0% found this document useful (0 votes)
20 views10 pages

Computer Threats Definiton:: Outsider Threats: These Come From Individuals With No

Uploaded by

fminahil390
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views10 pages

Computer Threats Definiton:: Outsider Threats: These Come From Individuals With No

Uploaded by

fminahil390
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

(I)

COMPUTER THREATS
DEFINITON:
A Cyber Attack is an attempt to steal, alter, destroy, disrupt, or
disable information resources and systems found in computer
networks and systems.
Main Types:

Insider Threats: These stem from individuals with legitimate


access to the systems they target. They intentionally or
inadvertently exploit vulnerabilities. Examples include
disgruntled employees or contractors.

Outsider Threats: These come from individuals with no


affiliation to the system they attack, such as criminal
organizations or hackers.

Common Types of Cyber Attacks:


Malware: Malicious software like spyware, viruses, ransom
ware, and worms. It aims to access your system’s data.
Phishing: Deceptive emails or messages that trick users into
revealing sensitive information.
Ransom ware: Holds your data hostage until a ransom is paid.
Denial-of-Service (DS) Attacks: Overwhelm a system,
making it unavailable to users.
Social Engineering: Manipulates human psychology to gain
unauthorized access.
Insider Threats: Employees or contractors intentionally or
accidentally compromise security.
Zero-Day Exploits: Attacks that exploit unpatched
vulnerabilities.
Man-in-the-Middle (MM) Attacks: Intercept
communication between parties.
SQL Injection: Exploits poorly sanitized input in web
applications.
Drive-By Downloads: Malicious code downloads without
user consent.

Manage Computer Threats:

Install Antivirus/Anti-Malware Software:


 Regularly update and run scans to detect and remove
malicious software.
Use Strong Passwords:
 Combine uppercase and lowercase letters, numbers,
and special characters.
Keep Software Updated:
 Regularly update operating systems, browsers, and
applications to patch vulnerabilities.
Backup Data:
 Regular backups protect against data loss due to
attacks.
Implement Firewalls:
 Firewalls filter network traffic and block
unauthorized access.

Educate Users:
 Train employees to recognize phishing attempts and
avoid suspicious links.
Limit User Privileges:
 Only grant necessary access rights to prevent insider
threats.
Monitor Network Traffic:
 Detect anomalies and potential threats.
Encrypt Sensitive Data:
 Protect data in transit and at rest.
Implement Multi-Factor Authentication (MFA):
 Adds an extra layer of security beyond passwords.

(II)
Computer Virus
DEFINITION:
 A computer virus is a malicious software application or
authored code that attaches itself to other programs, self-
replicates, and spreads to other devices.
 When executed, a virus modifies other computer
programs by inserting its code into them.
 If the virus successfully replicates, the affected device is
considered “infected.”

Types of Computer Viruses:


Boot Sector Virus:
 Damages or controls the boot sector on a drive,
rendering the machine unusable.
 Often spread via malicious USB devices.
Web Scripting Virus:
Exploits vulnerabilities in older, unsupported browsers
to run code on local devices.
File Infector Virus:
 Infects executable files, altering their code.
Examples: CIH/Chernobyl virus.
Macro Virus:
 Targets macros in documents (e.g., Word, Excel).
 Spreads through infected files.
Polymorphic Virus:
 Evolves its code to avoid detection.
Metamorphic Virus:
 Rewrites its own code to change appearance.
Resident Virus:
 Remains in memory, infecting files as they load.
Non-Resident Virus:
 Activates only when an infected file is executed.
Multipartite Virus:
 Combines characteristics of other virus types.
Signs of a Computer Virus:
 Sluggish performance.
 Unexpected pop-ups.
 Unusual system behavior.
 Files disappearing or modified.

Examples of Computer Viruses:


 ILOVEYOU: Spread via email attachments, causing
widespread damage.
 Melissa: Infected Microsoft Word documents.
 SASSER: Exploited Windows vulnerabilities.

Remove a Computer Virus:


Use Antivirus Software:
 Regularly scan and remove viruses.

Isolate Infected Devices:


 Disconnect from networks to prevent spread.
Manually Remove Infected Files:
 Delete suspicious files.
Restore from Backups:
 If available, restore clean versions of files.
Preventing Computer Viruses:
Keep Software Updated:
 Install security patches promptly.
Educate Users:
 Train users to recognize phishing emails.
Backup Data Regularly:
 Protect against data loss.
Use Strong Passwords:
 Prevent unauthorized access.
Implement Firewalls and Antivirus Software:
 Block malicious traffic.

(III)
PROTECT DATA ON INTERNET
SECURITY MEASURES:
Use a Secure Internet Connection:
 Avoid using public Wi-Fi for sensitive transactions.
 If you must use public Wi-Fi, employ a Virtual Private
Network (VPN) to encrypt your data.
 Save personal transactions for trusted connections.
Choose Strong Passwords:
 Create passwords that are:
 Long: At least 12 characters.
 A mix of upper-case and lower-case letters,
symbols, and numbers.
 Avoid obvious choices like sequential numbers or
personal information.
Keep Software Updated:
 Regularly update your operating system, browsers, and
applications.
 Install security patches promptly to fix vulnerabilities.
Backup Your Data Regularly:
 Protect against data loss due to Cyber Attacks or
hardware failures.
Use Internet Security Software:
 Install antivirus software to guard against viruses,
malware, and other threats.
 Keep your antivirus updated to stay ahead of evolving
cyber threats.
Tighten Privacy Settings:
 Adjust privacy settings on social media accounts to limit
exposure.
 Share less personal information with apps and services.
Remove Unused Apps and Extensions:
 Delete mobile apps and browser extensions you no longer
need.
Prevent Search Engines from Tracking You:
 Adjust browser settings to limit tracking.
Use a VPN:
 Hide your browsing history and protect your online
privacy.
Don’t Ignore Software Updates:
 Keep your operating system and applications up to date.

You might also like