Module 5-6
Module 5-6
Module 5-6
Denial-Of-Service Attacks
Also called distributed denial-of-service (DDoS) attack
It consists of making repeated requests of a computer system or network, thereby overloading it and
denying legitimate users access to it.
may come from a single computer or from hundreds or thousands of computers that have been taken
over by those intending harm.
Worms
a program that copies itself repeatedly into a computer’s memory or onto a disk drive.
Sometimes it will copy itself so often it will cause a computer to crash.
In 2008–2009, a worm known as Conficker or Downadup, spread through a Microsoft Windows
vulnerability that allowed guessing of network passwords and by people hand-carrying such gadgets as
USB keys, infected millions of computers.
Viruses
is a “deviant” program, stored on a computer floppy disk, hard drive, or CD, that can cause unexpected
and often undesirable effects, such as destroying or corrupting data.
The famous email Love Bug (I LOVE YOU), which originated in the Philippines in May 2000 was both a
worm and a virus, spreading faster and causing more damage than any other bug before it.
A virus called Koobface attacked Facebook.
Trojan Horses
is a program that pretends to be a useful program, usually free, such as a game or screen saver, but
carries viruses, or destructive instructions, that perpetrate mischief without your knowledge.
It may allow so-called backdoor programs to be installed.
A backdoor program is an illegal program that allows illegitimate users to take control of your computer
without your knowledge.
CYBERINTRUDERS
Internet Trolls
An internet troll is someone who makes intentionally inflammatory, rude, or upsetting statements online to
elicit strong emotional responses in people or to steer the conversation off-topic.
Cyber spies
Cyber espionage, or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access
sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political
1
reasons.
Hackers
as computer enthusiasts, people who enjoy learning programming languages and computer systems
as people who gain unauthorized access to computers or networks, often just for the challenge of it.
Thrill-seeker hackers: Thrill-seeker hackers are hackers who illegally access computer systems simply for
the challenge of it. Although they penetrate computers and networks illegally, they don’t do any damage or steal
anything; their reward is the achievement of breaking in.
White-hat hackers. White-hat hackers are usually computer professionals who break into
computer systems and networks with the knowledge of their owners to expose security flaws that
can then be fixed. The “white hat” refers to the hero in old Western movies. Kevin Mitnik, a tech
security consultant.
Cyber Thieves
A cyber thief (known as cybercriminal) is a person who uses his skills in technology to do malicious acts and
illegal activities known as cybercrimes.
Cyberthieves and cybercriminals are widely available in what is called the “Dark Web” where they mostly
provide their illegal services or products.
Online Safety: Antivirus Software, Firewalls, Passwords, Biometric Authentication, & Encryption
ANTIVIRUS SOFTWARE
Antivirus software scans a computer’s hard disk, CDs, and main memory to detect viruses and, sometimes,
to destroy them. Such virus watchdogs operate in two ways. First, they scan disk drives for “signatures,”
characteristic strings of 1s and 0s in the virus that uniquely identify it. Second, they look for suspicious virus like
behavior, such as attempts to erase or change areas on your disks. Examples of antivirus programs are McAfee
VirusScan, Norton AntiVirus, Pc-cillin Internet Security, Avast!, and ZoneAlarm with Antivirus. Others worth
considering are CA Internet Security Suite Plus, Panda Antivirus Platinum, and McAfee Virex for Macs.
FIREWALLS
A firewall is a system of hardware and/or software that protects a computer or a network from intruders. The
firewall software monitors all internet and other network activity, looking for suspicious data and preventing
unauthorized access. Always-on internet connections such as cable modem, satellite, and DSL, as well as
some wireless devices, are particularly susceptible to unauthorized intrusion.
PASSWORDS
Password is the special words, codes, or symbols required to access a computer system. Protecting your
internet access accounts and files with a password isn’t enough. Passwords (and PINs, too) can be guessed,
forgotten, or stolen.
BIOMETRIC AUTHENTICATION
Some forms of identification can’t be easily faked—such as your physical traits.
Biometric authentication devices authenticate a person’s identity by comparing his or her physical or
behavioral characteristics with digital code stored in a computer system.
There are several kinds of devices for verifying physical or behavioral characteristics that can be used to
authenticate a person’s identity.
• Hand-geometry systems: Also known as full-hand palm scanners, these are devices to verify a person’s
identity by scanning the entire hand, which, for each person, is as unique as a fingerprint and changes little over
time.
• Fingerprint scanners: These range from optical readers, in which you place a finger over a window, to
swipe readers, such as those built into laptops and some handhelds, which allow you to run your finger across a
bar-like sensor. Microsoft offers optical fingerprint readers to go with Windows XP/Vista.
• Iris-recognition systems: Because no two people’s eyes are alike, iris scans are very reliable identifiers. In
Europe, some airports are using iris-scanning systems as a way of speeding up immigration controls.
• Face-recognition systems: The technology, which compares a live face image with a digitized image stored
2
in a computer, is even used now as a security system for some notebook computers.
• Voice-recognition systems: These systems compare a person’s voice with digitized voice prints stored in a
computer, which the individual has previously “trained” to recognize his or her speech patterns
ENCRYPTION
Encryption is the process of altering readable data into unreadable form to prevent unauthorized access.
Encryption is able to use powerful mathematical concepts to create coded messages that are difficult or even
virtually impossible to break.
There are two basic forms of encryption— private key and public key:
• Private key: Private-key (symmetric) encryption means that the same secret key is used by both sender and
receiver to encrypt and decrypt a message. The encryption system DES (for “Data Encryption Standard”) was
adopted as a federal standard for private-key encryption in 1976.
• Public key: Public-key encryption means that two keys are used—a public key, which the receiver has made
known beforehand to the sender, who uses it to encrypt the message, and a private key, which only the receiver
knows and which is required to decrypt the message.
SHORT SUMMARY:
• Malware (malicious software) is a program or code that is designated to infiltrate a system and execute
malicious operations and controls. Computer viruses, worms, and Trojan horses are classified as malware.
• Cyber-attacks include DoS attack, viruses, works and Trojan horses.
• Internet trolls, cyber spies, hackers and cyber thieves are examples of cyber intruders.
• For online safety of all antivirus software, strong passwords, biometrics and encryption can be applied
to prevent malware.
MODULE 5
MICROSOFT EXCEL
Microsoft Excel
is an example of a spreadsheet program.
A spreadsheet is used to perform mathematical calculations and financial decision- making and you can
process, summarize, sort, extract, analyze, and store information using a spreadsheet.
Microsoft Excel
is a powerful electronic spreadsheet program you can use to automate accounting work, organize data, and
perform a wide variety of tasks
designed to perform calculations, analyze information, and visualize data in a spreadsheet. Also, this application
includes database and charting features.
Workbook
Another name for an Excel document
consists of a number of sheets, called worksheets.
The default number of worksheets visible when you open Excel is 1 (Sheet1). You can add a new sheet at any time
or set the default option to display more sheets upon opening each workbook.
A sheet is similar to a page in a book.
A workbook consists of a collection of worksheets.
Another name for a worksheet is a spreadsheet.
Wrapping text
Data can appear on multiple lines within a single cell.
Text wrapping is set using more than one method.
Use the Wrap Text icon on the Home tab, the Format Cells dialog box, or by inserting a line break manually.
Using a line break to wrap text manually gives the user more control over where the text should wrap:
1. Click on an empty cell on the worksheet, and then type the text Safest Solutions into the cell.
2. Directly after the typed words, press Alt + Enter on the keyboard, which will insert the line break
and move the cursor down to the next line in the cell.
3. Type the word Group.
4. Press Enter on your keyboard to accept the text or click on another cell to exit.
5. To use the ribbon to wrap text, click on the Home tab, and then locate the Alignment
group.
6. Click on the Wrap Text icon, and the text is wrapped.
Merging cells
Merging cells means combining a number of cells.
The Excel merge tool is often used to combine and center the contents of cells across parts of the
worksheet.
It is not possible to split cells in Excel, but you are able to merge two cells above two columns to
make it appear as if the cells were split.
Hiding and showing rows and columns
You have the option to hide columns and rows should you wish to print your worksheet without them
showing, or if another person needs to view the workbook and you do not want them to see a particular
column of data.
To select a column or row, simply click on the column letter or row number. To select multiple columns and
rows, hold down the mouse and keep it depressed until all the columns or rows have been highlighted.
Create Formula You can create any type of math calculation on your own using the following mathematical
operators:
The numeric keypad on the right side of the keyboard provides most of these operators.
Excel follows the mathematical order of hierarchy where operators are processed in the order:
- negation
- Exponentiation
- multiplication/division
- addition/subtraction.
Use parentheses to clarify the order of calculation in a formula.
5
3. Type the cell address or click the cell that contains the first number.
4. Type the math operator (+ - / * ^).
5. Type the cell address or click the cell that contains the second number.
6. Continue in this manner until the formula is complete.
7. Use parenthesis for clarification.
8. Press the Enter key.
AutoSum
Adding is the most common math operation performed in Excel. T
The Home ribbon includes an AutoSum button for adding.
This button provides a shortcut to typing formulas.
Formula Functions
Functions provide an automated method for creating formulas
Excel contains more than 200 functions.
For example, specific functions are available to calculate a sum, an average, a loan payment, logarithms and
random numbers.
Functions can be typed, if you know the syntax, or can be inserted by clicking on the Function button located
left of the formula bar.
All functions are formatted in a similar manner
The parameters vary depending upon the function.
Functions and cell addresses may be typed in upper case or lower case.
Sum
Adding is the most common function performed in Excel.
The SUM function adds values. Specify values, individual cell addresses, and/or range addresses in the
number x variables.
Syntax =SUM(number1,number2,...)
Average
An average sum all values and divides by the total number of values.
Specify values, individual cell addresses and/or range addresses in the numbers variables.
syntax =AVERAGE(number1,number2,...)
Maximum (MAX)
Maximum indicates the largest value in the designated list of numbers.
syntax =MAX (number1, number2,...)
Minimum (MIN)
Minimum indicates the smallest value in the designated list of numbers.
syntax =MIN(number1,number2,...)
Payment (PMT)
Payment returns the periodic payment of an annuity based on constant payments and a constant interest
rate.
syntax =PMT(rate,nper,pv)
When using interest rates, the rate may need to be converted to a percentage and divided by 12 (assuming an
annual percentage rate).
CREATE CHARTS
Charts
Microsoft Excel can display data graphically in a chart.
Presenting data in a chart can make it easier to read and more interesting to interpret.
Charts can also help you evaluate your data and make comparisons between different values.
A. Enter Data
The following exercise will create a simple spreadsheet that will provide the data from which a chart will be created.
- Type the information in the cells
B. Create a Chart
C. Chart Tools
Microsoft Excel provides many editing options for your chart. When your chart is selected, the Chart Tools
tab will appear on the Ribbon.
This enables you to edit your chart with a variety of designs, layouts, and formats.
6
D. Add Chart Title
When a chart is created from the spreadsheet data the text Chart Title will appear above your chart data.
1. Click on the Chart Title text box.
2. Select or delete text.
3. Type your desired title. For this class exercise, type Fiscal Year Comparisons.
E. Create Pie Chart
Noncontiguous cell ranges can be selected from your spreadsheet to view specific data groupings
1. Select A1:A5, then compress the Ctrl key, and select D1:D5.
2. Click on the Insert tab, click on the Pie button location in the Chart group, and then select the first 2-D Pie
button from the options panel.
3. Your created Pie chart will appear on the spreadsheet.
TYPES OF CHARTS
The following are the most common types of charts used in data visualization:
A. Column and Bar Charts - Excel distinguishes between vertical and horizontal bar charts, calling the former column
charts and the latter bar charts.
A clustered column chart compares values across categories using vertical rectangles; a stacked column
chart displays the contribution of each value to the total by stacking the rectangles
100% stacked column chart compares the percentage that each value contributes to a total.
Column and bar charts are useful for comparing categorical or ordinal data, for illustrating differences
between sets of values, and for showing proportions or percentages of a whole.
B. Line charts provide a useful means for displaying data over time.
C. A pie chart displays this by partitioning a circle into pie-shaped areas showing the relative proportion.
D. An area chart combines the features of a pie chart with those of line charts. Area charts present more information than
pie or line charts alone but may clutter the observer’s mind with too many details if too many data series are used; thus,
they should be used with care.
E. Scatter charts show the relationship between two variables.
F. A bubble chart is a type of scatter chart in which the size of the data marker corresponds to the value of a third
variable; consequently, it is a way to plot three variables in two dimensions.
G. A stock chart allows you to plot stock prices, such as the daily high, low, and close. It may also be used for
scientific data such as temperature changes.
H. A surface chart shows 3-D data.
I. A doughnut chart is similar to a pie chart but can contain more than one data series
J. A radar chart allows you to plot multiple dimensions of several data series.
MODULE SUMMARY
Microsoft Excel is an example of a spreadsheet program. Other types of spreadsheets are available—
for example, Calc from OpenOffice, and Sheets from Google Docs. A spreadsheet is used to perform
mathematical calculations and financial decision making— for example, for budgets, company reports,
wage sheets, cash flows—to analyze data, and for graphical representation of data. You can process,
summarize, sort, extract, analyze, and store information using a spreadsheet.
In entering, editing and formatting data in Microsoft Excel various functions are applicable to different
reports depending on the use, type of data and reports to be presented and analyze.
Basic formulas in excel includes Sum, AutoSum, Average, Min and Max.
Charts are effective in presenting data visually.
7
8