Download presentation
Presentation is loading. Please wait.
1
Cyber security and Computer Misuse
Unit: Social & Economic Impact of Information and Communications Technology Cyber security and Computer Misuse
2
Introduction We live in a digital era where so much of what we do is done within a finger tip. Whether it’s ordering from a restaurant, shopping online or even making hotel reservations. We are constantly using the internet and as such are also regenerating data stored online through cloud storage. Today we will be focusing on cloud storage and elaborating more on cyber security.
3
Cloud Storage
4
Cloud storage is a service model in which data is maintained, managed, backed up remotely and made available to users over a network typically the Internet. Source:-
5
How does Cloud Storage work? .
It works by sharing resources, software, and information via the Internet. The information is stored on physical servers maintained and controlled by a cloud computing provider, such as Apple in regards to iCloud or Google Drive for Google users.
7
Objectives At the end of the lesson, students should be able to:
define cyber security differentiate between vulnerability, threats and attacks Name five threats associated with cyber security explain the five threats associated describe countermeasures to mitigate against these threats
8
Cyber security
9
What is Cyber Security? Cyber security is the protection of internet-connected systems, including hardware, software and data, from cyber attacks.
10
Elements of Cyber security
the possibility of being attacked or harmed Vulnerability Threats Attacks intention to inflict pain, injury, danger or damage an aggressive and violent act
11
Cyber threats and attacks
12
DDos A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.
13
How to prevent DDos Call your ISP or hosting provider tell them you are under attack and ask for help. Buy more bandwidth to handle spikes in traffic that may be caused by malicious activity. configuring your firewall or router to blocking attacks.
14
Password Attacks
15
How to prevent password cracking
18
Malvertising Malvertising ( "malicious advertising“) typically involves injecting malicious or malware- advertisements into legitimate online advertising networks and web pages.
19
How to prevent malvertising
Uninstall browser plug-ins you don't use and set the rest to click-to-play. Browser plug-ins, especially Java and Adobe's Flash, are usually the most vulnerable elements in your system. Install an ad blocker but before you do it, be aware that ad blockers are controversial Install an antivirus program that will identify and neutralize exploit kits.
20
Phising Phishing is a cybercrime whereby someone poses as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
21
How to prevent phising Use Firewalls – high-quality firewalls act as buffers between you, your computer and outside intruders. Be Wary of Pop-Ups – pop-up windows often masquerade as legitimate components of a website. All too often, though, they are phishing attempts. Never Give Out Personal Information – as a general rule, you should never share personal or financially sensitive information over the Internet. Make it a habit to check the address of the website. A secure website always starts with “https”.
22
Cyber attack
23
Your digital footprints follow you… #watchwehyuhpost
24
What have you learnt?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.