0% found this document useful (0 votes)
15 views

Module-H-Special-Topic-on-Cybersecurity-for-upload

Uploaded by

nylemamucud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Module-H-Special-Topic-on-Cybersecurity-for-upload

Uploaded by

nylemamucud
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 54

CYBER

SECURITY BY
DEPARTMENT OF BIOLOGICAL SCIENCES
LESSON OUTLINE
01 02 03
INTRODUCTION TO CATEGORIES OF TYPES OF CYBER
CYBERSECURITY CYBER CRIME CRIME

04 05 06
TYPES OF SECURITY ADVANTAGE OF SAFETY TIPS TO
TOOLS CYBERSECURITY CYBER CRIME
OVERVIEW
The growing dependence of people
on technology and the internet
has created a bigger venue for
cybercriminals to do their
crimes.
OVERVIEW

This highlighted the need for


CYBERSECURITY AWARENESS of
every person online.
OUR REALITY TODAY

© ISACA

Source:
https://www.sangfor.com/blog/cybersecurity/jollibee-data-breach-philippines-affected-11-million-
customers#:~:text=In%20June%2C%20fast%20food%20giant,customers%20and%20its%20connected%20companies.
OUR REALITY TODAY

© ISACA

Source:
https://www.philstar.com/headlines/2024/01/16/2326110/another-data-leak-hits-philhealth
OUR REALITY TODAY

© ISACA

Source:
https://www.rappler.com/business/ucpb-probes-cyber-heist-september-2020/
https://www.reuters.com/article/technology/bangladesh-to-sue-manila-bank-over-81-million-cyber-heist-cenbank-governor-idUSKCN1PO19F/
OUR REALITY TODAY

Source:
© INTERNATIONAL
https://salinlahi.org/online-sexual-abuse-and-exploitation-of-children-increases-as-ph-poverty-worsens-salinlahi/ JUSTICE MISSION
OUR REALITY TODAY

Source:
© INTERNATIONAL
https://www.unicef.org/philippines/press-releases/online-bullying-remains-prevalent-philippines-other-countries JUSTICE MISSION
OUR REALITY TODAY

Source:
© INTERNATIONAL
https://www.philstar.com/headlines/2024/03/12/2340026/pnp-warns-public-rise-cyber-identity-theft-cases JUSTICE MISSION
OVERVIEW
Knowing how
cybercriminals think
and attack could
prevent you from
turning into another
victim.
Cybersecurity is as simple
as A B C:
Always Be Careful!
WHAT IS CYBERSECURITY?
✔Cybersecurity is the practice of
protecting computer systems,
networks, and programs from digital
attacks, damage, or unauthorized
access.

✔It involves implementing measures,


protocols, and technologies to ensure
the confidentiality, integrity, and
availability of information in the
digital realm. © ISACA
THE CIA TRIAD OF
INFORMATION SECURITY

© IT GOVERNANCE
02
CATEGORIES OF
CYBER CRIME
CATEGORIES
COMPUTER AS THE COMPUTER AS THE
TARGET WEAPON
● Computer is used to ● Computer is used to
attack another commit real-world
computer. crime.
● E.g. hacking, viruses, ● E.g. credit card
worms, DoS attacks frauds
03
TYPES OF CYBER
CRIMES
HACKING
Hacking refers to the unauthorized access,
manipulation, or exploitation of computer
systems, networks, or data usually in a large
organization such as the government.

White Hat Hacking: An ethical hacking where


individuals use their skills to find and fix security
vulnerabilities.
Black Hat Hacking: A darker side of hacking, involving
individuals or groups who exploit vulnerabilities for
malicious purposes.

© SIMPLEARN.COM
PHISHING
Phishing is a digital version of fishing where
cybercriminals are attempting to lure people
into revealing sensitive information, such as
passwords or credit card numbers.

This can be done through deceptive emails or messages.

The attacker lures the recipient into clicking on a


link or attachment leading them to a fraudulent site
that captures their sensitive information.

© FRONTIER BLOG
VHISHING
Vhishing is short for ‘voice phishing,’ which
involves defrauding people over the phone,
enticing them to divulge sensitive information.

In this definition of vhishing, the attacker


attempts to grab the victims' data and use it to
their own benefit - typically, to gain
financial advantage.

© FRONTIER BLOG
VHISHING
Vhishing is short for ‘voice phishing,’ which
involves defrauding people over the phone,
enticing them to divulge sensitive information.

In this definition of vhishing, the attacker


attempts to grab the victims' data and use it to
their own benefit - typically, to gain
financial advantage.

© FRONTIER BLOG
DENIAL OF SERVICE
A Denial of Service (DoS) attack is a digital
traffic jam that disrupts the normal
functioning of a computer system, network, or
website.

In a DoS attack, the perpetrator overwhelms


the target with a flood of traffic, making it
unable to respond to legitimate requests.

© NAMESHIELD
SPAM EMAIL
Spam emails are unsolicited and often
irrelevant messages sent in bulk to a large
number of recipients.

The goal of spam emails can vary—from


promoting products and services to spreading
malware or phishing for sensitive information.

© GMASS
MALWARES
Malware, a.k.a malicious software, is a
broad term that encompasses various
types of harmful software designed to
disrupt, damage, or gain unauthorized
access to computer systems, usually for
financial gains.

E.g. viruses, worms, trojans,


ransomware, spyware
TYPES OF MALWARES
Viruses: These attach themselves to
clean files and spread when the infected
file is executed.

Worms: Self-replicating and capable of


spreading across networks without human
intervention.
TYPES OF MALWARES
Viruses: These attach themselves to
clean files and spread when the infected
file is executed.

Worms: Self-replicating and capable of


spreading across networks without human
intervention.
TYPES OF MALWARES
Trojans: Disguised as legitimate
software, Trojans deceive users into
installing them, allowing malicious
activities.

Ransomware: Encrypts files on a user's


system, demanding payment (often in
cryptocurrency) for their release.
TYPES OF MALWARES
Trojans: Disguised as legitimate
software, Trojans deceive users into
installing them, allowing malicious
activities.

Ransomware: Encrypts files on a user's


system, demanding payment (often in
cryptocurrency) for their release.
TYPES OF MALWARES
Spyware: Stealthily monitors and
collects information about a user's
activities without their knowledge.

Adware: Bombards endless ads and pop-up


windows that could potentially be
dangerous for your device.
TYPES OF MALWARES
Spyware: Stealthily monitors and
collects information about a user's
activities without their knowledge.

Adware: Bombards endless ads and pop-up


windows that could potentially be
dangerous for your device.
SOCIAL ENGINEERING
It is the art of manipulating people so
they give up confidential information
CATFISHING
Catfishing is the act of pretending to be
someone you're not online, usually with the
intention of deceiving others, often for
personal gain, emotional manipulation, or
even just to create a false persona. The term
originally referred to the practice of using
fake profiles to lure people into romantic or
social relationships, but it can also extend
to other forms of online deception.
ONLINE GROOMING

© KEEP IT REAL ONLINE


ATM SKIMMING
ATM skimming involves installing a small
device, called a skimmer, on an ATM to
secretly collect data from the magnetic
stripe of debit or credit cards.

© RAPPLER
04
TYPES OF
SECURITY
TOOLS
TYPES OF
SECURITY TOOLS
Firewalls Antivirus Software Virtual Private
Networks (VPNs)
It monitors and controls It detects, prevents,
incoming and outgoing
and removes malicious It encrypts your
network traffic,
software (malware) to internet connection,
deciding which data
keep your system enhancing privacy and
packets can enter or
security, especially
leave based on healthy. when you're using public
predetermined security
Wi-Fi.
rules.

© HOWSTUFFWORKS © THE TELEGRAPH © CYBER YODHA


TYPES OF
SECURITY TOOLS
Intrusion Detection Encryption Tools Password Managers
Systems (IDS)
It is a digital It generates complex
It monitors network translator that passwords, reducing
or system activities converts sensitive the risk of
for suspicious information into a unauthorized access
behavior and alerts secret code. to your accounts.
administrators to
potential threats.

© SPICEWORKS © HEIMDAL SECURITY © WIRED


TYPES OF
SECURITY TOOLS
Security Information and Multi-Factor
Event Management (SIEM) Authentication (MFA)
Systems
It requires users to
It collects and analyzes provide more than one
log data from various form of identification
systems, providing a (e.g., password and
comprehensive view of an fingerprint) before
organization's security granting access.
posture.

© ISOLUTIONS ASSOCIATES © HARVARD UNIVERSITY © FLATICON


05
ADVANTAGES OF
CYBERSECURITY
ADVANTAGES OF CYBERSECURITY
1. It defends us from hacks and viruses. It helps
us browse websites safely.
2. It processes all the incoming and outgoing
data on our computer.
3. It defends us from critical online attacks.
4. It forces the applications in a computer to be
updated regularly.
5. It detects the emergence of new viruses when
the database is updated.
06
SAFETY TIPS TO
CYBER CRIME
SAFETY TIPS TO
CYBER CRIME
1. Use anti-virus software.
2. Insert firewalls.
3. Uninstall unnecessary software.
4. Maintain backup.
5. Check security settings.
6. Never provide full name,
address, or other personal
information to strangers.
7. Learn more about the internet
privacy.
SPECIAL TOPIC…

THE RISE OF ARTIFICIAL INTELLIGENCE (AI)

Have you joined the


bandwagon?
NOTABLE USES OF AI NOWADAYS

© MAVERICK-AI
NOTABLE USES OF AI NOWADAYS

The ERAs Tour in


Tondo!!
© FACEBOOK
NOTABLE USES OF AI NOWADAYS

© WORLD YMCA
NOTABLE USES OF AI NOWADAYS

© INDIA TODAY
NOTABLE USES OF AI NOWADAYS

© EUROPEAN PARLIAMENT
NOTABLE USES OF AI NOWADAYS

© TURNKEY STAFFING
WHAT IS AI?
ARTIFICIAL INTELLIGENCE

Artificial Intelligence is the simulation of


human intelligence processes by machines,
especially computer systems.

a) Narrow AI (Weak AI): Designed for a particular


task (e.g., virtual assistants).
b) General AI (Strong AI): Capable of
understanding, learning, and performing any
intellectual task that a human can.
HOW AI WORKS

© WEKA
CHALLENGES OF
ARTIFICIAL INTELLIGENCE
1. Ethical concerns
2. Bias in algorithms
3. Job displacement
4. Lack of transparency
5. Data privacy and security
6. Regulatory challenges
7. Explainability and interpretability
8. AI in warfare
THANKS!
What part of the topic did you
least understand? ☺

CREDITS: This presentation template was created by Slidesgo,


including icons by Flaticon, infographics & images by Freepik

You might also like