Malware
Cybersecurity
Phishing
Hacking
Denial
Brute
1 Force
of&(Malicious
Service
Cracking
Pharming
Attack(DoS)
Software)
& Distributed Denial of Service (DDoS)
Data Integrity, Privacy, and Security
Cybersecurity is the practice of identifying security threats and implementing measures to
protect systems from security risks such as malware, phishing, pharming, hacking, cracking,
Malware is harmful software designed to damage or disrupt computer systems. Types of
• Virus: A self-replicating software that attaches itself to a host program and spreads.
• Worm: Similar to a virus but can spread independently ( Stand alone program ) by
exploiting security vulnerabilities.
• Spyware: Secretly collects user data (e.g., keystrokes, login details) and sends it to
cybercriminals.
• Trojan Horse: A legitimate-looking program that contains hidden malicious code (e.g.,
fake antivirus software).
• Adware: Displays unwanted advertisements but is generally less harmful than other
malware types.
• Ransomware: Encrypts user data and demands a ransom for decryption.
• Logic Bomb: Malicious code embedded in software that activates under certain
conditions.
• Bot: A network of infected devices controlled remotely by hackers.
Understanding Malware: Types and Characteristics
Logic Bomb Bot
Embedded code /
Remote control
software
Conditional activation Infected devices
Virus Worm
Self-replication Exploits vulnerabilities
Host attachment Stand Alone Program
Malware
Trojan Horse Spyware
Legitimate appearance Data collection
Hidden malicious code Cybercriminals
Adware Ransomware
Advertisements Data encryption
Less harmful Ransom demand
• Phishing: Cybercriminals send emails containing malicious links that lead to fake
websites.
• Pharming: Malicious code redirects users to a fraudulent website, often achieved
through DNS cache poisoning (altering DNS by swapping the original IP address with
the fake one to redirect users to a fake site).
• Hacking: Unauthorized access to a system or network, for stealing deleting and
changing the user's data.
• Ethical Hacking: Performed legally with authorization to enhance security.
• Cracking: Gaining unauthorized access to cause harm, steal data, or disrupt systems.
• DoS Attack: Overwhelming a server with excessive requests, causing system
slowdown or failure through internet robots / bots.
• DDoS Attack: Similar to DoS but launched from multiple sources, making it harder to
stop.
A method where attackers use dictionary programs to guess passwords by trying multiple
combinations.
Cybersecurity Threats and Techniques
Hacking & Cracking
Phishing & Pharming
Hacking
Phishing ( Human Intervention )
Cracking
Pharming ( No Human) Cybersecurity
Threats and
Denial of Service Attacks
Brute Force Attack Techniques
DoS Attack
Dictionary Programs
DDoS Attack
2
Data Privacy
Data privacy ensures that user or company data remains private and only accessible to
authorized individuals. To ensure data privacy, data protection principles must be followed:
1. Accuracy – Data must be accurate.
2. Fair & Lawful Processing – Data should be processed fairly and lawfully.
3. Limited Use – Data should only be used for its stated purpose.
4. Adequate & Relevant – Data must be sufficient, precise, and relevant.
5. Retention Period – Data should not be kept longer than necessary.
6. Rights Protection – Data handling must respect individual rights.
7. Security Measures – Data should be stored securely.
8. Legal Compliance – Sufficient data protection laws should be in place.
Data Protection Principles for Privacy
Security Measures Legal Compliance
Encryption Regulatory Standards
Access Controls Legal Framework
Accuracy Fair & Lawful Processing
Ensure Precision Lawful Methods
Regular Updates Fair Practices
Data Privacy
Adequate & Relevant Limited Use
Relevant Data Specific Purpose
Adequate Data Avoid Misuse
Retention Period Rights Protection
Time Limits Rights Awareness
Periodic Review Compliance Checks
Data Security
Data security involves preventing data loss and unauthorized access. Common methods
include:
• Using Strong Passwords – Unique and complex passwords should be used.
• Access Control – Restrict access to authorized users only.
• Encryption – Secure sensitive information using encryption methods.
• Regular Backups – Ensuring data is backed up to prevent loss.
• Data Recovery – Mechanisms to retrieve lost or corrupted data.
Biometric Security
Various biometric techniques are used for authentication:
• Fingerprint Scanner – Analyzes lines and ridges of a fingerprint and compares them
with stored data. Accuracy: 1 in 500.
• Facial Recognition – Detects facial features and matches them with stored records.
• Retinal Scanner – Uses technology to scan the unique pattern of blood vessels in the
eye. Accuracy: 1 in 10 million, but the process is slightly slower.
• Voice Recognition – Analyzes voice pitch and frequency for authentication. Less
secure due to lower accuracy.
Data Recovery
Data recovery is the process of restoring data to its original state after loss. Causes of
accidental data loss include:
• Hardware Failures Backup data should be stored away from the primary source, and
an uninterrupted power supply (UPS) must be used to prevent data loss caused by
power outages.
• Accidental Loss or Deletion Regular backups are essential to save progress and
prevent data loss. Users should save their data regularly and ensure that access is
restricted with passwords and usernames.
• Software Faults Regular backups and saving data often help prevent loss in case of
software-related issues.
Incorrect Computer Operations Ensure that regular backups are performed, and correct
procedures are followed during shutdown.
Comprehensive Overview of Data Security and Recovery
Methods
Biometric Techniques
Strong Passwords
Fingerprint Scanner
Access Control
Data Facial Recognition
Encryption Security
Retinal Scanner
Regular Backups
Voice Recognition
Data Recovery Mechanisms
Data Recovery
Hardware Failures
Accidental Loss or Deletion
Software Faults
Incorrect Computer Operations
3
Data Integrity
• Definition: Ensures that data remains accurate, consistent, and valid.
• Threats to Data Integrity:
• Malicious attacks
• Accidental loss during transmission
• Impact: These factors can compromise the integrity of the data.
Data Validation
• Purpose: Ensures that a set of rules is followed to maintain data quality.
• Types of Validation Checks:
• Length Check
• Type Check
• Presence Check
• Format Check
• Existence Check
• Limit Check
• Consistency Check
• Uniqueness Check
• Range Check
Data Validation Checks
Uniqueness
Length Check
Check
Verifies data Ensures data
entries are entries are within
distinct and not specified
duplicated. character limits.
Consistency
Type Check
Check
Ensures data Verifies data
entries are entries match
consistent across expected data
datasets. types.
Limit Check
Presence Check
Validates data
Confirms required
entries are within
data fields are not
defined limits.
empty.
Existence Check Format Check
Ensures data Checks data
entries exist in the entries adhere to
source system. specified formats.
Data Verification
• Purpose: Ensures that the entered data is accurate.
• Checks Performed:
• During Data Entry:
• Visual check
• Double-entry check
• Digit check
• During Data Transmission:
• Parity check
• Automated repeat/request query
• Checksums
Data Verification Process
Purpose
Identification
Visual Check
Double-entry
Check
Digit Check
Establishing
Parity Check Automated
the goal of Performing a
Repeat/Request
ensuring data manual Entering data
Query
accuracy inspection of twice to Verifying
data entries confirm numerical data Ensuring data
accuracy for correctness integrity during Initiating
transmission automatic data
resend or query