Cyber security refers to systems put in place to defend computers, web servers, mobile phones and networks from an attack by a cybercriminal.
Types of Cybersecurity Threats:
Brute force attacks
Data Interception
Distributed Denial of Service (DDoS) Attacks
Hacking
Malware
Phishing
Pharming
Social engineering
Brute force attacks is a method where all potential combinations are tried to generate a password
Data interception is the stealing of data by tapping into a network. Packet sniffers examine all data packets on a network and read the data. War driving is a method that intercepts Wi-Fi signals
A DDoS attack is an attempt to prevent anyone from accessing a part of a network. It is flooded with requests to overload and crash it
Hacking is when someone gains unauthorized access to a computer system or network
Malware is software used to infect computer/device
Examples of malware:
Viruses
Worms
Trojan horse
Spyware
Adware
Ransomware
Viruses are programs that can replicate themselves with the intention of deleting or corrupting files, or causing the computer to malfunction.
Worms are types of viruses that replicate themselves to other computers through networks without any action from the user
Trojan horses are malicious program disguised as legitimate software.
Spyware is software that gathers information by monitoring the victim and captures personal data
Adware is software that floods a user's computer with unwanted advertising.
Ransomware encrypts data on a computer so a decryption key is needed. A ransom is charged in order to get that key to decrypt the data
Phishing is the sending out of legitimate emails to users to trick them into giving out personal information by pretending to be someone else or a trustworthy source
Pharming is when someone redirects you to a fake website to collect information and is code installed in a computer
Social engineering is when someone manipulates users into revealing information by pretending to be someone you trust
Methods of keeping safe:
Access Levels
Anti-malware, anti-virus, anti-spyware
Authentication
Biometrics
Automatic software updates
Check spelling and tone of communication and URL links
Firewalls
Proxy Servers
Privacy Settings
Secure Sockets Layer (SSL)
Anti-malware:
Detects and removes spyware from HDD/SSD
Prevents downloading of spyware
Encrypts files and data
Blocks access to camera and microphone if suspicious activity detected
Scans for signs that user's information is being stolen
Firewalls
Can be both software or hardware
Examine traffic between computer and external network
Check if incoming data meets certain criteria
Prevent access to undesirable websites and IP addresses
Prevent virus and hackers
Maintain a log to show acitivity
Proxy Servers:
Filter internet traffic and blocking access
Keep user's IP address secret
Block requests from certain IP Address
Prevent direct access to a web server
Direct invalid traffic away
Using cache speeds up access to website
Can act as a firewall
Secure Sockets Layer (SSL)
Type of protocol used by computers to communicate securely with each other across networks. When a user logs into a website, it encrypts data