0% found this document useful (0 votes)
8 views30 pages

Lecture 6

Cyber security involves protecting computing systems and data from threats, with a significant reliance on user awareness and behavior for effective safeguards. Key principles include confidentiality, integrity, availability, accountability, and auditability, while major threats include hackers and malware. Understanding types of hackers, malware, and password security is essential for preventing cyber attacks.

Uploaded by

Fayyaz Uddin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views30 pages

Lecture 6

Cyber security involves protecting computing systems and data from threats, with a significant reliance on user awareness and behavior for effective safeguards. Key principles include confidentiality, integrity, availability, accountability, and auditability, while major threats include hackers and malware. Understanding types of hackers, malware, and password security is essential for preventing cyber attacks.

Uploaded by

Fayyaz Uddin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 30

Introduction to

Cyber Security

Lecture 6

1
WHAT IS CYBER
SECURITY
• Cyber or Computer Security is the protection of
computing systems and the data that these systems
store or access.
• The term cyber security is used to refer to the security
offered through on-line services to protect your online
information.
• With an increasing amount of people getting connected
to Internet, the security threats that cause massive
harm are increasing also.
• It is a combining form relating to information
technology, the Internet, and networks.
2
Why do I need to know
about Cyber Security?
• It is estimated that 10% of security safeguards are technical
in nature. Firewalls and Intrusion Detection devices are a
few devices that can help prevent approximately 10% of
security threats.
• The additional 90% of safeguards rely on each of us. By
understanding and adhering to these safeguards, we can
reduce or eliminate most cyber security threats.
Example: Locking your car doors is the 10%. Making sure
nothing of value is left on the seat, windows are rolled up
and parking in a safe area accounts for the remaining 90%.
4
Meaning of the Word
Cyber
• It is a combining form relating to information
technology, the Internet, and networks.

5
Need of Cyber
Security
• Cyber security is necessary since it helps in securing
data from threats such as data theft or misuse, also
safeguards your system from viruses.

6
Principles of Cyber Security
• Confidentiality: A set of rules that limit access or place
restrictions on certain types of information.
• Integrity: Assurance that the information is trustworthy and
accurate.
• Availability: The guarantee of reliable access to the information
by authorized people.
• Accountability: It is an assurance that an individual will be
evaluated on their performance or behavior related to something
for which they are responsible.
• Auditability: A security audit is the systematic evaluation of the
security of company’s information system by measuring how well it
conforms to a set of established criteria.
7
Major Problems in
Cyber Security
• Hacker
• Malware
• Password cracking

8
Hackers
• In common a hacker is a person who breaks into
computers, usually by gaining access to
administrative controls.

9
Types of Hackers
1. White Hat Hacker: People who are hired by companies to
hack into the company’s system
2. Black Hat Hacker: Specialize in illegal penetration of
systems. Motivated by profit, fun, or political motivation
3. Grey Hat Hacker: A grey hat (greyhat or gray hat) is a
computer hacker or computer security expert who may
sometimes violate laws or typical ethical standards, but
does not have the malicious intent typical of a black hat
hacker.

10
How to Prevent
Hacking
It may be impossible to prevent computer hacking,
however effective security controls including strong
passwords, and the use of firewalls can helps.

11
MALWARE
• The word "malware" comes from the term
"MALicious softWARE."
• Malware is any software that infects and damages a
computer system without the owner's knowledge or
permission.

12
13
14
Types of Malware

15
Viruses
• Definition: Code that attaches itself to clean files or
programs and spreads throughout a system.
• Behavior: Requires user action to activate (e.g.,
opening an infected file).
• Effects: Can corrupt or delete data, slow down
systems, or make them crash.
Worms
• Definition: Self-replicating malware that spreads
without user interaction.
• Behavior: Exploits vulnerabilities in networks or
operating systems.
• Effects: Consumes bandwidth, degrades performance,
and spreads rapidly.
Trojans (Trojan Horse)

•Definition: Malware disguised as legitimate software.


•Behavior: Users are tricked into installing them; often
creating a backdoor.
•Effects: Can steal data, install additional malware, or
give remote access to attackers
Ransomware
•Definition: Encrypts the victim’s data and demands
payment for the decryption key.
•Behavior: Often spread through emails or drive-by
downloads.
•Effects: Causes data loss or business disruption; can
be financially devastating.
Spyware
• Definition: Secretly monitors user activity and
gathers personal information.
• Behavior: May log keystrokes, capture screenshots,
or access sensitive data.
• Effects: Leads to identity theft, financial loss, or
surveillance.
Adware

•Definition: Automatically displays or downloads


advertising content.
•Behavior: Bundled with freeware or shareware;
often considered less dangerous.
•Effects: Slows down systems, invades privacy, or
leads to more severe malware.
Rootkits
• Definition: Designed to gain unauthorized root or
administrative access to a system.
• Behavior: Hides its existence and that of other
malware.
• Effects: Difficult to detect and remove; can
facilitate long-term system compromise.
Botnets
• Definition: Networks of infected computers
controlled by a central server (the “botmaster”).
• Behavior: Used to perform large-scale attacks like
send spam.
• Effects: Exploits infected systems without user
knowledge.
Keyloggers
• Definition: Records keystrokes to capture
passwords, credit card numbers, etc.
• Behavior: Can be hardware- or software-based.
• Effects: Leads to data breaches and personal or
financial information theft.
Fileless Malware
• Definition: Operates in memory without leaving
traces on the disk.
• Behavior: Exploits legitimate tools and processes
(e.g., PowerShell).
• Effects: Hard to detect with traditional antivirus
tools.
To Stop Malware
• Download an anti-malware program that also helps
prevent infections.
• Activate Network Threat Protection, Firewall,
Antivirus.

26
Password Cracking
•Password attacks are attacks by hackers that are
able to determine passwords or find passwords to
different protected electronic areas and social
network sites.

27
28
Securing Password
• Use always Strong password by including combination of
numeric, symbols and (upper and lower case) alphabets.
• Never use same password for two different sites.

29
Q&A

30

You might also like