Professional Documents
Culture Documents
ICT
ICT
COMPUTER THREATS
DEFINITON:
A Cyber Attack is an attempt to steal, alter, destroy, disrupt, or
disable information resources and systems found in computer
networks and systems.
Main Types:
Educate Users:
Train employees to recognize phishing attempts and
avoid suspicious links.
Limit User Privileges:
Only grant necessary access rights to prevent insider
threats.
Monitor Network Traffic:
Detect anomalies and potential threats.
Encrypt Sensitive Data:
Protect data in transit and at rest.
Implement Multi-Factor Authentication (MFA):
Adds an extra layer of security beyond passwords.
(II)
Computer Virus
DEFINITION:
A computer virus is a malicious software application or
authored code that attaches itself to other programs, self-
replicates, and spreads to other devices.
When executed, a virus modifies other computer
programs by inserting its code into them.
If the virus successfully replicates, the affected device is
considered “infected.”
(III)
PROTECT DATA ON INTERNET
SECURITY MEASURES:
Use a Secure Internet Connection:
Avoid using public Wi-Fi for sensitive transactions.
If you must use public Wi-Fi, employ a Virtual Private
Network (VPN) to encrypt your data.
Save personal transactions for trusted connections.
Choose Strong Passwords:
Create passwords that are:
Long: At least 12 characters.
A mix of upper-case and lower-case letters,
symbols, and numbers.
Avoid obvious choices like sequential numbers or
personal information.
Keep Software Updated:
Regularly update your operating system, browsers, and
applications.
Install security patches promptly to fix vulnerabilities.
Backup Your Data Regularly:
Protect against data loss due to Cyber Attacks or
hardware failures.
Use Internet Security Software:
Install antivirus software to guard against viruses,
malware, and other threats.
Keep your antivirus updated to stay ahead of evolving
cyber threats.
Tighten Privacy Settings:
Adjust privacy settings on social media accounts to limit
exposure.
Share less personal information with apps and services.
Remove Unused Apps and Extensions:
Delete mobile apps and browser extensions you no longer
need.
Prevent Search Engines from Tracking You:
Adjust browser settings to limit tracking.
Use a VPN:
Hide your browsing history and protect your online
privacy.
Don’t Ignore Software Updates:
Keep your operating system and applications up to date.