LESSON 1: EVOLUTION OF THE COMPUTERS ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ                                                       What Are Cyber Attacks?
Cyberattacks are unwelcome attempts to steal, expose, alter, disable or destroy information through
We all use computers in our daily lives for a variety of reasons. Computers are now portable and           unauthorized access to computer systems.
affordable, but once, there was a time when a computer used to take up an entire room’s space, and
only a few of them existed in this world.                                                                  What are The Types of Cyber Attacks?
                                                                                                            ▪ Malware                                            ▪ Identity-Based Attacks
Abacus (c. 2700 BC)                                                                                         ▪ Denial-of-Service (DoS) Attacks                    ▪ Code Injection Attacks
When you were kids, you must have owned an abacus on which you learned basic mathematical skills.           ▪ Phishing                                           ▪ Supply Chain Attacks
Abacus originated in ancient Mesopotamia and is one of the earliest known computing devices. It             ▪ Spoofing                                           ▪ Social Engineering Attacks
consisted of beads on rods and was used for basic arithmetic calculations.
                                                                                                           Types of Cyber Attacks
First Generation – Vacuum Tubes (1940 – 1956)
     ● 1930s marked the beginning of calculating machines, considered the first programmable               Malware – Malware, short for malicious software, refers to any intrusive software developed by
         computers                                                                                         cybercriminals (often called hackers) to steal data and damage or destroy computers and computer
     ● Konrad Zuse created what became known as the first programmable computer, the Z1, in                systems. Examples are:
         1936 in his parent’s living room in Berlin.
                                                                                                            ▪ Viruses                                           ▪ Spyware
     ● The 1940s saw the emergence of electronic computers, including the ENIAC (Electronic
                                                                                                            ▪ Worms                                             ▪ Adware
         Numerical Integrator and Computer) and the EDVAC (Electronic Discrete Variable Automatic
                                                                                                            ▪ Trojan viruses                                    ▪ Ransomware
         Computer). These machines used vacuum tubes and punched cards for data processing.
Second Generation – Transistors (1956 – 1963)                                                              Intelligence and Intrusion – Exfiltrated data such as emails, plans, and especially sensitive information
    ● In 1947, the invention of the transistor by Bell Labs revolutionized computing. Transistors          like passwords.
       replaced bulky vacuum tubes, making computers smaller, faster, and more reliable.
                                                                                                           Disruption and Extortion – Locks up networks and PCs, making them unusable. If it holds your
    ● Second-gen computers still count on punched cards for input/printouts.
                                                                                                           computer hostage for financial gain, it's called ransomware.
    ● The language emerged from a binary language to a symbolic (‘assembly’) language. This
       meant programmers could discover instructions in words.
                                                                                                           Destruction or Vandalism – Destroys computer systems to damage your network infrastructure.
    ● Until 1965, computers were only used by mathematicians and engineers in a lab setting.
                                                                                                           Steal Computer Resources – Uses your computing power to run botnets, crypto mining programs
Third Generation – Integrated Circuits (1964 – 1971)
                                                                                                           (cryptojacking), or send spam emails.
    ● Third-generation computers started using integrated circuits instead of transistors.
    ● The third generation computers significantly reduce the computational time. In the second
                                                                                                           Monetary Gain – Sells your organization's intellectual property on the dark web.
        generation, the computational time was microsecond, which was decreased to nanoseconds.
    ● In this generation, punch cards were replaced by mouse and keyboard.
                                                                                                                                                             Denial-of-Service (DoS) Attacks – A denial-of-
                                                                                                                                                             service (DoS) attack is a malicious attempt to disrupt
Fourth Generation – Microprocessors (1972 – 2010)
                                                                                                                                                             or shut down the normal functioning of a targeted
    ● Intel’s 4004 microprocessor marked a pivotal moment in computing history. It was the world’s first                                                     server, service, or network by overwhelming it with a
         commercially available microprocessor and laid the groundwork for the personal computer                                                             flood of illegitimate requests that trigger a crash.
         revolution.
Fifth Generation – Artificial Intelligence (2010 Onwards)
     ● This is the computer generation that we use. We know that computer devices with artificial
         intelligence technology are still in development.
                                                                                                           Phishing – Phishing is a type of social engineering attack often used to steal user data, including login
CYBER ATTACKS AND MALWARE ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ                                                            credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity,
                                                                                                           dupes a victim into opening an email, instant message, or text message.
Spoofing – Spoofing is when someone disguises an email address, sender name, phone number, or
website URL—often just by changing one letter, symbol, or number—to convince you that you are
interacting with a trusted source.
▪ Caller ID                                          ▪ DNS spoofing
▪ Website spoofing                                   ▪ GPS spoofing                                          What are the Input devices
▪ Email spoofing                                     ▪ ARP spoofing                                          ► Keyboard
▪ IP spoofing                                        ▪ Extension spoofing                                    ► Mouse
▪ Text message spoofing                              ▪ Man-in-the-middle spoofing                            ► Joy Stick
                                                                                                             ► Light Pen
Identity-Based Attacks – Identity based attacks make use of user's compromised credentials for               ► Microphone
malicious access. They differ from malware-based attacks in that they employ the legitimate                  ► Scanner
authentication process for accessing resources, with no malicious code required.                             ► Barcode Reader
Code Injection Attacks – Code injection is the term used to describe attacks that inject code into an        Input Devices
application. That injected code is then interpreted by the application, changing the way a program
executes. Code injection attacks typically exploit an application vulnerability that allows the processing   Keyboard
of invalid data.
                                                                                                                    A simple device comprising keys and each key denotes either an alphabet, number or number
                                                     Supply Chain Attacks – A supply chain attack is a               commands which can be given to a computer for various actions to be performed.
                                                     type of cyberattack carried out against an
                                                     organization's suppliers as a means to gain             Mouse
                                                     unauthorized access to that organization's systems          A mouse comprises 3 buttons on the top and one trackball at the bottom which helps is
                                                     or data.                                                      selecting and moving the mouse around, respectively.
                                                                                                                 It is also known as a pointing device.
                                                     Social Engineering Attacks – Social engineering
                                                     attacks manipulate people into sharing information
                                                                                                             Joy Stick
                                                     that they shouldn't share, downloading software
                                                                                                                  It is a device which comprises a stick which is attached at an angle to the base so that it can
                                                     that they shouldn't download, visiting websites they
                                                                                                                     be moved and controlled.
                                                     shouldn't visit, sending money to criminals or
                                                                                                                  Mostly used to control the movement in video games.
                                                     making other mistakes that compromise their
                                                     personal or organizational security.
                                                                                                             Light Pen
                                                                                                                  It is a wand-like looking device which can directly be moved over the device's screen.
                                                                                                                  Used in conjunction with computer's cathode ray tube.
                                                                                                             Microphone
LESSON 2: INPUT AND OUTPUT DEVICE ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ                                                                 To record or reproduce a sound created using a microphone, it needs to be connected with an
                                                                                                                    amplifier.
What is Input and Output device?
                                                                                                             Scanner
         Input and output devices are hardware that allow users to interact with a computer's central           This device can scan images or text and convert it into a digital signal.
          processing unit (CPU) by sending or receiving information.                                             When we place any piece of a document on a scanner, it converts it into a digital signal and
                                                                                                                     displays It on the computer screen.
                                                                                                             Barcode Reader
Input and Output device                                                                                           A source of light is passed through a bar code, and its aspects and details are displayed on the
                                                                                                                    screen.
 Input devices                                             Output devices                                         It is a kind of an optical scanner.
          Send information to the computer,                       Receive information from the
           such as a keyboard, mouse,                               computer and display it, such
                                                                                                                 Some specific version include Mojave (released in 2018), High Sierra (2017) and Sierra
Output Devices                                                                                                    (2016).
► Monitor                                                                                                        According to StatCounter Global Stats, MacOS users account for less than 10% of giobal
► Printer                                                                                                         OS, much lower than the percentages of Windows users (more than 80%).
► Speakers                                                                                                       one reason for this is that Apole computers yend to be more expensive, however, many people
► Projector                                                                                                       co prefer the look ad feel of MacOS over Windows.
► Headphones                                                                                                     Mahigpit ang security, exclusive sa apple (MACBOOK) and expensive ror.
Monitor                                                                                                   3. LINUX
    The device which displays all the Icons, text, images, etc. over a screen is called the Monitor.           Is a family of open source OS. which means they can be modified and distributed by any
    Various types of monitors have also been developed over the years.                                           around the world.
                                                                                                                This is very different from proprietary software like Windows, which can only modified by the
Printer                                                                                                           company who owns it.
     A device which makes a copy of the pictorial or textual content, usually over a paper is called a         The advantage Linux are it is FREE and there are many diff, distributions or versions you can
        printer.                                                                                                  choose from.
                                                                                                                According to StatCounter Global Stats, Linux users account for less than 2% of global OS.
Speakers                                                                                                          however, mast servers run Linux because it’s relative easy to customize.
    A device through which we can Listen to a sound as an outcome of what we command a                         Delikado when it comes to security.
       computer to do is called a speaker.
Projector
     An optical device which presents an Image or moving Image, onto a projection screen is alle a
        projector.
Headphones
    They perform the same function as a speaker, the only difference is the frequency of sound.
FUNCTIONS OF OPERATING SYSTEM ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ
Operating Systems - is a program that manage a computer's hardware and software, including the
allocation of resources to other program.
      Is the most important software that runs on a computer, it manages the computer's memory
         and processes, as well as all of it's software and hardware.
      Without OS a computer is useless.
TYPES OF OS
1. Microsoft Windows
     Microsoft created the Windows OS in the mid 1980's.
     There have been many different variety windows.
     Most recent are Windows 10 (released in 2015), Windows 8 (2012), Windows 7 (2009) and
        Windows vista (2007)
     Windows 11 (updated).
     Windows come pre-loaded on most new PC's which helps to make it the most popular OS in
        the world.
2. MAC OS
     previously called OS X) is a line on OS created by Apple, it's come pre-loaded on all
       Mackintosh computers or Macs.