Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

CYBER SECURITY

MODULE 5
CYBERCRIME
VS
CYBER THREAT
What is Cyber security?
● Is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.

● Can be classified into 6 common categories


○ Network Security
○ Application Security
○ Information Security
○ Operational Security
○ Disaster recovery and business continuity
○ End-user education
Types of Cyber Threats as of 2021
● Ransomware
● Cryptojacking
● Threats against data
● Malware
● Disinformation/Misinformation
● Threats against availability and Integrity
● Email related threats
● Supply Chain threats
Types of Cyber Threats as of 2021
● Ransomware
○ Malicious software designed to prevent a user or organization from accessing files on their
computer

● Cryptojacking
○ A type of threat that embeds itself within a computer or mobile device and uses its resources
to mine cryptocurrency

● Threats against data


○ Data breaches/leaks
Types of Cyber Threats as of 2021
● Malware
○ Malicious software designed harm or exploit a computer or system

Common Examples:

Virus: self replicating program

Trojan: malware disguised as a legitimate software

Spyware: a malware that collects user information


Types of Cyber Threats as of 2021
● Disinformation/Misinformation
○ Spreading of misleading information

● Threats against availability and integrity


○ Attacks that prevent users of a system from accessing their information

● Email related threats


○ Attacks that aim to manipulate people via email (Phishing)
Types of Cyber Threats as of 2021
● Supply Chain Threats
○ Attacks on service providers to gain access to customer data
QUESTIONS?
Activity
Read about the most recent data breach on Microsoft by Lapsus$ and answer the
following:

1. How did Lapsus$ manage to hack Microsoft?


2. What was the extent of the damage by the said attack?
3. Describe Lapsus$ as an organization

1 Long bond Paper

DEADLINE: July 21, 2022


READ ON THIS PLEASE!
● Read in advance about social engineering!
● 20pts –

You might also like