Professional Documents
Culture Documents
Cyber Security and Internet
Cyber Security and Internet
Cyber Security and Internet
1
Cyber Threat?
A Cyber threat is an illegal activity that could lead to
adverse consequences on cyber resources.
2
Some Cyber Threats Are
Viruses Hackers
Viruses infect computers Hackers are people who
through email attachments trespass into your
and file sharing. They delete computer from a remote
files, attack other computers, location. They may use your
and make your computer run computer to send spam or
slowly. One infected viruses, host a Web site, or
computer can cause do other activities that cause
problems for all computers computer malfunctions.
Identity Thieves
on a network. Spyware
People who obtain Spyware is software that
unauthorized access to your piggybacks on programs
personal information, such you download, gathers
as Social Security and information about your online
financial account numbers. habits, and transmits
They then use this personal information without
information to commit crimes your knowledge. It may also
such as fraud or theft. cause a wide range of other 3
Types of Cyber Attacks
Natural attacks are originating from natural disaster like fire,
floods, windstorms, lightening and earthquakes
Human blunders, errors, and omissions including things like
unintentional human actions
Intentional threats like illegal or criminal acts from either insiders
or outsiders, recreational hackers, and criminal
Denial of Service Attacks are affect the system through diminishing
the systems ability to function. Hence, they are capable of
bringing a system down without destroying its resources
4
What is cyber security?
Cyber security is the body of technologies, processes and practices
designed to protect networks, computers, programs and data from attack,
damage or unauthorized
What is a Cyber Crime?
Cyber crime encompasses any criminal act dealing with computers and
networks (called hacking). Additionally, cyber crime also includes
traditional crimes conducted through the Internet.
Cybercriminals use the Web to serve malicious content capable of
compromising users' computers and running arbitrary code on them.
5
TOP SEVEN CYBER-SAFETY ACTIONS
We should take in account following seven actions to ensure cyber safety. Additional
information about each of the actions below is provided on slides 7-14.
5. Avoid Spyware/Adware
6. Protect Passwords
6
I NSTALL OS/S OFTWARE U PDATES
Updates-sometimes called patches-fix problems with your operating system (OS) (e.g., Windows XP,
Windows Vista, Mac OS X) and software programs (e.g., Microsoft Office applications).
Most new operating systems are set to download updates by default. After updates are downloaded,
you will be asked to install them. Click yes!
Be sure to restart your computer after updates are installed so that the patches can be applied
immediately.
7
R UN A NTI -V IRUS S OFTWARE
Sophos can also be downloaded for free from the Web site
(https://my.ucdavis.edu/software/).
8
P REVENT I DENTITY T HEFT
Once your firewall is turned on, test your firewall for open ports that could allow in
viruses and hackers. Firewall scanners like the one on
http://www.auditmypc.com/firewall-test.asp simplify this process.
Hackers search the Internet by sending out pings (calls) to random computers and
wait for responses. Firewalls prevent your computer from responding to these calls.
10
T U R N O N P E R S O N A L F I R E WA L L S
CONTINUE.
11
T U R N O N P E R S O N A L F I R E WA L L S
CONTINUE.
12
AVOID S PYWARE /A DWARE
Spyware and adware take up memory and can
slow down your computer or cause other
problems.
Use Spybot and Ad-Aware to remove
spyware/adware from your computer.
Watch for allusions to spyware and adware in
user agreements before installing free software
programs.
Be wary of invitations to download software from
unknown internet sources.
13
P ROTECT PASSWORDS
Do not share your passwords, and always make new passwords difficult to guess by
avoiding dictionary words, and mixing letters, numbers and punctuation.
Do not use one of these common passwords or any variation of them: qwerty1, abc123,
password1, iloveyou1, (yourname1), baseball1.
14
B ACK U P I MPORTANT F ILES
Reduce your risk of losing important files to a virus, computer crash, theft or
disaster by creating back-up copies.
Keep your critical files in one place on your computers hard drive so you can
easily create a back up copy.
Save copies of your important documents and files to a CD, online back up
service, flash or USB drive, or a server.
Store your back-up media in a secure place away from your computer, in
case of fire or theft.
Test your back up media periodically to make sure the files are accessible
and readable.
15
The End
Questions?
Thank You!
16