0% found this document useful (0 votes)
27 views13 pages

Cyber Security

Uploaded by

api-758085317
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views13 pages

Cyber Security

Uploaded by

api-758085317
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

CYBER SECURITY

B Y M A D I S O N O ' C O N N O R
A D WA R E
• Any piece of software or application that displays advertisements, usually
through pop-up or pop-under windows. While they may be disruptive to some
users, adware are not inherently malicious and are actually considered as
grayware.

Examples:

• Banners

• Pop-up windows

• Large auto-play commercials

• Displayed advertisements
DDOS
• It's a cybercrime in which the attacker floods a server with
internet traffic to prevent users from accessing connected
online services and sites. A ddos attack is a malicious
attempt to disrupt the normal traffic of a targeted server,
service or network by overwhelming the target or its
surrounding infrastructure with a flood of Internet traffic.
Example;
• Domain name system amplification attack
M A L WA R E
• Any intrusive software developed by cybercriminals (often called
hackers) to steal data and damage or destroy computers and
computer systems. Malware encompasses all types of malicious
software, including viruses, and cybercriminals use it for many
reasons, such as: Tricking a victim into providing personal data for
identity theft

Examples;

• Ransomware
TROJAN HORSE
• A type of malware that downloads onto a computer disguised as a
legitimate program. The delivery method typically sees an attacker
use social engineering to hide malicious code within legitimate
software to try and gain users' system access with their
software. Once inside the network, attackers are able to carry out any
action that a legitimate user could perform, such as exporting files,
modifying data, deleting files or otherwise altering the contents of
the device.
S P Y WA R E
•Spyware is software that enables a user to obtain covert information
about another's computer activities by transmitting data covertly from
their hard drive. It’s a malicious software that enters a user's computer,
gathers data from the device and user, and sends it to third parties
without their consent. A commonly accepted spyware definition is a
strand of malware designed to access and damage a device without the
user's consent.
VIRUS
•A computer program that can copy itself and infect a computer without
permission or knowledge of the user. A virus might corrupt or delete data
on a computer, use e-mail programs to spread itself to other computers,
or even erase everything on a hard disk.

Examples;

• Worm

• Slammer

• Welchia
CLIENT
REQUIREMENTS
•There are many ways to keep your software and device secure,
for example; keep your passwords confidential and known by
only you, never share your password with someone else, keep
your important data and files on removable media, not the hard
drive, mechanisms must ensure that only authorized people gain
appropriate access, periodically scan any and all hard drives and
removable media for viruses. By doing these it'll help to make
your personal computer safer and more secure.
STRENGTHS AND WEAKNESSES OF
DIFFERENT SECURITY PROTECTION
METHODS
• Firewall: the advantage of software firewalls is their ability to control the specific network behavior of individual applications on a
system. A significant disadvantage of a software firewall is that it is typically located on the same system that is being protected.

• Remote access VPN: advantages are it prevents bandwidth throttling based on certain activities and disadvantages are VPN does not
protect you from voluntary data collection

• Data Loss Prevention: advantages are identifying and helps prevent unsafe or inappropriate sharing, transfer, or use of sensitive data,
disadvantages include no email redaction, limited control, attachment scanning issues, false positives, and limited OCR capabilities.

• Hyperscale Network Security: advantages are offer full high availability, intelligent load balancing, and support for orchestration,
disadvantages are high traffic volumes and complex flows can make real-time hyperscale monitoring difficult

• Network Segmentation: advantages are Improve operational performance. Segmentation reduces network congestion. But traditional
firewalls have a key flaw that directly opposes segmentation: they create flat networks that allow easy lateral movement
VIRUS PROTECTION
• Firewalls are a cybersecurity solution that protects your computer or network from unwanted items going in
or out as it partakes as a physical wall. Most computer systems have firewall as it decreases the chance of
the computer getting hacked and losing potentially important documents. Firewalls also help to monitor
network traffic, stop virus attacks, prevent hacking, stop spyware and promote privacy.
• By having an updated OS it continually scans for malware, viruses, and security threats. In addition, updates
are downloaded automatically to help keep your device safe and protect it from threats.
• Antivirus products work by detecting, quarantining and/or deleting malicious code, to prevent malware from
causing damage to your device. Modern antivirus products update themselves automatically, to provide
protection against the latest viruses and other types of malware.
Describe the Primary Platforms used. (E.G. Cloud, OS, Network)

Include Description Here:

Describe the System Components (including Hardware, Software, and


Communication resources).

Include Description Here: Computers, Routers, Servers, Internet, Cables, Servers, Switches,
Hubs

Describe Physical protection methods taken.

Include Description Here: Not allowing unauthorised people into the building, Installing
cameras.

Include any security software protecting the system.

Include Description Here: Online we protect our devices from hackers by using strong
firewalls and antivirus'.
Describe the Primary Platforms used. (E.G. Cloud, OS, Network)

Include Description Here: OS (open system) allows you to use different operating systems

Describe the System Components (including Hardware, Software, and


Communication resources).

Include Description Here: An operating systems is the connection between the hardware and
the software

Describe Physical protection methods taken.

Include Description Here: Not allowing unauthorised people into the building,
Installing cameras.

Include any security software protecting the system.

Include Description Here: Online we protect our devices from hackers by using
strong firewalls and antivirus'.
Hazard Likelihood S Severity Overall R Actions already taken to reduce risk Further actions recommended
core Score isk Score

e.g. Fire spreading along main corridor Automatic fire doors fitted, alarms fitted, extinguishers Regular fire drills
in corridors.
1 5 5

Human threats 3 4 2 Add security officer on front door Only students with badge can come in

Student design 2 3 1 Make systems more secure Keep eyes on all software's to prevent it

Phishing 4 4 3 Train staff to never click an unfamiliar link Provide similar training

Malicious employees 2 3 1 Always sign off computers Have auto close if not on computer for number of
minutes

Disguised criminals 3 4 2 Have biometrics eg fingerprint or retina scan Lock rooms when leaving the room or building

You might also like