Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber security and Computer Misuse

Similar presentations


Presentation on theme: "Cyber security and Computer Misuse"— Presentation transcript:

1 Cyber security and Computer Misuse
Unit: Social & Economic Impact of Information and Communications Technology Cyber security and Computer Misuse

2 Introduction We live in a digital era where so much of what we do is done within a finger tip. Whether it’s ordering from a restaurant, shopping online or even making hotel reservations. We are constantly using the internet and as such are also regenerating data stored online through cloud storage. Today we will be focusing on cloud storage and elaborating more on cyber security.

3 Cloud Storage

4 Cloud storage is a service model in which data is maintained, managed, backed up remotely and made available to users over a network typically the Internet. Source:-

5 How does Cloud Storage work? .
It works by sharing resources, software, and information via the Internet. The information is stored on physical servers maintained and controlled by a cloud computing provider, such as Apple in regards to iCloud or Google Drive for Google users.

6

7 Objectives At the end of the lesson, students should be able to:
define cyber security differentiate between vulnerability, threats and attacks Name five threats associated with cyber security explain the five threats associated describe countermeasures to mitigate against these threats

8 Cyber security

9 What is Cyber Security? Cyber security is the protection of internet-connected systems, including hardware, software and data, from cyber attacks.

10 Elements of Cyber security
the possibility of being attacked or harmed Vulnerability Threats Attacks intention to inflict pain, injury, danger or damage an aggressive and violent act

11 Cyber threats and attacks

12 DDos A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.

13 How to prevent DDos Call your ISP or hosting provider tell them you are under attack and ask for help. Buy more bandwidth to handle spikes in traffic that may be caused by malicious activity. configuring your firewall or router to blocking attacks.

14 Password Attacks

15 How to prevent password cracking

16

17

18 Malvertising Malvertising ( "malicious advertising“) typically involves injecting malicious or malware- advertisements into legitimate online advertising networks and web pages.

19 How to prevent malvertising
Uninstall browser plug-ins you don't use and set the rest to click-to-play. Browser plug-ins, especially Java and Adobe's Flash, are usually the most vulnerable elements in your system. Install an ad blocker but before you do it, be aware that ad blockers are controversial Install an antivirus program that will identify and neutralize exploit kits.

20 Phising Phishing is a cybercrime whereby someone poses as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

21 How to prevent phising Use Firewalls – high-quality firewalls act as buffers between you, your computer and outside intruders. Be Wary of Pop-Ups – pop-up windows often masquerade as legitimate components of a website. All too often, though, they are phishing attempts. Never Give Out Personal Information – as a general rule, you should never share personal or financially sensitive information over the Internet. Make it a habit to check the address of the website. A secure website always starts with “https”.

22 Cyber attack

23 Your digital footprints follow you… #watchwehyuhpost

24 What have you learnt?


Download ppt "Cyber security and Computer Misuse"

Similar presentations


Ads by Google