0% found this document useful (0 votes)
27 views8 pages

Merged Document

Uploaded by

mnbrehman538420
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views8 pages

Merged Document

Uploaded by

mnbrehman538420
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Malware

Cybersecurity
Phishing
Hacking
Denial
Brute
1 Force
of&(Malicious
Service
Cracking
Pharming
Attack(DoS)
Software)
& Distributed Denial of Service (DDoS)

Data Integrity, Privacy, and Security

Cybersecurity is the practice of identifying security threats and implementing measures to


protect systems from security risks such as malware, phishing, pharming, hacking, cracking,

Malware is harmful software designed to damage or disrupt computer systems. Types of

• Virus: A self-replicating software that attaches itself to a host program and spreads.
• Worm: Similar to a virus but can spread independently ( Stand alone program ) by
exploiting security vulnerabilities.
• Spyware: Secretly collects user data (e.g., keystrokes, login details) and sends it to
cybercriminals.
• Trojan Horse: A legitimate-looking program that contains hidden malicious code (e.g.,
fake antivirus software).
• Adware: Displays unwanted advertisements but is generally less harmful than other
malware types.
• Ransomware: Encrypts user data and demands a ransom for decryption.
• Logic Bomb: Malicious code embedded in software that activates under certain
conditions.
• Bot: A network of infected devices controlled remotely by hackers.
Understanding Malware: Types and Characteristics

Logic Bomb Bot


Embedded code /
Remote control
software
Conditional activation Infected devices

Virus Worm

Self-replication Exploits vulnerabilities


Host attachment Stand Alone Program

Malware
Trojan Horse Spyware

Legitimate appearance Data collection


Hidden malicious code Cybercriminals

Adware Ransomware

Advertisements Data encryption


Less harmful Ransom demand

• Phishing: Cybercriminals send emails containing malicious links that lead to fake
websites.
• Pharming: Malicious code redirects users to a fraudulent website, often achieved
through DNS cache poisoning (altering DNS by swapping the original IP address with
the fake one to redirect users to a fake site).

• Hacking: Unauthorized access to a system or network, for stealing deleting and


changing the user's data.
• Ethical Hacking: Performed legally with authorization to enhance security.
• Cracking: Gaining unauthorized access to cause harm, steal data, or disrupt systems.

• DoS Attack: Overwhelming a server with excessive requests, causing system


slowdown or failure through internet robots / bots.
• DDoS Attack: Similar to DoS but launched from multiple sources, making it harder to
stop.
A method where attackers use dictionary programs to guess passwords by trying multiple
combinations.

Cybersecurity Threats and Techniques

Hacking & Cracking


Phishing & Pharming
Hacking
Phishing ( Human Intervention )
Cracking
Pharming ( No Human) Cybersecurity
Threats and
Denial of Service Attacks
Brute Force Attack Techniques
DoS Attack
Dictionary Programs
DDoS Attack
2

Data Privacy
Data privacy ensures that user or company data remains private and only accessible to
authorized individuals. To ensure data privacy, data protection principles must be followed:
1. Accuracy – Data must be accurate.
2. Fair & Lawful Processing – Data should be processed fairly and lawfully.
3. Limited Use – Data should only be used for its stated purpose.
4. Adequate & Relevant – Data must be sufficient, precise, and relevant.
5. Retention Period – Data should not be kept longer than necessary.
6. Rights Protection – Data handling must respect individual rights.
7. Security Measures – Data should be stored securely.
8. Legal Compliance – Sufficient data protection laws should be in place.

Data Protection Principles for Privacy

Security Measures Legal Compliance

Encryption Regulatory Standards


Access Controls Legal Framework

Accuracy Fair & Lawful Processing

Ensure Precision Lawful Methods


Regular Updates Fair Practices

Data Privacy
Adequate & Relevant Limited Use

Relevant Data Specific Purpose


Adequate Data Avoid Misuse

Retention Period Rights Protection

Time Limits Rights Awareness


Periodic Review Compliance Checks

Data Security
Data security involves preventing data loss and unauthorized access. Common methods
include:
• Using Strong Passwords – Unique and complex passwords should be used.
• Access Control – Restrict access to authorized users only.
• Encryption – Secure sensitive information using encryption methods.
• Regular Backups – Ensuring data is backed up to prevent loss.
• Data Recovery – Mechanisms to retrieve lost or corrupted data.
Biometric Security
Various biometric techniques are used for authentication:
• Fingerprint Scanner – Analyzes lines and ridges of a fingerprint and compares them
with stored data. Accuracy: 1 in 500.
• Facial Recognition – Detects facial features and matches them with stored records.
• Retinal Scanner – Uses technology to scan the unique pattern of blood vessels in the
eye. Accuracy: 1 in 10 million, but the process is slightly slower.
• Voice Recognition – Analyzes voice pitch and frequency for authentication. Less
secure due to lower accuracy.
Data Recovery
Data recovery is the process of restoring data to its original state after loss. Causes of
accidental data loss include:
• Hardware Failures Backup data should be stored away from the primary source, and
an uninterrupted power supply (UPS) must be used to prevent data loss caused by
power outages.

• Accidental Loss or Deletion Regular backups are essential to save progress and
prevent data loss. Users should save their data regularly and ensure that access is
restricted with passwords and usernames.

• Software Faults Regular backups and saving data often help prevent loss in case of
software-related issues.

Incorrect Computer Operations Ensure that regular backups are performed, and correct
procedures are followed during shutdown.

Comprehensive Overview of Data Security and Recovery

Methods
Biometric Techniques
Strong Passwords
Fingerprint Scanner
Access Control
Data Facial Recognition
Encryption Security
Retinal Scanner
Regular Backups
Voice Recognition
Data Recovery Mechanisms

Data Recovery

Hardware Failures
Accidental Loss or Deletion
Software Faults
Incorrect Computer Operations
3

Data Integrity
• Definition: Ensures that data remains accurate, consistent, and valid.

• Threats to Data Integrity:

• Malicious attacks

• Accidental loss during transmission

• Impact: These factors can compromise the integrity of the data.

Data Validation
• Purpose: Ensures that a set of rules is followed to maintain data quality.

• Types of Validation Checks:

• Length Check

• Type Check

• Presence Check

• Format Check

• Existence Check

• Limit Check

• Consistency Check

• Uniqueness Check

• Range Check
Data Validation Checks

Uniqueness
Length Check
Check
Verifies data Ensures data
entries are entries are within
distinct and not specified
duplicated. character limits.

Consistency
Type Check
Check
Ensures data Verifies data
entries are entries match
consistent across expected data
datasets. types.

Limit Check
Presence Check
Validates data
Confirms required
entries are within
data fields are not
defined limits.
empty.

Existence Check Format Check


Ensures data Checks data
entries exist in the entries adhere to
source system. specified formats.

Data Verification
• Purpose: Ensures that the entered data is accurate.

• Checks Performed:

• During Data Entry:

• Visual check

• Double-entry check
• Digit check

• During Data Transmission:

• Parity check

• Automated repeat/request query

• Checksums

Data Verification Process

Purpose
Identification
Visual Check
Double-entry
Check
Digit Check
Establishing
Parity Check Automated
the goal of Performing a
Repeat/Request
ensuring data manual Entering data
Query
accuracy inspection of twice to Verifying
data entries confirm numerical data Ensuring data
accuracy for correctness integrity during Initiating
transmission automatic data
resend or query

You might also like