks
Malware, or malicious software is any program or file that is intentionally designed to cause
disruption to a computer, server, client, computer network, leak private information, gain
unauthorized access to information or systems, deprive users access to information or which
unknowingly interferes with the user's computer security and privacy.
Types of malware includes:
● Computer Viruses
● Worms
● Trojan Horses
● Ransomware
● Spyware
These malicious programs steal, encrypt and delete sensitive data; alter or hijack core computing
functions and monitor end users computer activity.
29. ★ Scan
An internal vulnerability scan is performed
typically with access to the internal network,
with the main benefit of identifying at-risk
systems while providing insight for patch
management processes. An external scan is
performed outside of a network and targets
specific IP addresses to identify vulnerabilities.
An external scan can also detect open ports and
protocols, similar to an external penetration test.
Both application and network scans not only
detect vulnerabilities but may check for
compliance against several different baselines.
30. What does malware do?
Malware can infect networks and devices and is designed to harm those devices,
networks and/or their users in some way.
Depending on the type of malware and its goal, this harm may present itself
differently to the user or endpoint. In some cases, the effect malware has is
relatively mild and benign, and in others, it can be disastrous.
No matter the method, all types of malware are designed to exploit devices at the
expense of the user and to the benefit of the hacker, the person who has designed
and/or deployed the malware.
31. The Impact of computer misuse relating to cyber
bullying on an individual
Cyberbullying, also known as online bullying, is a form of bullying or harassment using
electronic means which also is computer abuse. Cyber-bullying, hacking, identity theft, and even
using a work PC for personal business are all examples of computer abuse. An incident that many
people might not think of as computer abuse is creating a fake social media account. If the social
media service’s terms and conditions require users to provide accurate information about their
identities when creating an account, they could be prosecuted under the CFAA. This outcome is
unlikely unless an individual uses a fake account for malicious purposes, such as cyberbullying,
but it is a possibility—and that possibility of being prosecuted for something as minor as the mere
creation of a fake account is a major problem with the CFAA. Attorneys have been able to exploit
the law’s weaknesses to defend clients who should perhaps have been punished, and prosecutors
have been able to exploit the law to obtain convictions for minor incidents. Cyberbullying can
impact an individual as it may bring about psychological problems. Some of these problems may
include depression, self harm, low self esteem, school phobias and social anxiety.
32. The Impact of computer misuse relating to
cyberbullying in an organisation
Most people consider cyberbullying a teenage issue. Regretfully, the workplace is not immune to
cyberbullying as the problem has expanded to adults. Cyberbullying at work, just like ordinary workplace
bullying, can cause worker anxiety, stress and reduced productivity. Cyberbullying is like traditional
workplace bullying and harassment, but involving electronic devices and online communications. Examples
include, but are not limited to, text messages, tweets, malicious or threatening emails or social media posts.
Workplace Bullying refers to repeated, unreasonable actions of individuals (or a group) directed towards an
employee (or a group of employees), intended to intimidate, degrade, humiliate, undermine or create a risk to
the health or safety of the employee(s) including physical and emotional stress. Bullying behavior creates
feelings of defenselessness and discomfort in the target. Workplace Bullying may involve abuse or misuse of
power. Bullying is different from aggression. Aggression may involve a single act, but bullying involves an
ongoing pattern of behavior against the target. “Demanding” bosses are not necessarily bullies if they are
respectful, fair and their primary motivation is better employee performance through setting
high-yet-reasonable workplace expectations.Usually, it involves offensive emails or text messages containing
jokes or inappropriate wording towards a specific individual race, gender, nationality, or sexual preference.
The words have a direct effect on the bullying target. Another example is an intended personal email response
forwarded without permission for the whole office to see.
33. Mitigate Cyber-bullying
Why is Prevention Important?
Cyberbullying is deliberately and repeatedly inflicting harm using electronic devices, gaming apps, and online
social media platforms. It often starts as hate accounts, hurtful posts, rumors and gossip, and may even
manifest because of mean comments said when gaming. The purpose of cyberbullying is to embarrass, hurt,
humiliate and threaten the victim. This may cause the victim to feel depressed, lonely, social anxiety and even
make the feel suicidal. However, there are some ways to combat the effects of cyberbullying.
Don’t Engage
A survey conducted in 2018 of children’s online behavior shows that 60% of children that are on social media
have witnessed some form of bullying, and for various reasons, most children ignored the behavior altogether.
In order to fight against this common occurrence, a mix of acknowledgement and avoidance is recommended.
Those observing the attacks must be willing to report problems to friends, family members or teachers. While
those being bullied are often better off ignoring the attacks rather than responding. The goal of the perpetrator
is to goad the victim into anger, which in effect may ‘get to’ the target and make them acknowledge the
malicious claims. The best option for the victim is to block the perpetrator(s) social media and email accounts
altogether.
34. Mitigate
Cyber-bullying
Teach students it’s okay to report abuse
Students need to know that they should report abuse.
Every student should be encouraged to report instances
or evidence of cyberbullying to a teacher, counselor, or
any other staff member. Set up an anonymous reporting
system so that youth can inform school officials of a
problem without fear of repercussion. Organizations
such as Safe2Tell, allow students to report incidents
anonymously. Knowing there is a way to report cases
may also stop students from engaging in the behavior