Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

(I)

COMPUTER THREATS
DEFINITON:
A Cyber Attack is an attempt to steal, alter, destroy, disrupt, or
disable information resources and systems found in computer
networks and systems.
Main Types:

Insider Threats: These stem from individuals with legitimate


access to the systems they target. They intentionally or
inadvertently exploit vulnerabilities. Examples include
disgruntled employees or contractors.

Outsider Threats: These come from individuals with no


affiliation to the system they attack, such as criminal
organizations or hackers.

Common Types of Cyber Attacks:


Malware: Malicious software like spyware, viruses, ransom
ware, and worms. It aims to access your system’s data.
Phishing: Deceptive emails or messages that trick users into
revealing sensitive information.
Ransom ware: Holds your data hostage until a ransom is paid.
Denial-of-Service (DS) Attacks: Overwhelm a system,
making it unavailable to users.
Social Engineering: Manipulates human psychology to gain
unauthorized access.
Insider Threats: Employees or contractors intentionally or
accidentally compromise security.
Zero-Day Exploits: Attacks that exploit unpatched
vulnerabilities.
Man-in-the-Middle (MM) Attacks: Intercept
communication between parties.
SQL Injection: Exploits poorly sanitized input in web
applications.
Drive-By Downloads: Malicious code downloads without
user consent.

Manage Computer Threats:

Install Antivirus/Anti-Malware Software:


 Regularly update and run scans to detect and remove
malicious software.
Use Strong Passwords:
 Combine uppercase and lowercase letters, numbers,
and special characters.
Keep Software Updated:
 Regularly update operating systems, browsers, and
applications to patch vulnerabilities.
Backup Data:
 Regular backups protect against data loss due to
attacks.
Implement Firewalls:
 Firewalls filter network traffic and block
unauthorized access.

Educate Users:
 Train employees to recognize phishing attempts and
avoid suspicious links.
Limit User Privileges:
 Only grant necessary access rights to prevent insider
threats.
Monitor Network Traffic:
 Detect anomalies and potential threats.
Encrypt Sensitive Data:
 Protect data in transit and at rest.
Implement Multi-Factor Authentication (MFA):
 Adds an extra layer of security beyond passwords.

(II)
Computer Virus
DEFINITION:
 A computer virus is a malicious software application or
authored code that attaches itself to other programs, self-
replicates, and spreads to other devices.
 When executed, a virus modifies other computer
programs by inserting its code into them.
 If the virus successfully replicates, the affected device is
considered “infected.”

Types of Computer Viruses:


Boot Sector Virus:
 Damages or controls the boot sector on a drive,
rendering the machine unusable.
 Often spread via malicious USB devices.
Web Scripting Virus:
Exploits vulnerabilities in older, unsupported browsers
to run code on local devices.
File Infector Virus:
 Infects executable files, altering their code.
Examples: CIH/Chernobyl virus.
Macro Virus:
 Targets macros in documents (e.g., Word, Excel).
 Spreads through infected files.
Polymorphic Virus:
 Evolves its code to avoid detection.
Metamorphic Virus:
 Rewrites its own code to change appearance.
Resident Virus:
 Remains in memory, infecting files as they load.
Non-Resident Virus:
 Activates only when an infected file is executed.
Multipartite Virus:
 Combines characteristics of other virus types.
Signs of a Computer Virus:
 Sluggish performance.
 Unexpected pop-ups.
 Unusual system behavior.
 Files disappearing or modified.

Examples of Computer Viruses:


 ILOVEYOU: Spread via email attachments, causing
widespread damage.
 Melissa: Infected Microsoft Word documents.
 SASSER: Exploited Windows vulnerabilities.

Remove a Computer Virus:


Use Antivirus Software:
 Regularly scan and remove viruses.

Isolate Infected Devices:


 Disconnect from networks to prevent spread.
Manually Remove Infected Files:
 Delete suspicious files.
Restore from Backups:
 If available, restore clean versions of files.
Preventing Computer Viruses:
Keep Software Updated:
 Install security patches promptly.
Educate Users:
 Train users to recognize phishing emails.
Backup Data Regularly:
 Protect against data loss.
Use Strong Passwords:
 Prevent unauthorized access.
Implement Firewalls and Antivirus Software:
 Block malicious traffic.

(III)
PROTECT DATA ON INTERNET
SECURITY MEASURES:
Use a Secure Internet Connection:
 Avoid using public Wi-Fi for sensitive transactions.
 If you must use public Wi-Fi, employ a Virtual Private
Network (VPN) to encrypt your data.
 Save personal transactions for trusted connections.
Choose Strong Passwords:
 Create passwords that are:
 Long: At least 12 characters.
 A mix of upper-case and lower-case letters,
symbols, and numbers.
 Avoid obvious choices like sequential numbers or
personal information.
Keep Software Updated:
 Regularly update your operating system, browsers, and
applications.
 Install security patches promptly to fix vulnerabilities.
Backup Your Data Regularly:
 Protect against data loss due to Cyber Attacks or
hardware failures.
Use Internet Security Software:
 Install antivirus software to guard against viruses,
malware, and other threats.
 Keep your antivirus updated to stay ahead of evolving
cyber threats.
Tighten Privacy Settings:
 Adjust privacy settings on social media accounts to limit
exposure.
 Share less personal information with apps and services.
Remove Unused Apps and Extensions:
 Delete mobile apps and browser extensions you no longer
need.
Prevent Search Engines from Tracking You:
 Adjust browser settings to limit tracking.
Use a VPN:
 Hide your browsing history and protect your online
privacy.
Don’t Ignore Software Updates:
 Keep your operating system and applications up to date.

You might also like