Download as pdf or txt
Download as pdf or txt
You are on page 1of 35

Notrealcompanyemails

soaaddi.fi ii
winlmi.li
sendsMessagestrickdownia

scam calls
Legalwayofuse won
cardno
credit
useof
Trackemployeeinternet
emailand
spying

fake APPS
Hservices
making

thelaw
Breaking

viruses
8. Changing computer records illegally: This refers to unauthorized alterations or
modifications made to digital records, databases, or files, often with the intent to
deceive or manipulate information for personal gain or to conceal criminal activities.
9. Virus hoaxes: These are false warnings or alerts about nonexistent
viruses or malware circulated via email, social media, or other communication channels,
often causing unnecessary panic or disruption.
10. Sabotage: This entails deliberately damaging or disrupting
computer systems, networks, or infrastructure to undermine operations, cause financial
harm, or achieve other malicious objectives. -.
11.
FocuseProblem
Holding a firm s critical data for ransom: This involves encrypting
or otherwise blocking access to an organization s important data or systems and
demanding payment (a ransom) for its release, typically using a form of malware known
as ransomware.
3. Procedures: These are established protocols and guidelines that dictate how
security measures are implemented, monitored, and enforced within the organization. This may
involve procedures for access control, data backup, incident response, and employee training.
4. Personnel: This involves the people responsible for implementing and managing
the organization s security measures, including IT professionals, security specialists, and employees
who receive security training and adhere to security policies and practices.
This slide introduces the CIA triangle, which represents three
fundamental aspects of computer and network security:

1. Confidentiality: This refers to ensuring that


information is accessible only to those who are authorized to
access it. It involves measures such as encryption, access
controls, and data classification to prevent unauthorized
disclosure of sensitive information.
2. Integrity: This pertains to maintaining the
accuracy and trustworthiness of information resources. It
involves protecting data from unauthorized modification,
deletion, or tampering, ensuring that data remains intact and
unaltered.
3. Availability: This focuses on ensuring that
computers and networks are consistently accessible and
operational. It involves implementing measures such as
redundancy, backups, and disaster recovery plans to minimize

o
downtime and enable quick recovery from system failures or
disasters.

By addressing these three aspects—confidentiality, integrity,


and availability—organizations can establish basic safeguards to
protect their computer and network systems from various
threats and risks.
bulkidetaduruses

site
computers
toruin
tasks
aretimed
destruction
tocreat
Trapdoorbehind
Enterfrom
Outofservice
traffic
floodof
raid phones automated

Botnet: A botnet is a network of computers and Internet of Things (IoT) devices that have been infected with malicious software, allowing them to
be controlled remotely by an attacker without the owners knowledge. Botnets are commonly used to launch DDoS attacks, as each compromised
device can contribute to the attack s volume.
• TDoS (Telephony Denial-of-Service) attacks: TDoS attacks target phone systems by flooding them with a high volume of
automated calls, tying up the system s resources and preventing legitimate incoming and outgoing calls. These attacks can disrupt
communication services and cause financial losses for businesses that rely on telephony systems for their operations
Sure, here's a simplified explanation:

**Social Engineering:**
Social engineering is tricking people to get private information.
Common techniques include:

1. **Dumpster diving:** Going through trash to find sensitive info.


2. **Shoulder surfing:** Watching people enter passwords.
3. **Tailgating:** Following someone into a secure area.
4. **Scareware:** Fake alerts to make people buy useless software.
5. **Pretexting:** Making up stories to get personal info.

It's about manipulating trust to get what the attacker wants.


Hack computer to
money
steal digital
ftp.print
Types of Firewalls:
There are different types:

1. Packet-filtering firewalls: They check each “packet” of data as it travels between networks and decide whether to let it through based on
predefined rules.
2. Application-filtering firewalls: They look at the specific applications or programs sending data and decide whether to allow or block them.
3. Proxy servers: They act as intermediaries between a user s device and the internet, handling requests on behalf of the user and filtering out
potentially harmful content.
likeab0 thatseparates
1. Transforming Data:
• Encryption turns readable data into a scrambled format (ciphertext)
that s unreadable to others.
• To read it, you need a special key to unscramble it (decryption key).
2. Asymmetric Encryption:
• It uses two keys: a public one (known to everyone) and a private one
(known only to the recipient).
• Messages are encrypted using the public key and can only be
decrypted with the private key.
• The downside is that it’s slow and needs a lot of computing power.
3. Symmetric Encryption:
• It uses the same key for both encryption and decryption.
• Both sender and receiver must agree on and keep the key secret.
• It’s faster than asymmetric encryption but sharing the key securely is
tricky.

You might also like