0% found this document useful (1 vote)
147 views

Cyber Security Powerpoint

The document discusses various types of cyber attacks and malware, including social engineering, Trojan horses, worms, ransomware, adware, and spyware. Social engineering involves manipulating people to gain sensitive information. Trojan horses and worms can damage systems, copy or delete data, and spread automatically. Ransomware encrypts data until a ransom is paid. Adware and spyware collect user information and display unwanted ads. Protection methods include firewalls, security software, authentication, physical security measures, and employee training.

Uploaded by

api-295963445
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
147 views

Cyber Security Powerpoint

The document discusses various types of cyber attacks and malware, including social engineering, Trojan horses, worms, ransomware, adware, and spyware. Social engineering involves manipulating people to gain sensitive information. Trojan horses and worms can damage systems, copy or delete data, and spread automatically. Ransomware encrypts data until a ransom is paid. Adware and spyware collect user information and display unwanted ads. Protection methods include firewalls, security software, authentication, physical security measures, and employee training.

Uploaded by

api-295963445
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Cyber Security

BY: ZACHARY CLAUSEN


Types of Attacks/Malware

 Social Engineering
 Trojan Horse
 Worm
 Ransomware
 Adware
 Spyware

Image Credit: enzozo /Shuttershock


Social Engineering

Steal Information by:


 Impersonating an employee
 Sneaking into the building and gathering employee
information
 Dumpster dive for sensitive information not properly
disposed of
Trojan Horse Virus

These are malware that disguise themselves as an innocent


looking programs so you download them.

They can do a wide variety of things such as:


 Damage systems
 Copy data
 Delete data
 Block data
Worm

Worms are viruses that don’t require the aid of a human to


replicate or help infect other systems. All they do is look for
a vulnerability and enter through it. They are viruses that
are:
 Self replicating
 Self transmitting
Ransomware

Ransomware is a malware that holds the data on a system


hostage until an action is performed. It can be to pay a
certain account a sum of money or perform a certain task.
What is certain is the data held hostage can be:
 Deleted
 Sold
 Copied
Adware

 Adware is a malware that forces ads to be downloaded or


displayed without the users consent.
 It can redirect you to a site where ads are heavily present
and often not the site you initially wanted to go to.
 It gathers information on the user without the users
knowledge or consent.
Spyware

 A malware that secretly gathers information about a user


or system and sends it somewhere.
 Information can be what’s on the hard drive or it can be
what the user does.
 It can track keystrokes to gather data on what you
typically type which can lead to what passwords you use.
Protection/Prevention

Digital Physical
 Firewalls  Cameras
 Regular system scans  Electronic locks
 Up-to-date security  Security guards
 Two-factor authentication  Electronic badges
 Turnstiles
 Two door access rooms
 Protocols in employee handbook

Image Credit: popetech


References
 Engel, K., & Harvey, J. W. (2010, June 01). Influence of Awareness and Training on Cyber Security. Retrieved February 09,
2018, from Web.
 Granger, S. (2001, December 18). Social Engineering Fundamentals, Part I: Hacker Tactics. Retrieved February 9, 2018,
from Web.
 Hutcheson, D. (2007, June 19). Business Risks and Security Assessment for Mobile Devices . Retrieved February 09, 2018,
from Web.
 Thompson, S. T. (2006, December 01). Helping the Hacker? Library Information, Security, and Social Engineering. Retrieved
February 10, 2018, from Web.
 Woszczynski, A. B., & Green, A. (2017). Learning Outcomes for Cyber Defense Competitions. Journal Of Information
Systems Education, 28(1), 21-41.

You might also like