Sie sind auf Seite 1von 4

Information Assurance Security 1 Page |1

Module 01 Introduction to Cyber Security

Learning Outcomes
At the end of the lesson, you should be able to:
1. Understand the Cyber Security and the Cyber Crime.
2. Know the History and Advantages of Cyber Crime.

Introduction
The term cyber security is used to refer to the security offered through on line services
to protect your online information.
With an increasing amount of people getting connected to Internet, the security threats that
cause massive harm are increasing also.

Cyber Crime
The former descriptions were "computer crime", "computer-related crime" or "crime by computer".
With the pervasion of digital technology, some new terms like "high-technology" or "information-
age" crime were added to the definition. Also, Internet brought other new terms, like "cybercrime"
and "net" crime.

Other forms include "digital", "electronic", "virtual" , "IT", "high-tech" and technology-enabled"
crime .

History
 The first recorded cyber crime was recorded in the year 1820.
 The first spam email took place in 1978 when it was sent over the Arpanet.
 The first Virus was installed on an Apple Computer in 1982.

Cyber Crimes Includes


 Illegal Access
 Illegal Interception
 System Interference
 Data Interference
 Misuse of Devices
 Fraud

Why should we care?


It is a criminal activity committed on the internet.
Cyber crime-Where computer is either a tool or target or both.

How can we protect


 Read Privacy policy carefully when you submit the data through internet.
 Encryption: lots of website uses SSL( secure socket layer) to encrypt a data
 Disable remote connectivity

Cyber Security
Cyber security standards are security standards which enable organizations to practice safe
security techniques to minimize the number of successful cyber security attacks.
Information Assurance Security 1 Page |2

Cyber security refers to the technologies and processes designed to protect computers, networks
and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber
criminals.

Though, cyber security is important for network, data and application security.

Communication security-protecting organization communication media , technology , and content.

Network security-is the protection of networking components, connection and content.

Information security-protection of information and its critical elements , including the systems and
hardware that use , store or transmit that information.

Advantage of cyber security


 It will defend from hacks and virus
 The application of cyber security used in our PC needs update every week.
 The security developers will update their database every week once. Hence the new virus
also deleted.

Need of cyber security:


Cyber security is necessary since it helps in securing data from treats such as data theft
or misuse, also safeguards your system from viruses.

Major Security problems


a. Virus
b. Hackers
c. Malware
d. Trojan Horses
e. Password Cracking

Viruses and Worms:


A virus is a program that is loaded onto your computer without your knowledge and runs
against your wishes.

Solution:
Install a security suite that protects the computer against threats such as viruses and worms.

Hackers:
In common a hacker is a person who breaks into computer, usually by gaining access to
administrative controls.

Types of Hackers:
1. White Hat Hacker
2. Grey Hat Hacker
3. Black Hat Hacker
Information Assurance Security 1 Page |3

Safety Tips
 Use antivirus software
 Insert firewalls , pop up blocker
 Uninstall unnecessary software
 Maintain backup Check security settings
 Use secure connection Open attachments carefully
 Use strong passwords , don’t give personal information unless required
Information Assurance Security 1 Page |4

Information Assurance Security 1 Page|2

How to Prevent Hacking

It may be impossible to prevent computer hacking, however effective security


controls including strong passwords, and the use of firewalls can helps.

Malware:

The word “malware” comes from the term “MALicious softWARE”

Malware is any software that infects and damages a computer system without the
owner’s knowledge or permission.

To Stop Malware

Download an anti-malware program that also helps prevent infections

Activate Network Threat Protection Firewall, Antivirus

Trojan Horses

Trojan horses are email viruses that can duplicate themselves, steal information, or
harm the computer system.

These viruses are the most serious threats to computers


How to Avoid Trojans

Security suites, such as Avast Internet Security, will prevent you from downloading
Trojan Horses.

Password Cracking:

Password attacks are attacks by hackers that are able to determine password
or find passwords to different protected electronics areas and social networks
sites.
Securing Password:
Use always Strong password.
Never use same password for two different sites.

Das könnte Ihnen auch gefallen