🎧 New: AI-Generated Podcasts Turn your study notes into engaging audio conversations. Learn more

ICTE 10083 - 2nd & 3rd Lecture -Cybersecurity & Attacks.pdf

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...

Full Transcript

IT Social& Professional Issues Lecture 2 - Prof. Edrian G. Blasquino, LPT DATA& INFORMATION SECURITY You acknowledge and agree that any information you send or receive during your use of the site may be secure and may be intercepted or later acquired by unauthorized parties....

IT Social& Professional Issues Lecture 2 - Prof. Edrian G. Blasquino, LPT DATA& INFORMATION SECURITY You acknowledge and agree that any information you send or receive during your use of the site may be secure and may be intercepted or later acquired by unauthorized parties. CLICK TO AGREE CYBERSECURITY CYBERSECURITY - is the protection of internet-connected systems such as hardware, software and date from cyber threats and cyber attackers. Sources of DATA Call data records from our mobile phones that itemize who we have called, when, from where and for how long Social networks - text and photographs form the likes of Facebook, Twitter, LinkedIn, Instagram and etc Global Positioning System (GPS) location recovered from mobile phones and photographs we have posted. Plate number recognition data including data from congestion charge cameras Credit and debit card transactions Paypal transactions and withdrawals from automatic teller machines (ATM) Airline Passenger name records and loyalty cards Company ID cards Compute device MAC address and IP addresses Bluetooth and wireless network (WiFi identifiers) Passport scanners Store loyalty cards User identification names and associated passwords Shipping information from online orders SOCIAL ENGINEERING -is a term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information. PHISHING -is a type of social engineering where an attacker sends a fraudelent message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure. https://myaccount.google.com/security Think Before You Click, SEC_RITY is not complete U SMISHING -is a form of phishing that uses mobile phones as the attack platform. The criminal executes the attack with the intent to gather personal information including social insurance, bank, credit card numbers. VISHING -is a form of phishing that uses the phone to steal personal information from victims perpetrated through a call with an actual person or through voicemails or phone calls. what can we do to protect ourselves and our organization?: Education Verify Stay Cautious MALICIOUS SOFTWARE Lecture 3 RANSOMWARE -is a type of malicious software designed to block access to a computer system until a sum of money is paid. Some notable examples of Ransomware: WannaCry - May 2017 NotPetya (ExPetr, Petya, NotPetya, PetrWrap) - June 2017 Locky - February 2016 Cryptolocker - September 2013 Ryuk - August 2018 Sodinokibi (REvil) - April 2019 DoppelPaymer - June 2019 Maze - May 2019 DarkSide - August 2020 Medusa - September 2023 CRYPTOMINING MALWARE / CRYPTOJACKING -is a type of malicious software attack that co-opts the target's computing resources in order to mine cryptocurrencies like bitcoin. SPYWARE VIRUSES -are a type of malicious software that are installed on your computer or mobile device without your consent that can gain access to your sensitive personal information and then relay it to other parties. INTERNET DATA PRIVACY is the level of privacy protection an individual has while connected to the Internet How to Protect Your Data Privacy? Secure your accounts Protect your web browsing Use antivirus softwares

Use Quizgecko on...
Browser
Browser