0% found this document useful (0 votes)
17 views3 pages

Reviewer It Midterms

Uploaded by

jcdatuu2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views3 pages

Reviewer It Midterms

Uploaded by

jcdatuu2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

LESSON 1: EVOLUTION OF THE COMPUTERS ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ What Are Cyber Attacks?

Cyberattacks are unwelcome attempts to steal, expose, alter, disable or destroy information through
We all use computers in our daily lives for a variety of reasons. Computers are now portable and unauthorized access to computer systems.
affordable, but once, there was a time when a computer used to take up an entire room’s space, and
only a few of them existed in this world. What are The Types of Cyber Attacks?
▪ Malware ▪ Identity-Based Attacks
Abacus (c. 2700 BC) ▪ Denial-of-Service (DoS) Attacks ▪ Code Injection Attacks
When you were kids, you must have owned an abacus on which you learned basic mathematical skills. ▪ Phishing ▪ Supply Chain Attacks
Abacus originated in ancient Mesopotamia and is one of the earliest known computing devices. It ▪ Spoofing ▪ Social Engineering Attacks
consisted of beads on rods and was used for basic arithmetic calculations.
Types of Cyber Attacks
First Generation – Vacuum Tubes (1940 – 1956)
● 1930s marked the beginning of calculating machines, considered the first programmable Malware – Malware, short for malicious software, refers to any intrusive software developed by
computers cybercriminals (often called hackers) to steal data and damage or destroy computers and computer
● Konrad Zuse created what became known as the first programmable computer, the Z1, in systems. Examples are:
1936 in his parent’s living room in Berlin.
▪ Viruses ▪ Spyware
● The 1940s saw the emergence of electronic computers, including the ENIAC (Electronic
▪ Worms ▪ Adware
Numerical Integrator and Computer) and the EDVAC (Electronic Discrete Variable Automatic
▪ Trojan viruses ▪ Ransomware
Computer). These machines used vacuum tubes and punched cards for data processing.

Second Generation – Transistors (1956 – 1963) Intelligence and Intrusion – Exfiltrated data such as emails, plans, and especially sensitive information
● In 1947, the invention of the transistor by Bell Labs revolutionized computing. Transistors like passwords.
replaced bulky vacuum tubes, making computers smaller, faster, and more reliable.
Disruption and Extortion – Locks up networks and PCs, making them unusable. If it holds your
● Second-gen computers still count on punched cards for input/printouts.
computer hostage for financial gain, it's called ransomware.
● The language emerged from a binary language to a symbolic (‘assembly’) language. This
meant programmers could discover instructions in words.
Destruction or Vandalism – Destroys computer systems to damage your network infrastructure.
● Until 1965, computers were only used by mathematicians and engineers in a lab setting.
Steal Computer Resources – Uses your computing power to run botnets, crypto mining programs
Third Generation – Integrated Circuits (1964 – 1971)
(cryptojacking), or send spam emails.
● Third-generation computers started using integrated circuits instead of transistors.
● The third generation computers significantly reduce the computational time. In the second
Monetary Gain – Sells your organization's intellectual property on the dark web.
generation, the computational time was microsecond, which was decreased to nanoseconds.
● In this generation, punch cards were replaced by mouse and keyboard.
Denial-of-Service (DoS) Attacks – A denial-of-
service (DoS) attack is a malicious attempt to disrupt
Fourth Generation – Microprocessors (1972 – 2010)
or shut down the normal functioning of a targeted
● Intel’s 4004 microprocessor marked a pivotal moment in computing history. It was the world’s first server, service, or network by overwhelming it with a
commercially available microprocessor and laid the groundwork for the personal computer flood of illegitimate requests that trigger a crash.
revolution.

Fifth Generation – Artificial Intelligence (2010 Onwards)


● This is the computer generation that we use. We know that computer devices with artificial
intelligence technology are still in development.

Phishing – Phishing is a type of social engineering attack often used to steal user data, including login
CYBER ATTACKS AND MALWARE ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity,
dupes a victim into opening an email, instant message, or text message.
Spoofing – Spoofing is when someone disguises an email address, sender name, phone number, or
website URL—often just by changing one letter, symbol, or number—to convince you that you are
interacting with a trusted source.

▪ Caller ID ▪ DNS spoofing


▪ Website spoofing ▪ GPS spoofing What are the Input devices
▪ Email spoofing ▪ ARP spoofing ► Keyboard
▪ IP spoofing ▪ Extension spoofing ► Mouse
▪ Text message spoofing ▪ Man-in-the-middle spoofing ► Joy Stick
► Light Pen
Identity-Based Attacks – Identity based attacks make use of user's compromised credentials for ► Microphone
malicious access. They differ from malware-based attacks in that they employ the legitimate ► Scanner
authentication process for accessing resources, with no malicious code required. ► Barcode Reader

Code Injection Attacks – Code injection is the term used to describe attacks that inject code into an Input Devices
application. That injected code is then interpreted by the application, changing the way a program
executes. Code injection attacks typically exploit an application vulnerability that allows the processing Keyboard
of invalid data.
 A simple device comprising keys and each key denotes either an alphabet, number or number
Supply Chain Attacks – A supply chain attack is a commands which can be given to a computer for various actions to be performed.
type of cyberattack carried out against an
organization's suppliers as a means to gain Mouse
unauthorized access to that organization's systems  A mouse comprises 3 buttons on the top and one trackball at the bottom which helps is
or data. selecting and moving the mouse around, respectively.
 It is also known as a pointing device.
Social Engineering Attacks – Social engineering
attacks manipulate people into sharing information
Joy Stick
that they shouldn't share, downloading software
 It is a device which comprises a stick which is attached at an angle to the base so that it can
that they shouldn't download, visiting websites they
be moved and controlled.
shouldn't visit, sending money to criminals or
 Mostly used to control the movement in video games.
making other mistakes that compromise their
personal or organizational security.
Light Pen
 It is a wand-like looking device which can directly be moved over the device's screen.
 Used in conjunction with computer's cathode ray tube.

Microphone
LESSON 2: INPUT AND OUTPUT DEVICE ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ  To record or reproduce a sound created using a microphone, it needs to be connected with an
amplifier.
What is Input and Output device?
Scanner
 Input and output devices are hardware that allow users to interact with a computer's central  This device can scan images or text and convert it into a digital signal.
processing unit (CPU) by sending or receiving information.  When we place any piece of a document on a scanner, it converts it into a digital signal and
displays It on the computer screen.

Barcode Reader
Input and Output device  A source of light is passed through a bar code, and its aspects and details are displayed on the
screen.
Input devices Output devices  It is a kind of an optical scanner.

 Send information to the computer,  Receive information from the


such as a keyboard, mouse, computer and display it, such
 Some specific version include Mojave (released in 2018), High Sierra (2017) and Sierra
Output Devices (2016).
► Monitor  According to StatCounter Global Stats, MacOS users account for less than 10% of giobal
► Printer OS, much lower than the percentages of Windows users (more than 80%).
► Speakers  one reason for this is that Apole computers yend to be more expensive, however, many people
► Projector co prefer the look ad feel of MacOS over Windows.
► Headphones  Mahigpit ang security, exclusive sa apple (MACBOOK) and expensive ror.

Monitor 3. LINUX
 The device which displays all the Icons, text, images, etc. over a screen is called the Monitor.  Is a family of open source OS. which means they can be modified and distributed by any
 Various types of monitors have also been developed over the years. around the world.
 This is very different from proprietary software like Windows, which can only modified by the
Printer company who owns it.
 A device which makes a copy of the pictorial or textual content, usually over a paper is called a  The advantage Linux are it is FREE and there are many diff, distributions or versions you can
printer. choose from.
 According to StatCounter Global Stats, Linux users account for less than 2% of global OS.
Speakers however, mast servers run Linux because it’s relative easy to customize.
 A device through which we can Listen to a sound as an outcome of what we command a  Delikado when it comes to security.
computer to do is called a speaker.

Projector
 An optical device which presents an Image or moving Image, onto a projection screen is alle a
projector.

Headphones
 They perform the same function as a speaker, the only difference is the frequency of sound.

FUNCTIONS OF OPERATING SYSTEM ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ

Operating Systems - is a program that manage a computer's hardware and software, including the
allocation of resources to other program.
 Is the most important software that runs on a computer, it manages the computer's memory
and processes, as well as all of it's software and hardware.
 Without OS a computer is useless.

TYPES OF OS
1. Microsoft Windows
 Microsoft created the Windows OS in the mid 1980's.
 There have been many different variety windows.
 Most recent are Windows 10 (released in 2015), Windows 8 (2012), Windows 7 (2009) and
Windows vista (2007)
 Windows 11 (updated).
 Windows come pre-loaded on most new PC's which helps to make it the most popular OS in
the world.

2. MAC OS
 previously called OS X) is a line on OS created by Apple, it's come pre-loaded on all
Mackintosh computers or Macs.

You might also like