Day 48 Chapter 9
Day 48 Chapter 9
2 Index
3 Cyber World
• Cyber World is a system in which communication over computer networks occurs.
• The cyber world notion became popular around 1990, when the uses of the Internet,
networking, and digital communication were all increasing.
• In terms of social experience, the users can interact, share and exchange ideas, share
information, provide social support, conduct business, create media, play games, engage in
discussion, and so on, using this global network.
• An online world where users have the mechanisms in place to transact any business or
personal activity as easily and freely as they can transact them in the physical world.
• An environment for sophisticated online computing.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
4 Need of Cyber Security
• The protection of information and information systems against unauthorized access or
modification of information, whether in storage, processing, or transit to authorized users.
• Information security processes and policies typically involve physical and digital security
measures to protect data from unauthorized access.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
5 Need of Cyber Security
• Security: can be considered a state of freedom from a danger or risk. For example, a
nation experiences security when it’s military has the strength to protect its citizens.
• Information: is an asset to all individuals and businesses. Information Security refers to
the protection of these assets in order to achieve Confidentiality, Integrity and Availability
(CIA).
• To make the system secure, optimum level of confidentiality, availability and integrity is
to be maintained as it is shown by Data in diagrams.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
6 Understanding CIA TRIAD
• Confidentiality: Protecting information from being disclosed to Unauthorized parties.
• Use of Antivirus.
• Use of firewall.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
10 Updating Windows OS
• Windows Update is a free Microsoft service that's used to provide updates like service
packs and patches for the Windows operating system and other Microsoft software.
• Windows Update can also be used to update drivers for popular hardware devices.
• Windows Update is used to keep Microsoft Windows and several other Microsoft
programs updated.
• Updates often include feature enhancements and security updates to protect Windows from
malware and malicious attacks.
• Windows Update's gives a number of important information:
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
11 Updating Windows OS
• Important Updates: Normally these are fixes for security issues, or to fix a problem that
could cause system instability. They should be installed immediately.
• Recommended Updates: These are often additional new features or functionality. It's a
good idea, but not a necessity, to install them.
• Optional Updates: These are often take-or-leave updates. They can be driver updates to
help some devices work better with Windows or they could be trial software from
Microsoft.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
12 How to Get Updates in Windows 10
• Click the Start menu and type “Updates” in the search bar and click “Check for updates”
button.
• If there are updates to install, they will be installed automatically.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
13 Password Policies
• In many operating systems, the most common method to authenticate a user's identity is to use a
secret passphrase or password. A secure network environment requires all users to use strong
passwords, which have at least eight characters and include a combination of letters, numbers, and
symbols.
• Windows supports fine-grained password policies. This feature provides organizations with a way
to define different password and account lockout policies for different sets of users in a domain.
• Enforce password history
• Now click on the option Give other users access to this computer, which would open the
User Settings screen, Scroll down and click on the Add User option.
• Screen prompting to enter the user's email address would be appearing. By default, the
above screen prompts to enter an email so that create a Microsoft account.
• If user wishes to create a Microsoft account, enter email address and click on the Next
button.
• If user does not wish to use a Microsoft account, it should instead click on the Sign in
without a Microsoft account option in the screen above.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
17 What are Virus, Worm, and Malware?
• Virus –
• A piece of code that is capable of copying itself and typically has a detrimental effect,
such as corrupting a system or destroying data on an individual computer.
• Virus is designed to spread from host to host and has the ability to replicate itself.
• A computer virus operates by inserting or attaching itself to a legitimate program or
document that supports macros in order to execute its code. It also known as Threat.
• How does a computer virus attack?
• Once a virus has successfully attached to a program, file, or document, it will lie
dormant until circumstances cause the computer or device to execute its code. In order
for a virus to infect computer, user have to run the infected program, which in turn
causes the virus code to be executed. However, once the virus infects computer, the
virus can infect other computers on the same network.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
18 Worms
• Worm –
• A computer worm is a standalone malware computer program that replicates itself and
spread to other computers. Often, it simply clones itself over and over again and
spreads via a network (say, the Internet, a local area network at home, or a company’s
intranet) to other systems where it continues to replicate itself.
• How does a computer Worm Spread-
• One of the most common ways for worms to spread is via email spam. Worms could
hide in the main text of an email, but as modern email clients caught on and began
blocking, Operating system vulnerabilities are also cause for spreading worm, every
operating system has its vulnerabilities and some worms are specifically coded to take
advantage of these weak points.
• Worms can take on similarly deceptive forms in instant messaging software and take
advantage of users who are probably not on high alert when using such services.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
19 Malware-
• Malware” is short for “malicious software” and used as a single term to refer to virus, spy
ware, worm etc.
• Signature-based detection –
• Uses key aspects of an examined file to create a static fingerprint of known malware.
The signature could represent a series of bytes in the file. It could also be a
cryptographic hash of the file or its sections. This is most common in traditional method
that checks all the .EXE files and validates it with the known list of viruses and other
types of malware.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
24 How does Antivirus Software Work?
• Behavioral-based detection –
• This type of detection is used in Intrusion Detection mechanism. This concentrates
more in detecting the characteristics of the malware during execution. This mechanism
detects malware only while the malware performs malware actions.
• Heuristic Detection –
• This process scans for previously unknown viruses by looking for known suspicious
behavior or file structures. This is mostly used in combination with signature-based
detection.
• Data mining techniques –
• This is of the latest trends in detecting a malware. With a set of program features, Data
mining helps to find if the program is malicious or not.
[UnitCourse
1: Introduction
: ‘O’ Level to Web Design]
(IT) Course:
Module : IT Tools & BasicsNIELIT ‘O’ Level (IT)
of Networks
Module: M2-R5: Web Designing &
Chapter - Overview of Future Skills & Cyber Security Publishing
25 Different Types of Antivirus Software
S.No Antivirus Platform
3 AVG Windows
5 Malwarebytes,Anti-Malware Windows
Thank You