0% found this document useful (0 votes)
8 views37 pages

Module 13-Computer Security

The document covers essential aspects of computer security, including the dangers of sharing personal information online, the role of cookies and unique identifiers in privacy risks, and various types of cyber threats such as malware and phishing. It emphasizes the importance of the CIA Triad (Confidentiality, Integrity, Availability) in cybersecurity practices and outlines best practices for individuals and organizations to protect against cyber threats. Recommended readings and learning outcomes are also provided to enhance understanding of cybersecurity principles.

Uploaded by

wazirkqasem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views37 pages

Module 13-Computer Security

The document covers essential aspects of computer security, including the dangers of sharing personal information online, the role of cookies and unique identifiers in privacy risks, and various types of cyber threats such as malware and phishing. It emphasizes the importance of the CIA Triad (Confidentiality, Integrity, Availability) in cybersecurity practices and outlines best practices for individuals and organizations to protect against cyber threats. Recommended readings and learning outcomes are also provided to enhance understanding of cybersecurity principles.

Uploaded by

wazirkqasem
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 37

College of Computing and Informatics

CS001: Computer Essentials


Computer Essentials

Module 13

Computer Security
1. Wireless Network Authentication

2. Summarize the danger of sharing personal information


on the Internet.

3. Explain how cookies and global unique identifiers


endanger privacy.

4. Security Threats Posed by Computer Criminals

5. Explain cybercrime and its technique.

6. Spoofing & Sniffing


Contents 7. Discuss different types of malwares.

8. Malicious Programs
1. WLOC1: Summarize the danger of sharing
personal information on the Internet

2. WLOC2: Explain how cookies and global unique


identifiers endanger privacy.

3. WLOC3: Explain cybercrime and its technique.

4. WLOC4: Discuss different types of malwares.

5. WLOC5: How to avoid cybercrime.


Weekly Learning
Outcomes
Required Reading
1. Chapter 32 - (Introduction to Computers and Information
Technology: Preparing for IC3 Certification)

Recommended Reading
1. Chapter 15- Essential for Computing Studies, Profession And Entrance
Examinations
2. Link1:
https://lms.seu.edu.sa/bbcswebdav/pid-11200106-dt-content-rid-19926
0556_1/xid-199260556_1
• Cyber Security
Cyber Security
Cyber security is an essential aspect of
our digital lives, requiring continuous
C effort from individuals, organizations, and
S
governments to protect against a wide
0
0 range of cyber threats.
1

8
Restricted - ‫مقيد‬
Definition of cyber security

Cyber security:

is the practice of protecting computers,


servers,
mobile devices, electronic systems, networks, and

data from malicious attacks, damage, or


C
S
unauthorized access. It encompasses a range of
0
0
techniques and processes designed to safeguard the
1
integrity, confidentiality, and availability of

information and systems that process or store it.

9
Restricted - ‫مقيد‬
CIA Triad

In cyber security, the term "CIA" refers to the CIA Triad, a widely-accepted

model designed to guide policies for information security within an

organization. The three elements of the CIA Triad are:

C Cyber Security
S
0
0 Confidentiality
1

CIA
Integrity Availability

10
Restricted - ‫مقيد‬
CIA Triad

Confidentiality: This aspect of the triad seeks

to prevent sensitive information from

reaching the wrong people, while making

sure that the right people can in fact get it.

This involves encryption, two-factor

authentication, and other methods to ensure

that only authorized individuals have access

to the information. It's about keeping data

private and secure.

Restricted - ‫مقيد‬
CIA Triad

To safeguard confidentiality, organizations use encryption.

Definition: Encryption

is the process

especially oftoconverting
prevent unauthorized access. This or
information
C Cyber Security
S involves using
data an algorithm
into ato transform
code,plain
0
0 text into an unreadable format known as
1
ciphertext. Encryption typically uses keys, which

are secret codes or algorithms used to encrypt

and decrypt the data.


12
Restricted - ‫مقيد‬
CIA Triad

Types of Encryption:

1.Symmetric Encryption: Uses the same key for both encryption

and decryption. It's fast and efficient for large amounts of data but requires

secure
key management since the same key must be shared among users.
C Cyber Security
S
Encryption
0
0
1 Decryption

same key
13
Restricted - ‫مقيد‬
CIA Triad

Types of Encryption:

2.Asymmetric Encryption: Utilizes a pair of keys – a public key and a private

key. The public key is shared openly, while the private key is kept secret.

C Cyber Security
Encryption Decryption
S
0
0
1

Public Private

14
Restricted - ‫مقيد‬
CIA Triad

Integrity: data should not be altered in transit, and steps should be taken to

ensure that data cannot be altered by unauthorized people (for instance,

through access controls or version control). It's crucial for operations that rely

on accurate and reliable data, like financial services.


C Cyber Security
S
0
0
1 The data was not modified

during the sending process

15
Restricted - ‫مقيد‬
CIA Triad

To maintain integrity, implement Hashing.

Definition: Hashing is the process of converting data (of any size) into a fixed-

size value or a hash code using a mathematical function, known as a hash

function. This hash code acts as a digital fingerprint of the data.


C Cyber Security
S
Unique Output: Ideally, each unique input will produce a unique hash. Even a
0
0
small change in the input data will result in a significantly different hash value.
1

Plain Text Hash Function Hash value


16
Restricted - ‫مقيد‬
CIA Triad

Availability: This refers to ensuring that

information is readily available to authorized

users when needed. Measures to ensure

availability
include hardware maintenance,
C Cyber Security
S
software patching/updating, and network
0
0
optimization. Also, in the event of an issue such
1
as a power outage or hardware failure, there

should be a plan in place for recovery to restore

information and systems.


17
Restricted - ‫مقيد‬
CIA Triad

To ensure availability, organizations rely on backup systems.

Definition: Backup creates redundant copies of

data, ensuring that if the primary data source

C Cyber
becomes Security
unavailable (due to issues like hardware
S
0 failure, software corruption, or cyber-attacks),
0
1 there is an alternative source from which the data

can be retrieved. Implementing a schedule for

regular backups (daily, weekly, monthly) to

minimize data loss.


18
Restricted - ‫مقيد‬
Types of Cyber Threats - Malware

Malware, short for "malicious software," refers to any software intentionally

designed to cause damage to a computer, server, client, or computer network.

It is a broad term that encompasses various types of threats on the cyber

landscape. Understanding different types of malware is essential in developing


C Cyber Security
S
effective strategies to protect against them. Here's an overview:
0
0 Types of Malware
1
• Virus: A malicious code that attaches itself to

clean files and spreads throughout a computer

system, infecting files with malicious code.


19
Restricted - ‫مقيد‬
Types of Cyber Threats - Malware

Types of Malware

• Trojan Horse: is hidden in legitimate software. It tends

to creates backdoors in your security to let other

malware in.
C Cyber Security
S
• Worm: A type of malware that spreads copies of itself
0
0
from computer to computer. A worm can replicate
1
itself without any human interaction and does not

need to attach itself to a software program to cause

damage.
20
Restricted - ‫مقيد‬
Types of Cyber Threats - Malware

Types of Malware

• Ransomware: Designed to encrypt a user’s files

and demand payment in exchange for the key to decrypt

them.
C Cyber Security
S • Spyware: A program that secretly records what a user
0
0
does, so that cybercriminals can make use of
1
this
card details.
information. For example, spyware could capture credit
• Keyloggers: Record the keys struck on a keyboard to steal

passwords or other sensitive information.


21
Restricted - ‫مقيد‬
Types of Cyber Threats - Malware

How Malware Spreads

• Email Attachments: Malware can be hidden in email attachments.

• Infected Software: Downloading cracked software can lead to malware

infections.
C Cyber Security
S
• Malicious Websites: Visiting malicious websites can result in malware being
0
0
downloaded and installed without the user’s knowledge.
1
• Removable Drives: USB and other removable drives can be infected and

spread malware when connected to different computers.

22
Restricted - ‫مقيد‬
Types of Cyber Threats - Spoofing
Spoofing The attacker’s computer assumes a false Internet address in order to gain
access to a network. This type of attack used by people who do not have a legitimate
username or password to the network where the data resides. The attacker waits for a
legitimate user to log in, and then hijacks that user’s IP address and takes over.

C Cyber Security
S
0
0
1

23
Restricted - ‫مقيد‬
Types of Cyber Threats - Sniffing
Sniffing is the capability to capture copies of data packets as they travel across
the network and decode their content. Figure below shows an extract from a
sniffing program called Wireshark. The snapshot identifies the address of the
website that the user is visiting (Google.co.uk), the operating system
(Windows), and the browser (in this case, Firefox).
C Cyber Security
S
0
0
1

24
Restricted - ‫مقيد‬
Types of Cyber Threats - Phising

Phishing is a type of cyber attack that involves tricking individuals into

sensitive information, such as login credentials, credit card numbers, and

other personal or financial information. It's one of the most common and

effective types of cyber threats.


C Cyber Security
S Types of Phishing Attacks
0
0 • General Phishing: Generic emails sent
1
to many people, hoping for a few

responses.

25
Restricted - ‫مقيد‬
Types of Cyber Threats - Phishing

Types of Phishing Attacks

• Spear Phishing: attacks aimed at specific


Targeted
individuals or organizations. These are often well-

researched and seem more legitimate.


C Cyber Security
S
• Whaling: A form of spear phishing targeting high-profile
0
0
individuals like senior executives.
1
• Pharming: Redirecting users from legitimate websites to

fraud ones for the purpose of extracting

confidential data.
26
Restricted - ‫مقيد‬
Types of Cyber Threats - Phishing

Considerations to identify Phishing


Phishing emails are getting more sophisticated and harder to recognize, but here are
some considerations that will help you identify them:

• Do you actually have an account with that bank or company? If not, it’s reasonable to
assume the message is an attempt at phishing.
C Cyber Security
• Check the source of the email. Does the email address match the organization’s standard
S
0 email address? Check not only the address that appears as text in the message, but also
0 the address that appears as a ScreenTip when you point the mouse
1 at it.

• If you hover over the link to the company website with your mouse, it shows you the
true URL. Is the address correct?

27
Restricted - ‫مقيد‬
Cyber of Cyber Threats - Phishing
Types
Security
Considerations to identify Phishing
• Are there grammar and spelling mistakes? Does the message appear in the language
you would expect? Even if the body text is in the expected language, are there
buttons or other details with text from another language? These are all indications of
a possible attempt at phishing.
• Notice that the email is from [email protected]. The address
doesn’t end in @apple.com.
C
S
0
0
1

28
Restricted - ‫مقيد‬
An example of a phishing email.
Cyber
Types of Cyber Threats - Phishing
Security
Considerations to identify Fake credentials screen.
you would see the screen below that appears to be the Apple login
screen, as result of clicking suspected embedded links. The page may look
authentic, but the URL indicates that it is not the official Apple website.
The presence of the padlock icon is no guarantee that the page is truly
secure.

C
S
0
0
1

29
Restricted - ‫مقيد‬
Fake credentials screen.
Types of Cyber Threats – Phishing email

Considerations to identify Email Phishing

• Remember that real companies and banks never ask for personal
information
• Legitimate banks and other companies will never send an email asking you to submit
C Cyberpersonal
sensitive Security
information online.
S
• Never click on the links in suspected emails.
0
0 • As a good Internet citizen, you should report the emails to the bank or other company
1
to make them aware of the phishing attempts.
• Recipients of phishing email should delete them without opening them. If they do
open the mail by mistack, they should not click on the embedded link.

30
Restricted - ‫مقيد‬
Types of Cyber Threats - Malware

Prevention and Mitigation

• Antivirus Software: Use antivirus software and keep it updated.

• Software Updates: update all software, including operating systems and

applications.
C Cyber Security
S
• Email Caution: Be with email attachments and links from
0
cautious
0
1
unknown or untrusted sources.
• Backups: Regularly backup important data to recover in case of a malware

infection.

31
Restricted - ‫مقيد‬
Types of Cyber Threats - Phishing

Prevention and Protection Strategies

• Education and Awareness: Training users to recognize and report phishing

attempts.

• Use of Spam Filters: Implementing email filtering solutions to


C Cyber
catch
Security
S
potential phishing emails.
0
0
• Regular Updates and Security Measures: Keeping systems and software
1
up-to-date with security patches.

• Two-Factor Authentication (2FA): Using 2FA can prevent unauthorized

access, even if login details are compromised.


32
Restricted - ‫مقيد‬
Best practices in cyber security

Adopting best practices in cyber security is essential for both individuals and

organizations to protect against a wide array of cyber threats. Here's a

comprehensive list of best practices:


1. Use Strong, Unique Passwords

• Avoid common words and simple phrases.

• Use a mix of letters (both and lowercase), numbers, and


uppercase
symbols.

• Consider using a passphrase or a password manager to generate and store

complex passwords.

Restricted - ‫مقيد‬
Best practices in cyber security

2. Implement Multi-Factor Authentication (MFA)

• Use additional verification methods beyond just passwords,

like OTPs (One-Time Passwords), biometric verification, or

security tokens.
C Cyber Security
S
3. Regular Software Updates and Patch Management
0
0
• Keep all software, including operating systems
1
and

applications, up-to-date with the latest security patches.


• Automate updates where possible to ensure
timely

application.
34
Restricted - ‫مقيد‬
Best practices in cyber security

4. Use Antivirus and Anti-Malware Solutions

• Install reputable antivirus and anti-malware programs.

• Keep these programs updated and run regular scans.

5. Regular Backups
C Cyber Security
S
• Backup important data regularly.
0
0
• Use multiple methods, such as cloud storage
1
and
external hard drives.

• Ensure backups are secure and easily recoverable.

35
Restricted - ‫مقيد‬
Reference
s
• Weixel, S., (2018). Introduction to Computers and Information
Technology. Pearson.
• Wepmen, F. (2014). Computing Fundamentals. (IC3 EDITION). Wiley
Thank You

You might also like