0% found this document useful (0 votes)
44 views22 pages

Group 3 ASM 01 02

The document discusses various cybersecurity threats like spam, viruses, malware, hackers, and recent security breaches that exposed personal data. It provides solutions to prevent personal information from being exposed like using secure networks, being cautious about sharing information, and creating strong passwords. The document also outlines organizational security procedures around anti-virus, router security, physical security, firewalls, DMZ networks, static IPs, and network address translation (NAT).

Uploaded by

Bob Long
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views22 pages

Group 3 ASM 01 02

The document discusses various cybersecurity threats like spam, viruses, malware, hackers, and recent security breaches that exposed personal data. It provides solutions to prevent personal information from being exposed like using secure networks, being cautious about sharing information, and creating strong passwords. The document also outlines organizational security procedures around anti-virus, router security, physical security, firewalls, DMZ networks, static IPs, and network address translation (NAT).

Uploaded by

Bob Long
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

SECURITY

Group 3
Hà Quang Thống
Group Member

Thái Thị Yến Nhi

Nguyễn Mạnh Hiệp Long

Phạm Vũ Trọng Hiếu

Huỳnh Trần Anh Khoa


Threat

Anything that can gain


access to an asset to harm or
destroy them. It is
dangerous to multiple
devices that are vulnerable
whether it on purposes or
unintentionally.
What is about Spam?

Spam mail or fake email can be sent to random users to try to


spread virus to their computer. Most Gmail nowadays is spam
which is very unfortunately to find out which is real and which
is dangerous. Most spam mail which includes an item or link
can damage your computer
Viruss

Virus always infects your PC and


messing with your personal
information which can corrupt of
even destroy your PC. Sometime
it may slow down your network
and
sometime can track down your
Online password. Virus
nowadays is carefully program to
spread extremely fast to lower
your security at an alarm rate.
Malware

Malware include network spyware and virus


that can invade and harm your PC. Most
malware can even freeze your PC and
disturbed your work and personal life. Spyware
is use to steal your information, bank account
and most info that valuable for the victim.
Hacker

When users or devices


user access the internet to
contact a remote system,
they believe they are
talking directly with the
target system’s serve.
Most attacks exploit this
assumption by putting
themselves between the
user and the target serve
Recent security
breaches

Cyber-attacks were by far the most common type


of security incident in 2021 – although this However, where this information was revealed,
encompasses a broad range of threats. Looking at we discovered some records:
it more specifically, criminal hackers were most · Comcast (1.5 billion) December 1st, 2020
likely to target organisations by gaining · Brazilian resident (660 million) January 19,
unauthorised access to a corporate account. 2021
It’s hard to know definitively how many personal · Facebook (533 million) January 2021
records are compromised each year, because few · LinkedIn (500 million) April 7th 2021
publicly disclosed incidents contain this · Bykea (400 million) 14 November 2020
information. This is typically the case when the
organisation doesn’t know or isn’t obliged to say.
Data breach impact

· From the large number of discovered · Also, user email addresses could be
records and the type of information made targeted by hackers who typically use
available, several negative outcomes could deceptive methods such as infusing leaked
occur including identity theft, fraud, and customer data into email communications
phishing scams. to trigger clickthrough to malicious
· Full names, residential address details, websites and installing malicious software.
ID documents, online login information · Moreover, website backend data could be
and location data could potentially be harnessed to exploit infrastructure
exploited by nefarious users to target including its app and website to generate
unsuspecting people that registered with ransomware attacks or simply to cripple its
the company. servers.
· Car registration and vehicle data could · Back-end technical logs expose not only
potentially be used to conduct insurance personal information but also, data that
fraud and other heinous crimes involving can be weaponized to obtain full control of
stolen identities. the server.
How can you prevent your personal information from being
exposed in a data leak and ensure that you are not a victim of Solutions
attacks – cyber or real-world – if it is leaked?

· Do not click links in emails unless you are


sure that the sender is legitimately who they · Be cautious of what information
represent themselves to be you give out and to whom
· Double-check any social media accounts · Check that the website you are on
(even ones you no longer use) to ensure that is secure (look for https and/or a
the privacy of your posts and personal details closed lock)
are visible only to people you trust · Only give out what you feel
· Avoid using credit card information and confident cannot be used against
typing out passwords over unsecured Wi-Fi you (avoid government ID numbers,
networks personal preferences that may cause
· Find out more about what constitutes you trouble if made public, etc.)
cybercrime, the best tips to prevent phishing · Create secure passwords by
attacks, and how to avoid ransomware combining letters, numbers, and
symbols
Organizational security procedures

1.Anti virus procedure


2.Router security procedure
3.Physical security procedure
Anti virus procedures
Router security procedures
Physical security procedures
Firewall
Presented by :
Hà Quang Thống
What role does a firewall play in security
and what does it do to protect data?
Present by
Huỳnh
Trần Anh
Khoa
DMZ

1) What is DMZ?
2) Why DMZ used for
network security?
3) Examples?
Static IP

Static IP?

Why is used in
security?

Examples?
NAT

You might also like