Malware (malicious software) is a program or code that is designated to infiltrate a system and execute
malicious operations and controls.
     Computer viruses, worms, and Trojan horses are classified as malware, which are programs that act without
    a user’s knowledge and deliberately alter the computer’s operations.
     The payload is the destructive event or prank the program is intended to deliver.
     A computer infected by a virus, worm, or Trojan horse often has one or more of the following symptoms:
         • Screen displays unusual message or image
         • Music or unusual sound plays randomly
         • Available memory is less than expected
         • Existing programs and files disappear
         • Files become corrupted
         • Programs or files do not work properly
         • Unknown programs or files
         • System properties change mysteriously appear
                                        Common Types of Cyber Attacks/ Malware
    Denial-Of-Service Attacks
        Also called distributed denial-of-service (DDoS) attack
        It consists of making repeated requests of a computer system or network, thereby overloading it and
           denying legitimate users access to it.
        may come from a single computer or from hundreds or thousands of computers that have been taken
           over by those intending harm.
    Worms
         a program that copies itself repeatedly into a computer’s memory or onto a disk drive.
         Sometimes it will copy itself so often it will cause a computer to crash.
         In 2008–2009, a worm known as Conficker or Downadup, spread through a Microsoft Windows
            vulnerability that allowed guessing of network passwords and by people hand-carrying such gadgets as
            USB keys, infected millions of computers.
    Viruses
         is a “deviant” program, stored on a computer floppy disk, hard drive, or CD, that can cause unexpected
            and often undesirable effects, such as destroying or corrupting data.
         The famous email Love Bug (I LOVE YOU), which originated in the Philippines in May 2000 was both a
            worm and a virus, spreading faster and causing more damage than any other bug before it.
         A virus called Koobface attacked Facebook.
    Trojan Horses
        is a program that pretends to be a useful program, usually free, such as a game or screen saver, but
           carries viruses, or destructive instructions, that perpetrate mischief without your knowledge.
        It may allow so-called backdoor programs to be installed.
        A backdoor program is an illegal program that allows illegitimate users to take control of your computer
           without your knowledge.
                                          HOW MALWARES ARE SPREAD
    Worms, viruses, and Trojan horses are passed in the following ways:
       By infected floppies or CDs
       By opening unknown email attachments
       By clicking on infiltrated websites
       Through infiltrated Wi-Fi hot spots
                                          WAYS TO MINIMIZE VIRUS ATTACKS
    Some tips for minimizing the chances of infecting your computer are as follows:
    • Don’t open, download, or execute any files, email messages, or email attachments if the source is unknown
     • Delete all spam and email messages from strangers. Don’t open, forward, or reply to such messages.
    • Back up your data files regularly, and keep the backup hard drive (external) or whatever in a location separate
    from your computer
    • Make sure you have virus protection software
    • Buying a new computer with antivirus software on it does not mean you are automatically protected. You
    have to register it with the designer company, and you need to receive antivirus updates.
    • Scan your entire system with antivirus software the first time it’s installed; then scan it regularly after that.
    • Update your antivirus software regularly.
    • If you discover you have a virus, you can ask McAfee or Norton to scan your computer online.
                                                     CYBERINTRUDERS
Internet Trolls
     An internet troll is someone who makes intentionally inflammatory, rude, or upsetting statements online to
    elicit strong emotional responses in people or to steer the conversation off-topic.
Cyber spies
     Cyber espionage, or cyber spying, is a type of cyberattack in which an unauthorized user attempts to access
    sensitive or classified data or intellectual property (IP) for economic gain, competitive advantage or political
                                                                                                                          1
    reasons.
Hackers
     as computer enthusiasts, people who enjoy learning programming languages and computer systems
     as people who gain unauthorized access to computers or networks, often just for the challenge of it.
     Thrill-seeker hackers: Thrill-seeker hackers are hackers who illegally access computer systems simply for
    the challenge of it. Although they penetrate computers and networks illegally, they don’t do any damage or steal
    anything; their reward is the achievement of breaking in.
                White-hat hackers. White-hat hackers are usually computer professionals who break into
               computer systems and networks with the knowledge of their owners to expose security flaws that
               can then be fixed. The “white hat” refers to the hero in old Western movies. Kevin Mitnik, a tech
               security consultant.
Cyber Thieves
    A cyber thief (known as cybercriminal) is a person who uses his skills in technology to do malicious acts and
       illegal activities known as cybercrimes.
    Cyberthieves and cybercriminals are widely available in what is called the “Dark Web” where they mostly
       provide their illegal services or products.
    Types of Cyber Thef
        1. Phishing and Scam
     Phishing is a type of social engineering attack that targets the user and tricks them by sending fake
    messages and emails to get sensitive information about the user or trying to download malicious software and
    exploit it on the target system.
        2. Identity Theft
     Identity theft occurs when a cybercriminal uses another person’s personal data like credit card numbers or
    personal pictures without their permission to commit a fraud or a crime.
        3. Ransomware Attack
     Ransomware attacks are a very common type of cybertheft/cybercrime. It is a type of malware that has the
    capability to prevent users from accessing all of their personal data on the system by encrypting them and then
    asking for a ransom in order to give access to the encrypted data.
        4. Hacking/Misusing Computer Networks
     crime of unauthorized access to private computers or networks and misuse of it either by shutting it down or
    tampering with the data stored or other illegal approaches.
        5. Internet Fraud
    Internet fraud is a type of cybercrimes that makes use of the internet and it can be considered a general term
    that groups all of the crimes that happen over the internet like spam, banking frauds, theft of service, etc.
         Online Safety: Antivirus Software, Firewalls, Passwords, Biometric Authentication, & Encryption
    ANTIVIRUS SOFTWARE
     Antivirus software scans a computer’s hard disk, CDs, and main memory to detect viruses and, sometimes,
    to destroy them. Such virus watchdogs operate in two ways. First, they scan disk drives for “signatures,”
    characteristic strings of 1s and 0s in the virus that uniquely identify it. Second, they look for suspicious virus like
    behavior, such as attempts to erase or change areas on your disks. Examples of antivirus programs are McAfee
    VirusScan, Norton AntiVirus, Pc-cillin Internet Security, Avast!, and ZoneAlarm with Antivirus. Others worth
    considering are CA Internet Security Suite Plus, Panda Antivirus Platinum, and McAfee Virex for Macs.
FIREWALLS
     A firewall is a system of hardware and/or software that protects a computer or a network from intruders. The
    firewall software monitors all internet and other network activity, looking for suspicious data and preventing
    unauthorized access. Always-on internet connections such as cable modem, satellite, and DSL, as well as
    some wireless devices, are particularly susceptible to unauthorized intrusion.
PASSWORDS
    Password is the special words, codes, or symbols required to access a computer system. Protecting your
   internet access accounts and files with a password isn’t enough. Passwords (and PINs, too) can be guessed,
   forgotten, or stolen.
BIOMETRIC AUTHENTICATION
     Some forms of identification can’t be easily faked—such as your physical traits.
     Biometric authentication devices authenticate a person’s identity by comparing his or her physical or
    behavioral characteristics with digital code stored in a computer system.
    There are several kinds of devices for verifying physical or behavioral characteristics that can be used to
    authenticate a person’s identity.
    • Hand-geometry systems: Also known as full-hand palm scanners, these are devices to verify a person’s
    identity by scanning the entire hand, which, for each person, is as unique as a fingerprint and changes little over
    time.
     • Fingerprint scanners: These range from optical readers, in which you place a finger over a window, to
    swipe readers, such as those built into laptops and some handhelds, which allow you to run your finger across a
    bar-like sensor. Microsoft offers optical fingerprint readers to go with Windows XP/Vista.
    • Iris-recognition systems: Because no two people’s eyes are alike, iris scans are very reliable identifiers. In
    Europe, some airports are using iris-scanning systems as a way of speeding up immigration controls.
    • Face-recognition systems: The technology, which compares a live face image with a digitized image stored
                                                                                                                              2
     in a computer, is even used now as a security system for some notebook computers.
      • Voice-recognition systems: These systems compare a person’s voice with digitized voice prints stored in a
     computer, which the individual has previously “trained” to recognize his or her speech patterns
ENCRYPTION
    Encryption is the process of altering readable data into unreadable form to prevent unauthorized access.
    Encryption is able to use powerful mathematical concepts to create coded messages that are difficult or even
     virtually impossible to break.
     There are two basic forms of encryption— private key and public key:
      • Private key: Private-key (symmetric) encryption means that the same secret key is used by both sender and
     receiver to encrypt and decrypt a message. The encryption system DES (for “Data Encryption Standard”) was
     adopted as a federal standard for private-key encryption in 1976.
     • Public key: Public-key encryption means that two keys are used—a public key, which the receiver has made
     known beforehand to the sender, who uses it to encrypt the message, and a private key, which only the receiver
     knows and which is required to decrypt the message.
SHORT SUMMARY:
   • Malware (malicious software) is a program or code that is designated to infiltrate a system and execute
     malicious operations and controls. Computer viruses, worms, and Trojan horses are classified as malware.
   • Cyber-attacks include DoS attack, viruses, works and Trojan horses.
   • Internet trolls, cyber spies, hackers and cyber thieves are examples of cyber intruders.
   • For online safety of all antivirus software, strong passwords, biometrics and encryption can be applied
     to prevent malware.
                                                MODULE 5
                                             MICROSOFT EXCEL
Microsoft Excel
 is an example of a spreadsheet program.
 A spreadsheet is used to perform mathematical calculations and financial decision- making and you can
   process, summarize, sort, extract, analyze, and store information using a spreadsheet.
Microsoft Excel
 is a powerful electronic spreadsheet program you can use to automate accounting work, organize data, and
   perform a wide variety of tasks
   designed to perform calculations, analyze information, and visualize data in a spreadsheet. Also, this application
   includes database and charting features.
Workbook
 Another name for an Excel document
 consists of a number of sheets, called worksheets.
 The default number of worksheets visible when you open Excel is 1 (Sheet1). You can add a new sheet at any time
   or set the default option to display more sheets upon opening each workbook.
 A sheet is similar to a page in a book.
 A workbook consists of a collection of worksheets.
 Another name for a worksheet is a spreadsheet.
The Excel document window consists of the following:
    Rows that are numbered vertically from 1 to 1,048,576 on each sheet
    Columns marked horizontally from A-Z, AA-ZZ, up to XFD—16,384 columns on each sheet
The purpose of the window features is to enable the user to perform routine tasks related to the Microsoft applications.
All the Office applications share a common appearance and similar features. The window features provide a quick
means to execute commands.
                                                                                 Spreadsheet Terms
     1                                                   Quick Access Toolbar - Displays quick access to commonly used
                                                         commands.
     2                                                   Search Bar - Advance search will help you find and perform tasks.
     3                                                   Title Bar - Displays the name of the application file.
     4                                                   File Tab - The File tab has replaced the Office button. It
     helps you to manage the Microsoft application and provide access to its options such as Open, New, Save,
     As Print, etc.
     5 Name Box - Displays the active cell location.
     6 Cell - The intersection of a row and column; cells are always named with the column letter followed by the
     row number (e.g. A1 and AB209); cells may contain text, numbers and formulas. 7 Range - One or more
     adjacent cells. A range is identified by its first and last cell address, separated by a colon. Example ranges are
     B5:B8, A1:B1 and A1:G240.
     8 Status Bar - Displays information about the current worksheet.
     9 New Sheet - Add a new sheet button.
     10 Ribbon - Displays groups of related commands within tabs. Each tab provides buttons for commands.
     11 Formula Bar - Input formulas and perform calculations.
     12 Worksheet - A grid of cells that are more than 16,000 columns wide (A-Z, AA-AZ, BA- BZ…IV) and
                                                                                                                             3
     more than 1,000,000 rows long.
     13 View Options - Display worksheet view mode
Spreadsheet Navigation
     The following table provides various methods to navigation around a spreadsheet.
                                                                                 ENTER AND EDIT DATA
                                                                            How to Enter and Edit Data in Excel
                                                                                       Open a Blank Excel File
                                                                    a. Select cell A1, and then type Budget for Guest
                                                                               Speakers.
                                                                    b. Select cell A3, type Item, and then press the Tab key.
                                                                    c. Select cell B3, type Fall, and then press the Tab key.
                                                                    d. Select cell C3, type Spring, and then press the Tab
                                                                       key.
                                                                    e. Select cell D3, type Summer, and then press the Tab
                                                                               key.
                                                                    f. Select cell E3, type Annual, and then press the Tab key.
    Adjust Column Width
         Initially all columns have the same width in a spreadsheet.
         Often you will need to make columns wider or narrower
Type Text and Numbers
    Use the plus sign mouse pointer to select a cell then begin
       typing in that cell to enter data. If there is existing text/data in a
       cell, the new text will replace the existing text.
    Press the Enter or Tab key after typing text in a cell.
Undo and Redo
    Use the Undo button to undo (reverse) previous actions in reverse sequence.
    Choose this option immediately after performing an unwanted action.
    Note that Undo is not available for all commands.
    The Redo button will restore the process that was just undone.
Insert and Delete Rows and Columns
        Insert rows and columns to add information between
existing rows or columns of information.
Text and Number Alignment
       Microsoft Excel aligns data in a cell in three ways; left,
      center, and right.
       Also, a range of cells can be merged into one cell; this is
      good for text titles.
       The default text alignment is left, and the default
      number alignment is right.
       Alignment can be changed by using the alignment icons located on the Home ribbon in the Paragraph group.
       Select a range before changing alignment to more than one cell at a time
Entering data into a set range
    If you know the extent of the range you are needing to enter in a worksheet, then the best way is to select a
       range of cells and type up the data.
       - Select a range on the worksheet.
       - Type the first value and press the Enter key to confirm.
        -    The cursor will move to the next cell.
        -    Type the next value, and so on…
Entering data in non-contiguous ranges
     A non-contiguous range means cells not next to each other.
     We will learn how to select non- contiguous cells and then enter data into this range. Selecting using this
    method is also very useful when needing to apply formatting to selected cells at once.
        - Click on a cell in the worksheet.
        - While holding down the Ctrl keyboard key, select other cells in the worksheet.
        - Let go of the Ctrl key and start typing values or text into the selected cells.
Entering dates and times
      You will find steps to add the current date and time into a worksheet cell.
       Note: Neither of these entries will update should the workbook be closed and opened at another date or time:
    1. To enter the current date into the worksheet, ( =CTRL + ; )
    2. To enter the current time into the worksheet, ( =CTRL + : )
To insert a date and time that updates automatically every time the workbook is opened, do the following:
     1. Insert =today() into a cell to return the current date.
                                                                                                                              4
    2. Insert =now() into a cell to return the current date and time format
Copying data using AutoFill
    The AutoFill handle allows you to copy information to an adjacent range of cells.
                                              FORMAT DATA AND CELLS
Wrapping text
     Data can appear on multiple lines within a single cell.
     Text wrapping is set using more than one method.
     Use the Wrap Text icon on the Home tab, the Format Cells dialog box, or by inserting a line break manually.
    Using a line break to wrap text manually gives the user more control over where the text should wrap:
    1. Click on an empty cell on the worksheet, and then type the text Safest Solutions into the cell.
    2. Directly after the typed words, press Alt + Enter on the keyboard, which will insert the line break
    and move the cursor down to the next line in the cell.
    3. Type the word Group.
    4. Press Enter on your keyboard to accept the text or click on another cell to exit.
    5. To use the ribbon to wrap text, click on the Home tab, and then locate the                            Alignment
         group.
    6.   Click on the Wrap Text icon, and the text is wrapped.
     Merging cells
          Merging cells means combining a number of cells.
          The Excel merge tool is often used to combine and center the contents of cells across parts of the
            worksheet.
          It is not possible to split cells in Excel, but you are able to merge two cells above two columns to
            make it appear as if the cells were split.
     Hiding and showing rows and columns
     You have the option to hide columns and rows should you wish to print your worksheet without them
        showing, or if another person needs to view the workbook and you do not want them to see a particular
        column of data.
     To select a column or row, simply click on the column letter or row number. To select multiple columns and
        rows, hold down the mouse and keep it depressed until all the columns or rows have been highlighted.
    Setting column widths and row heights
     Column widths are set to 8.43 (64 pixels) and rows are set to 15 (20 pixels) by default. Select the column or
    columns you wish to resize. Use one of the following methods to change the column width:
    1. Right-click over the highlighted column or columns and choose Column Width
    2. Enter a value to resize the column or columns into the dialog box provided, and then click on OK to confirm.
    Or
    1. Locate the Cells group, and then select the Format option.
    2. Choose Column Width from the drop-down list provided.
    3. Enter a value to resize the columns/s in the dialog box provided.
    4. Click on OK to confirm. Alternatively, use the AutoFit Column Width and AutoFit Row Height feature to
    automatically size rows and columns to fit the contents within them. Either double-click on the column or row
    separator line between a column or a row to resize automatically or select a row and/or column, and then visit
    the Format tab of the Cells group, from which you will choose AutoFit Row Height or AutoFit Column Width
                                       EXCEL BASIC FORMULAS
    Microsoft Excel
         is an electronic spreadsheet that automates manual calculations involved in accounting and
            bookkeeping.
             Do not use any spaces in formulas.
             Also, when creating formulas, you may choose to either type the cell address or use the mouse to
              select the cell address.
    Create Formula You can create any type of math calculation on your own using the following mathematical
    operators:
    The numeric keypad on the right side of the keyboard provides most of these operators.
Excel follows the mathematical order of hierarchy where operators are processed in the order:
   - negation
    - Exponentiation
    - multiplication/division
    - addition/subtraction.
     Use parentheses to clarify the order of calculation in a formula.
    Basic steps for creating a formula:
    1. Click in the empty cell which will contain the formula.
    2. Type an equal sign (=).
                                                                                                                         5
     3.   Type the cell address or click the cell that contains the first number.
     4.   Type the math operator (+ - / * ^).
     5.   Type the cell address or click the cell that contains the second number.
     6.   Continue in this manner until the formula is complete.
     7.   Use parenthesis for clarification.
     8.   Press the Enter key.
     AutoSum
      Adding is the most common math operation performed in Excel. T
      The Home ribbon includes an AutoSum button for adding.
      This button provides a shortcut to typing formulas.
     Formula Functions
      Functions provide an automated method for creating formulas
      Excel contains more than 200 functions.
      For example, specific functions are available to calculate a sum, an average, a loan payment, logarithms and
     random numbers.
      Functions can be typed, if you know the syntax, or can be inserted by clicking on the Function button located
     left of the formula bar.
      All functions are formatted in a similar manner
      The parameters vary depending upon the function.
      Functions and cell addresses may be typed in upper case or lower case.
   Sum
      Adding is the most common function performed in Excel.
      The SUM function adds values. Specify values, individual cell addresses, and/or range addresses in the
number x variables.
      Syntax =SUM(number1,number2,...)
     Average
      An average sum all values and divides by the total number of values.
      Specify values, individual cell addresses and/or range addresses in the numbers variables.
      syntax =AVERAGE(number1,number2,...)
     Maximum (MAX)
      Maximum indicates the largest value in the designated list of numbers.
      syntax =MAX (number1, number2,...)
     Minimum (MIN)
      Minimum indicates the smallest value in the designated list of numbers.
         syntax =MIN(number1,number2,...)
     Relative versus Absolute Cell Addresses
     As you move and copy formulas, Excel automatically adjusts the part of the cell reference in the formula
       that changes as you move down or to the right.
     Excel assumes that everything is relative; that is, relocated and copied formulas will reference information
       according to the number of columns and rows they have moved.
     There are situations where automatic adjustment of the cell references does not calculate correctly.
     This is especially true with percentage formulas where the denominator should remain constant.
     A dollar sign ($) placed before the column letter and row number (e.g. $B$6) will lock the address or make it
       absolute.
    Payment (PMT)
     Payment returns the periodic payment of an annuity based on constant payments and a constant interest
    rate.
       syntax =PMT(rate,nper,pv)
When using interest rates, the rate may need to be converted to a percentage and divided by 12 (assuming an
annual percentage rate).
                                                   CREATE CHARTS
Charts
     Microsoft Excel can display data graphically in a chart.
     Presenting data in a chart can make it easier to read and more interesting to interpret.
     Charts can also help you evaluate your data and make comparisons between different values.
A. Enter Data
The following exercise will create a simple spreadsheet that will provide the data from which a chart will be created.
-                 Type the information in the cells
B. Create a Chart
C. Chart Tools
     Microsoft Excel provides many editing options for your chart. When your chart is selected, the Chart Tools
         tab will appear on the Ribbon.
     This enables you to edit your chart with a variety of designs, layouts, and formats.
                                                                                                                         6
D. Add Chart Title
      When a chart is created from the spreadsheet data the text Chart Title will appear above your chart data.
    1. Click on the Chart Title text box.
    2. Select or delete text.
    3. Type your desired title. For this class exercise, type Fiscal Year Comparisons.
E. Create Pie Chart
      Noncontiguous cell ranges can be selected from your spreadsheet to view specific data groupings
    1. Select A1:A5, then compress the Ctrl key, and select D1:D5.
    2. Click on the Insert tab, click on the Pie button location in the Chart group, and then select the first 2-D Pie
       button from the options panel.
    3. Your created Pie chart will appear on the spreadsheet.
                                                       TYPES OF CHARTS
     The following are the most common types of charts used in data visualization:
A. Column and Bar Charts - Excel distinguishes between vertical and horizontal bar charts, calling the former column
charts and the latter bar charts.
      A clustered column chart compares values across categories using vertical rectangles; a stacked column
        chart displays the contribution of each value to the total by stacking the rectangles
      100% stacked column chart compares the percentage that each value contributes to a total.
      Column and bar charts are useful for comparing categorical or ordinal data, for illustrating differences
        between sets of values, and for showing proportions or percentages of a whole.
B. Line charts provide a useful means for displaying data over time.
C. A pie chart displays this by partitioning a circle into pie-shaped areas showing the relative proportion.
D. An area chart combines the features of a pie chart with those of line charts. Area charts present more information than
pie or line charts alone but may clutter the observer’s mind with too many details if too many data series are used; thus,
they should be used with care.
E. Scatter charts show the relationship between two variables.
F. A bubble chart is a type of scatter chart in which the size of the data marker corresponds to the value of a third
variable; consequently, it is a way to plot three variables in two dimensions.
G. A stock chart allows you to plot stock prices, such as the daily high, low, and close. It may also be used for
scientific data such as temperature changes.
H. A surface chart shows 3-D data.
I. A doughnut chart is similar to a pie chart but can contain more than one data series
J. A radar chart allows you to plot multiple dimensions of several data series.
                                                   MODULE SUMMARY
            Microsoft Excel is an example of a spreadsheet program. Other types of spreadsheets are available—
             for example, Calc from OpenOffice, and Sheets from Google Docs. A spreadsheet is used to perform
             mathematical calculations and financial decision making— for example, for budgets, company reports,
             wage sheets, cash flows—to analyze data, and for graphical representation of data. You can process,
             summarize, sort, extract, analyze, and store information using a spreadsheet.
            In entering, editing and formatting data in Microsoft Excel various functions are applicable to different
             reports depending on the use, type of data and reports to be presented and analyze.
            Basic formulas in excel includes Sum, AutoSum, Average, Min and Max.
            Charts are effective in presenting data visually.
                                                                                                                         7
8