Chapter 5
Chapter 5
•
•
•
•
•
•
•
•
•
•
•
•
•
Features of a web
browser
HINT:BAN CAR
Features of a web
browser
•
•
•
•
•
•
•
on browsers.
•
•
•
required pages are
downloaded.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
EXAM QUESTION
EXAM QUESTION
EXAM QUESTION
EXAM QUESTION
Digital
Currency
Definition
Examples of digital currency
Central Banking System
Person A Person B
Person A Person B
- Confidentiality (Control of
governments and central authorities)
- Security
Decentralisation - Cryptocurrency
MINER
- Use the power of their personal computers to
process transactions. The reward for doing so is
that miners receive some of the transaction fees
involved in the process of payment made.
Decentralisation - Cryptocurrency
• Traditional digital currencies are regulated by central banks
and governments. This means all transactions and exchange
rates are determined by these two bodies.
• Cryptocurrency has no state control and all the rules are set
by the cryptocurrency community itself.
• The cryptocurrency system works by being within a
blockchain network which means it is much more secure.
Blockchain
A technology that sits behind all
cryptocurrency transactions. It makes all
sorts of cryptocurrency safe to use.
Blockchaining - How cryptocurrency work?
• Blockchain is a decentralised database.
• All the transactions of networked members are stored on this
database.
• The blockchain consists of a number of interconnected
computers but they are not connected to a central server.
• All transaction data is stored on all computers in the
blockchain network.
Blockchaining - A chain of blocks
Blockchaining - A chain of blocks
Hash: A4BF
Previous Hash: 0000
Blockchaining - A chain of blocks
Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE Hash: 34EE Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1 Previous Hash: 6AB1
Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE
Hash: A4BF Hash: 6AB1 Hash: 34EE Hash: 34EE Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1
Previous Hash: 0000 Previous Hash: A4BF Previous Hash: 6AB1 Previous Hash: 6AB1
I Hack This!
All nodes within this network creates a consensus. Majority wins.
This means that hacker will have to tamper a block in more than half
of the nodes, which is impossible.
Failed!
Cyber Security
Cyber Security
Threat
Cyber Security
Threats Solutions/Prevention
Cyber Security
Threats
Cyber Brute-Force
DDOS Attack
B D
Security
Attack
Data
Malware Phishing
M P
Social
Pharming
P S Engineering
Cyber Brute-Force
DDOS Attack
B D
Security
Attack
Data
Malware Phishing
M P
Social
Pharming
P S Engineering
B Brute-Force Attack
Data
Malware Phishing
M P
Social
Pharming
P S Engineering
D Distributed Denial of Service (DDOS)
Patient ..
D Distributed Denial of Service (DDOS)
How does it attack?
x100000
D Distributed Denial of Service (DDOS)
Distributed = Many computers
Denial of Service = Deny user from
using a service
How does it attack?
A criminal can use a software that The server becomes overloaded and won't be
force thousands of innocent able to service a user's legitimate request. It
computers around the world to will slow the website down or cause it to go
send a viewing request to a web offline altogether.
server.
Sorry
can't do
x100000 it!
D Distributed Denial of Service (DDOS)
Signs to detect a DDOS attack
Data
Malware Phishing
M P
Social
Pharming
P S Engineering
D Data Interception
Encryption of data.
Eg. Wired Equivalency privacy (WEP)
Data
Malware Phishing
M P
Social
Pharming
P S Engineering
H Hacking
Black-hat White-hat
hacker hacker
Hacker that try to find security
Hacker who seeks to gain loopholes in a system and give
unauthorised access to a advice to the network owners
computer system. about how to close them.
Cyber Brute-Force
B D DDOS Attack
Security
Attack
Data
Malware Phishing
M P
Social
Pharming
P S Engineering
Malware = Malicious Code Software
M
Malware are pieces of software that have been written and
coded with the intention of causing damage to or stealing
data from a computer or system.
Trojan
Virus Worm Spyware Adware Ransomware
Horse
Virus
V
• Viruses are programs or program codes that self-replicate
with the intention of deleting or corrupting files, or causing a
computer to malfunction.
• Viruses need an active host program on the target
computer or an operating system that has already been
infected, before they can actually run and cause harm.
• Viruses are often sent as email attachments, reside on infected
websites or on infected software downloaded to the user’s
computer.
Virus
Trojan Horse
T
• A trojan horse is malware that is hidden away in the code of software that
appears to be harmless. A Trojan horse replaces all or part of the
legitimate software with the intent of carrying out some harm to the
user’s computer system.
• They need to be executed by the end-user. They usually arrive as an
email attachment or are downloaded from an infected website
• Once installed on the user’s computer, the Trojan horse will give
cyber criminals access to personal information on your computers,
such as IP addresses, passwords and other personal data. Spyware
and ransomware are often installed on a user’s computer via
Trojan horse malware.
Trojan
Horse
Worm
W
• A type of stand-alone malware that can self-replicate. Unlike viruses,
they don't need an active host program to be opened in order to do
any damage.
• Worm replicates itself until the computer's resources are used to
their maximum capacity and no further processing can take place,
leading to system failure and crashing.
• Worms tend to be problematic because of their ability to spread
throughout a network without any action from an end-user;
whereas viruses require each end-user to somehow initiate the
virus.
Worm
Spyware
S
• Spyware is software that gathers information by monitoring a
user’s activities carried out on their computer.
• The gathered information (bank account numbers, passwords
and credit/debit card details) is sent back to the cybercriminal
who originally sent the spyware (just like cookies).
• Spyware can be detected and removed by anti-spyware
software.
Spyware
Adware
A
• Adware is a software that will attempt to flood an end-user with
unwanted advertising.
• For example, it could
• redirect a user’s browser to a website that contains
promotional advertising
• appear in the form of pop-ups
• appear in the browser’s toolbar and redirect search requests
Adware
Ransomware
R
• Ransomware are programs that encrypt data on a user’s
computer and ‘hold the data hostage’.
• The cybercriminal waits until the ransom money is paid and,
sometimes, the decryption key is then sent to the user.
Ransomware
Flashcard
THE DIFFERENCE
BETWEEN VIRUS
AND WORMS
VIRUS NEEDS AND
ACTIVE HOST,
WORMS DO NOT.
Flashcard
HOW IS VIRUS
SENT TO A USER
VIA EMAIL
ATTACHMENTS,
INFECTED
SOFTWARE/
WEBSITE
Flashcard
Once installed on the user’s computer, I
will give cyber criminals access to
personal information on your computers,
such as IP addresses, passwords and other
personal data. Spyware and ransomware
are often installed on a user’s computer
via ME.
WHO AM I?
TROJAN HORSE
Flashcard
Security
Attack
Data
Malware Phishing
M P
Social
Pharming
P S Engineering
Phishing
P
• Sending out
legitimate-looking
emails designed to
trick the recipients into
giving their personal
details to the sender of
the email.
• These emails may
contain links or
attachments, when
initiated, take the user to
a fake website to enter
personal details.
Phishing
P
• Sending out
legitimate-looking
emails designed to
trick the recipients into
giving their personal
details to the sender of
the email.
• These emails may
contain links or
attachments, when
initiated, take the user to
a fake website to enter Clickbait
personal details.
Phishing
P
Can you find something
that is not so right?
Phishing - Legit Emails
P
Phishing
P Ways to prevent phishing
Security
Attack
Data
Malware Phishing
M P
Social
Pharming
P S Engineering
Pharming
P
• Redirect user from a genuine website to a fake one, with
the hope that this goes unnoticed. They manipulate the
DNS server.
• A user may then be prompted to enter login details, and
this can then be collected by a criminal for use on the
genuine site.
• Pharming attacks occur when web servers are attacked,
and code is inserted into a website that redirects visitors
(changing the IP address).
Examples:
Cyber Brute-Force
B D DDOS Attack
Security
Attack
Data
Malware Phishing
M P
Social
Pharming
P S Engineering
Social Engineering
S
• This form of cyber-crime is where users are manipulated into
behaving in a way that they would not normally do.
• Five common types of threat:
• Instant messaging (malicious link embedded in message)
• Scareware (tell you that your computer is infected with virus)
• Email (genuine looking emails)
• Baiting (leave a pendrive where it can be found)
• Phone calls (asks you to download special software)
• All threats above are effective methods for introducing malware.
• The whole idea of social engineering is the exploitation of human
emotion (fear, curiosity, empathy and trust).
E X A M Q U ES T I O N ( M A RC H 1 9 )
EXAM QUESTION
EXAM QUESTION
E X A M Q U ES T I O N ( M A RC H 1 9 )
EXAM QUESTION
EXAM QUESTION
Cyber Security
Solutions
and
Prevention
Cyber Security
Cyber A Access Level
A Anti-Malware
Security Authentication
Automating
A A Software Updates
Solution and
Prevention Spelling and
Tone in Firewall
S communications F s
Privacy
Proxy Server
P Setting P
Secure Socket
S Layer
Cyber A Access Level
A Anti-Malware
Security Authentication
Automating
A A Software Updates
Solution and
Prevention Spelling and
Tone in Firewall
S communications F s
Privacy
Proxy Server
P Setting P
Secure Socket
S Layer
Access Level
A
• This method of protection is hugely important in
organisations where there are lots of users accessing a
network.
• User will be assigned different levels of access
depending on the role they have. It ensures that users'
behaviour can be controlled while they use a computer
on a network.
• When using databases, levels of access are important
to determine who has the right to read, write and delete
data.
Cyber A Access Level
A Anti-Malware
Security Authentication
Automating
A A Software Updates
Solution and
Prevention Spelling and
Tone in Firewall
S communications F s
Privacy
Proxy Server
P Setting P
Secure Socket
S Layer
Anti-malware
A
• Danger of malicious software
• Theft of company data
• Corruption of data (data becomes unreadable)
• Hence, a network should have anti-malware and anti-
virus applications installed that protect all devices on
the network (just like a vaccine to covid).
Types of Anti-malware
Anti Virus
Anti virus
A
• Anti-virus software are constantly scanning documents, files and
also incoming data from the internet.
• They are designed to detect suspisious activity and files before
they are opened or stored / warn the user against opening the
files.
• If a file is detected as harmful, the anti-virus will quarantine the file
away from the network, preventing it from installing or multiplying
itself to other areas of the network or the hard disk drive.
• Upon user instructions, the software will then remove and delete
the offending malware or virus.
Anti Virus
Anti spyware
A
• Spyware: Spyware is software that gathers information by
monitoring a user’s activities carried out on their computer.
• How they work?
• Looks for typical features which are usually associated with
spyware thus identifying any potential security issues
• File structures – in this case, there are certain file structures
associated with potential spyware which allows them to be
identified by the software.
Anti spyware
A
• Spyware: Spyware is software that gathers information by
monitoring a user’s activities carried out on their computer.
• How they work?
• Looks for typical features which are usually associated with
spyware thus identifying any potential security issues
• File structures – in this case, there are certain file structures
associated with potential spyware which allows them to be
identified by the software.
• General features - block webcam, encryption of keyboard strokes,
detect spyware and remove if found, scans for signs
Cyber A Access Level
A Anti-Malware
Security Authentication
Automating
A A Software Updates
Solution and
Prevention Spelling and
Tone in Firewall
S communications F s
Privacy
Proxy Server
P Setting P
Secure Socket
S Layer
Authentication
A
• Authentication refers to the ability of a user to prove who
they are.
Password
Biometrics Two-step Credit Card &
and user Authentication verification Hotel Card
names
Password and user names
P
• Examples of where password is used:
• websites
• mobile phones, etc
• Password should be strong enough to stop criminals from
guessing them.
Password
and user
names
Let's try this out
Password
and user
names
Tips for a stronger password
T
• Combine different types of character (lowercase, uppercase,
special character)
• Don't put in pattern in your passwords (eg. cabbag3), use
random patterns eg. Hp3oe7Ls*(!kajmc)
• Don't use the same passwords for all accounts
• Be aware of spyware that tries to steal your passwords (via
keyboard stroke)
Password
and user
names
Biometric Authentication
B
• Biometrics relies on certain unique characteristics of human
beings:
Biometric
Authentication
Biometric Authentication
B
• Biometrics relies on certain unique characteristics of human
beings:
• Fingerprint scans (compare image stored versus image
scanned; fingerprints are unique)
• Face recognition
• Voice recognition
Biometric
Authentication
Two-step verification
T
• Requires two methods of authentication to verify who a user
is.
• Example: Online shopping
• Step 1: Enter user name and password
• Step 2: Enter PIN that is sent back to her either in an email
or as a text message to her mobile phone
Two-step
verification
Credit Card & Hotel Card
C
• Hotel card has magnetic stripe on the back of the card.
These stripe will store personal information.
• Credit card (or any smart card) has a chip that is read when
inserted into an Electronic Funds Transfer Point of Sale. The
chip can hold a lot of information (eg. Pin).
Security Authentication
Automating
A A Software Updates
Solution and
Prevention Spelling and
Tone in Firewall
S communications F s
Privacy
Proxy Server
P Setting P
Secure Socket
S Layer
Automating Software Updates
A
• Why?
Automating Software Updates
A
Automating Software Updates
A
• This ensures that applications
like operating systems, anti-
virus and other commonly
used pieces of software are
always operating with the
latest version installed.
• Greater threats are constantly
evolving and that anti-virus
companies are always
attempting to stay up to date
with new attacks.
Cyber A Access Level
A Anti-Malware
Security Authentication
Automating
A A Software Updates
Solution and
Prevention Spelling and
Tone in Firewall
S communications F s
Privacy
Proxy Server
P Setting P
Secure Socket
S Layer
S Spelling and Tone in communications
www.gougle.com
www.amozon.com
Cyber A Access Level
A Anti-Malware
Security Authentication
Automating
A A Software Updates
Solution and
Prevention Spelling and
Tone in Firewall
S communications F s
Privacy
Proxy Server
P Setting P
Secure Socket
S Layer
F Firewall
• A firewall can be either software or hardware. It sits between the user’s computer
and an external network (for example, the internet) and filters information in and out
of the computer.
F Firewall
• A firewall can be either software or hardware. It sits between the user’s computer
and an external network (for example, the internet) and filters information in and out
of the computer.
• Firewalls are the primary defence to any computer system to help protect
it from hacking, malware (viruses and spyware), phishing and pharming.
• Main tasks
• Examine the ‘traffic’ between user’s computer (or internal network)
and a public network
• checks whether incoming or outgoing data meets a given set of
criteria.If the data fails the criteria, the firewall will block the ‘traffic’
• criteria can be set so that the firewall prevents access to certain
undesirable sites; the firewall can keep a list of all undesirable IP
addresses
• The firewall can be software installed on a computer; in some cases, it is
part of the operating system.
Cyber A Access Level
A Anti-Malware
Security Authentication
Automating
A A Software Updates
Solution and
Prevention Spelling and
Tone in Firewall
S communications F s
Privacy
Proxy Server
P Setting P
Secure Socket
S Layer
P Privacy Setting
Security Authentication
Automating
A A Software Updates
Solution and
Prevention Spelling and
Tone in Firewall
S communications F s
Privacy
Proxy Server
P Setting P
Secure Socket
S Layer
P Proxy Server
Security Authentication
Automating
A A Software Updates
Solution and
Prevention Spelling and
Tone in Firewall
S communications F s
Privacy
Proxy Server
P Setting P
Secure Socket
S Layer
S Secure socket layer
Certificate
An SSL certificate is a form of digital certificate
which is used to authenticate a website and
enables an encrypted connection
S Secure Socket Layer Handshake
The user’s browser The browser then The web server
sends a message so requests that the web responds by sending
that it can connect with server identifies itself a copy of its SSL
the required website certificate to the
which is secured by SSL user’s browser
A user will know if SSL is being applied when they see https or the
small padlock in the status bar at the top of the screen.
S How do we know if a website is using SSL?
Examples of where SSL will be used:
• Online banking and all online financial transactions
• Online shopping/commerce
• Sending and receiving emails
• Instant messaging
Security Authentication
Automating
A A Software Updates
Solution and
Prevention Spelling and
Tone in Firewall
S communications F s
Privacy
Proxy Server
P Setting P
Secure Socket
S Layer
E X A M Q U ES T I O N ( J U N E 2 1 )
E X A M Q U ES T I O N ( M A RC H 1 9 )
E X A M Q U ES T I O N ( J U N E 2 1 )
E X A M Q U ES T I O N ( M A RC H 1 9 )
E X A M Q U ES T I O N ( J U N E 2 0 )
E X A M Q U ES T I O N ( J U N E 2 0 )
E X A M Q U ES T I O N ( M A RC H 2 1 )
E X A M Q U ES T I O N ( M A RC H 2 1 )
E X A M Q U ES T I O N ( J U N E 2 0 )
E X A M Q U ES T I O N ( J U N E 2 0 )
E X A M Q U ES T I O N ( J U N E 2 0 )
E X A M Q U ES T I O N ( J U N E 2 0 )