Cyber Security (Module 2)
Cyber Security (Module 2)
Cybar tanay
inin aJs plam n )
b r e y nh am pres
orms Vdnaríibs
eX
Vmse
nduee roj oms
DNS Ma Sawd
Sen Semd
Su h
nemel
Ppphn pp
Sand
D
Cvis Sero
Sav
me heds 4
Cnmin d s woe m
hair
Hs of
Vnnercb
en orqamizaim
ndiidael
am
aHal>
penesva
a c h v e am d
he twm)
achve atuc
mal ahm
Jan
atLS
7 mt
Do s i v e ha pk
Ketonnms9anCa
e Connstenn
O
wh
h a ome i n
ofn
plore,
T 9 m ebud
n
tomaabon ah
SHeybh otpinti
preatou phaobe
Poopin
e Eumt
Aphon d
isens to al m wm
hetworu intertaca
pem-Souwe s ofoare )
MC aodre paus
PoB Pmed ecas
»
C©Pan-S a
Ye a s Tep) je mil P
4 nd e DP spasa
a
nahdo Cloca )
map
n di d P CpemSow
ma-swremant ool
badm pin
bvndwid H
n swn valnarw ha .
/Bg
Partmn
datla ai wband Dnsrecrds
Zon, x a t Conhgmhm
the dofa s o r a iv em
d tuol to detemi
DNStecar
DNS SaTN
whle
e s t e p b exomi indallig
abw
He tarat
othe
inmm
ahum
objech va
Port scamning
to w h h
ntertae
m e Com paler
an
Port
o
d e n i Ce
Can Conne
o to le23)
well nwn poxk
Yesarad pors.
Prvate park
dmemic an d/er
Lcam p
Dasur ph
Pornmber
CTCPMUX
CHo
FTP Deta
2
Sple Mo
sMTPC
2S ho tot )
n ster
H TT
fof
PoPS
SaL Sa a
8
S a t Sava
CeGf
s DHCP an4
9
DHCP Sevar
2shn wealuned
S can wnderstun d e
Vu)nerab t
n ha áshm
he System Acces )
Mantaining
AHace CGainig
CYau
Hhe Passwee
)
2) Eplit
a
p vikge
ppfcahs
amds
mali cio com m
Kun he
3)
hhe
l
hde
4)
aceces s
S)Delete
he
edhnsqma to intlenca
Y pafom
to o btin ha in ommahin
daceive
access
wnanhemzud
hve
infomahm
/
qainsengî tAmah o
wadnaubla
provtding
omaona
t ou
ss to hat inb m a h m .
acco
Classi Scahns
employ a valM
m rerson ohr m or
Ama
onesa (f e s m emplogee a
ros
ogm zahn
o d engineers a l a adra of h e f c k hak * >*
o
isans h onwm s
Peopla ore
oically halpfa), o
wer He
on
ram
amthen
us in a hird p r
shaldar Sarhn
vesh P infomahn
tems ael
ih Uk-
ingSppi D)
Compe bosa Soui enineeing
L e E-madls
phshing
rasea persune 3msi hde homah
to
Scammin Passwods
m e atahmen h
mal aow de to c
vrcth m s s t e n
S, woms, VInus
wmm o me a
Pap- p windaws
Cybersl ki
a t or rocess f o Ilo wig preStenltniy
oYSo matti n
ina p pe ah Somebe d
Deinihum
amd
infom ah m
bean dlehined he se ot
+has
pohalar *e dntone
Commwnicah'ms
technouy,
ofindividuals o howass
b n n dividna ogonp
o niZahm
m oh e indivdua r o p of ndividuas,
His
behaniv helus Ale accuSahn S aniam
of threa, LD he FEdonage
to d Y
nsmissíun
1) Online StulKes
PPIine s tulkers
22)
On line stalkers
he v Chm
wth
thter hm
Stnt he
Onm ternet
he
help of
with h a
direct
4 c h a t ooms)
CEmo
St1Ker can ma Va
he vichm
OPine stal h e s
whngendind mehels
abrn
e
uiehm wnn
9her
inomahn
tarnat
Jntemnk h a
awse nat HL
Vichm is not
he hdim
perpemue
an attre dL ogaunst
o
lbea ueo
m ybars l Kina
Cas eYeportad
worlUS în ha
followina we
ha Vichm
n a m ar peYSmad in om ahn ahm
E mai).
wih a vicRms thre h
-
of w o r s
4) Repaakad E-mils oslng b r Vanew cnds
/
hrum ha Vichm.
Hhreatem
shore
S) ne Salor Vichm$ porcm marin un
Pos a
website b a oPPensive langn
mel.