Lecture (1) Introduction To Computer
Lecture (1) Introduction To Computer
Kismayo University
Learning Objectives
Broadly speaking, you can say that hackers attempt to break into
1) There's criminal is for financial gain, meaning the theft of credit card
numbers
Warta or defrauding
Nabada Districtbanking systems.
A black hat hacker is the type of hackers that you should be worried.
If you heard a news about a new cybercrime today? One of the black hat hackers may be
behind it.
While their agenda may be monetary most of the time, it’s not always just that. These
hackers look for vulnerabilities in individual PCs, organizations and bank systems.
Warta Nabada District
Using any loopholes they may find, they can hack into your network and get access to your
personal, business and financial information.
3. Gray Hat Hackers
Gray hat hackers fall somewhere in between white hat hackers and black hat hackers.
While they may not use their skills for personal gain, they can, however, have both good
and bad intentions.
For instance, a hacker who hacks into an organization and finds some vulnerability may
leak it over the Internet or inform the organization about it.
A grayWarta Nabada
hat hacker is not aDistrict
White hat hacker. because he is not legally authorized to hack the
organization’s cybersecurity, he can’t be considered a Black hat either.
4. Script Kiddies
A derogatory term often used by amateur hackers who don’t care much about the coding
skills. These hackers usually download tools or use available hacking codes written by
other developers and hackers.
Their primary purpose is often to impress their friends or gain attention.
Hacker’s Hats
5. State/Nation Sponsored Hackers
State or Nation sponsored hackers are those who have been employed by
their state or nation’s government to investigate and penetrate through full
security to gain confidential information from other governments to stay at
the top online.
They have an endless budget and extremely advanced tools for their activities
to reach their target.
6. Hacktivist
Malware can reveal itself with many different aberrant behaviors. Here are a few signs that
indicates whether you have malware on your system or not:
Your computer slows down. One of malware’s side effects is to reduce the speed of
Warta Nabada District
your operating system (OS), whether you’re navigating the Internet or just using your local
applications.
Continue….
Your screen is overpower with annoying ads. Unexpected pop-up ads are
a typical sign of a malware infection.
Your system crashes. This can come as a freeze or a BSOD (Blue Screen of
Death).
You notice a mysterious loss of disk space. This could be due to malware
Warta Nabada District
squatter or intruder, hiding in your hard drive aka Bundleware.
Continue….
Your browser settings change. If you notice your homepage changed or
you have new toolbars, extensions, or plugins installed, then you might
Training of 60 small business proprietors on:-
have some sort of malware infection.
Your antivirus product stops working and you cannot turn it back on,
leaving you unprotected against the sneaky malware that disabled it.
Warta Nabada District
Continue….
How do I get malware?
The two most common ways that malware accesses your system are the Internet and email.
So basically, anytime you’re connected online, you’re vulnerable.
Most Common Forms of Malware
1) Adware is unwanted software designed to throw advertisements up on your screen, most
often within a web browser.
WartaisNabada
2) Spyware malware District
that secretly observes the computer user’s activities without
permission and reports it to the software’s author.
Continue….
3) A virus is a program which can harm our device and files and infect them for no further
use.
4) A Trojan, or Trojan horse, is one of the most dangerous malware types. It usually
represents itself as something useful in order to trick you. Trojans can be used to steal
financial information or install other forms of malware, often ransomware.
5) Ransomware is a form of malware that locks you out of your device and/or encrypts
Warta
your Nabada
files, then forcesDistrict
you to pay a ransom to regain access.
Ransomware has been called the cybercriminal’s weapon of choice.
Continue….
6) A keylogger is malware that records all the user’s keystrokes on the keyboard, typically
storing the gathered information and sending it to the attacker, who is seeking sensitive
information like usernames, passwords, or credit card details.