Module 4 Cyber Security
Module 4 Cyber Security
Cyber Law
Module 4 Cyber Security
Cyber Security is a process that's designed to protect networks
and devices from external threats;
Cyber • Phishing
The X-Force Threat Intelligence Index reports that scammers can use
message manually.
7. Raise awareness.
Strong passwords are vital to good online security. Make your password
changing it regularly
Create a password policy for your business to help staff follow security best
read the National Cyber Security Centre's (NCSC) guide on using passwords
to protect your data and consider different password strategies that could
Application messages.
1. Email messages
3. Web security
Types of method;
Cryptograp 2. Hash Functions: In this algorithm, no key is used. The plain text is
• Integrity: Information cannot be altered while it is being stored or sent from the
sender to the intended destination without the recipient spotting the addition of new
information in Cryptography.
Cryptograp • Authentication: The identities of the sender and the recipient have been
confirmed. Furthermore, the information's source and final destination are confirmed.
The secret key is used to encrypt data, and after decoding, the
secret key and encoded message are sent to the recipient;
Apart from that, there are cloud-based firewalls. They are commonly
referred to as FaaS (firewall as a service). A primary advantage of using
cloud-based firewalls is that they can be managed centrally. Like
hardware firewalls, cloud-based firewalls are best known for providing
perimeter security.
Some of the important risks of not having a firewall are:
devices accessible to everyone. This means that anyone can access our
device and have complete control over it, including the network. In this
case, cybercriminals can easily delete our data or use our personal
our network and shut it down. It may lead us to invest our valuable
Firewall
two end systems;
5. Next Generation Firewalls: Many of the latest released firewalls are usually
defined as 'next-generation firewalls. This type of firewall is usually defined
as a security device combining the features and functionalities of other firewalls;
Continued…..
6. Threat Focused Next Generation Firewalls: Threat-focused NGFW
includes all the features of a traditional NGFW. Additionally, they also
provide advanced threat detection and remediation;
against viruses and dangerous malware of all varieties. This user-friendly antivirus software is
Types of compatible with all four major operating systems and smart homes, and it also includes a free
VPN with a daily limit of 200MB, parental controls, camera protection, a password manager,
Anti-virus etc. This security suite is reasonably priced and will protect up to five devices 24 hours a day,
2. AVAST: This is a free antivirus available. All you have to do to obtain top-notch protection
on your computer, emails, downloads, and instant messages in the free version is register (for
free) once a year. It includes a sophisticated heuristics engine that enables it to detect viruses.
3. Panda: It can detect viruses, trojans, spyware, adware, worms, and malware at the same
level as other antiviruses do. It is different from others because using this software, when you
scan your computer, it doesn’t consume any of your computer’s resources instead, it runs in
spam websites as one of the most common ways to infect your computer and
destroy your files. Antivirus acts against harmful virus-infected adverts and websites
• Hackers and data thieves are thwarted: Antivirus do regular checks to see if
Benefits of there are any hackers or hacking-related apps on the network. As a result, antivirus
Software • Protected against devices that can be detached: Antivirus scans all removable
restricts your online access in order to prevent you from accessing unauthorized
networks. This is done to ensure that you only visit websites that are safe and non-