Chapter # 5
Chapter # 5
A session starts when you launch a website or web app and ends
when you leave the website or close your browser window.
ARE USED IN ONLINE ALLOW PROGRESS IN ONLINE ALLOW SOCIAL NETWORKING ALLOW DIFFERENT STORE USERS’ PREFERENCES
FINANCIAL TRANSACTIONS GAMES AND QUIZZES TO BE SITES TO RECOGNISE CERTAIN LANGUAGES TO BE USED ON (FOR EXAMPLE, RECOGNISE
STORED PREFERENCES AND BROWSING THE WEB PAGES CUSTOMISED WEB PAGES)
HISTORIES AUTOMATICALLY AS SOON AS
USERS LOG ON.
Digital currency
Cryptocurrency, as the name, implies It exists only on the internet and is The issuance, distribution, and other Transactions are almost impossible to
is a form of digital currency backed by not controlled or issued by any central monetary policies are hard-coded into reverse and stored on the database
cryptography. party such as your local bank. a decentralized computer network forever.
that all participants can easily verify.
Blockchaining
• data interception
• distributed denial of service (DDoS) attacks
• hacking
• pharming
• social engineering.
Distributed denial-of-service (DDoS) attack
A flood of traffic from users who share a single behavioural profile, such as device type,
geolocation, or web browser version.
Odd traffic patterns such as spikes at odd hours of the day or patterns that appear to be
unnatural (e.g. a spike every 10 minutes).
How to guard against DDoS attack
1 2 3
using an up-to-date setting up a firewall to applying email filters
malware checker restrict traffic to and to filter out unwanted
from the web server traffic (for example,
or user’s computer spam).
Brute force attack
• A brute force attack is a hacking method that uses trial and error to crack passwords, login
credentials, and encryption keys.
• It is a simple yet reliable tactic for gaining unauthorized access to individual accounts and
organizations’ systems and networks.
• The hacker tries multiple usernames and passwords, often using a computer to test a
wide range of combinations, until they find the correct login information.
Hacking
• Hacking is generally the act of gaining illegal access to a computer system without the
user’s permission.
• This can lead to identity theft or the gaining of personal information; data can be deleted,
passed on, changed or corrupted.
• Hacking in cyber security refers to the misuse of devices like computers, smartphones,
tablets, and networks to cause damage to or corrupt systems, gather information on
users, steal data and documents, or disrupt data-related activity.
Types of hacking
Ethical hacking
• An authorized attempt to acquire unauthorized access to a computer
system, application, or data is referred to as ethical hacking.
• Duplicating the techniques and behaviours of malicious attackers is part
of ethical hacking.
• This approach helps detect security flaws, which can subsequently be
addressed before a malevolent attacker can exploit them.
Types of hacking
Malicious hacking
• Malicious hackers, also referred to as black hat hackers operate with malicious intent to
compromise security, steal sensitive data, or disrupt systems.
• Their motivation varies from financial gain to ideological reasons, seeking personal benefit
at the expense of others.
Types of
malwares
Phishing
• Phishing occurs when a cybercriminal sends
out legitimate-looking emails to users.
• The emails may contain links or
attachments that, when initiated, take the
user to a fake website; or they may trick the
user into responding with personal data (for
example, bank account details or
credit/debit card details).
How to prevent phishing attacks?
• users need to be aware of new phishing scams;
• it is important not to click on any emails links unless totally certain that it is
safe to do so;
• it is important to run anti-phishing toolbars on browsers since these will
alert the user to malicious websites contained in an email.
• always look out for https or the green padlock symbol in the address bar.
• regular checks of online accounts are also advisable as well as maintaining
passwords on a regular basis.
• ensure an up-to-date browser is running on the computer device
• be very wary of pop-ups and use the browser to block them;
Pharming