KEMBAR78
Lecture 6 Cybersecurity-Basics and .pptx
Cybersecurity Basics
This presentation will cover the fundamentals of cybersecurity, including
common threats, vulnerabilities, and basic security practices.
Lesson Objectives
Define cybersecurity and explain its significance in
protecting digital assets.
Identify common cybersecurity threats and vulnerabilities.
Describe basic cybersecurity practices for individuals and
organizations.
Explain the importance of cybersecurity measures such as
firewalls, encryption, and VPNs.
Understand ethical and legal considerations in
cybersecurity.
3
Introduction
to
Cybersecurity
Cybersecurity refers to the practice of protecting systems,
networks, devices, and data from cyber threats, unauthorized
access, damage, or theft. It involves implementing security
measures to ensure the confidentiality, integrity, and availability
(CIA) of digital assets.
Importance of Cybersecurity
• Cybersecurity is critical in today’s digital world because:
• Cyber threats are increasing with technological
advancements.
• Personal, financial, and business data must be protected
from cybercriminals.
• Organizations and governments rely on secure networks for
operations.
• A lack of cybersecurity measures can lead to financial losses,
data breaches, and identity theft.
• Cybersecurity ensures trust in online transactions,
communication, and digital services.
Core Principles of Cyber/Computer security
• Cybersecurity is built on three key principles, known as the CIA Triad:
• Confidentiality – Ensuring that information is only accessible to
authorized individuals. information that is considered to be confidential
in nature must only be accessed, used, copied or disclosed by person
who have been authorized to access, copy or use the information.
(Example: Encryption protects sensitive emails.)
• Integrity – Ensuring data remains accurate and unaltered by
unauthorized parties. integrity means that data cannot be created,
changed or deleted without authorization. A loss of integrity can also
occur when a computer virus is released into the computer. It occurs
when the online shopper is able to change the price of the product
he/she is purchasing.
• Availability – Ensuring that data and services are accessible when
needed. It means that the information, the computing system used to
process the information and the security controls used to protect the
information are all available and functioning correctly when the
information. Information should be readily available when needed.
(Example: Redundant servers prevent website downtime.)
4
5
Computer Security
Computer security is the process of preventing
and detecting unauthorized use of your computer
Prevention measures help you to stop
unauthorized users (also known as "intruders")
from accessing any part of your computer system.
Detection helps you to determine whether or not
someone attempted to break into your system, if
they were successful, and what they may have
done.
Major Threats to Computer Security
Employees
Hackers and Crackers
Terrorists
Organized crime groups
Common
Security Threats
6
Creation of malicious programs
Viruses
Phishing
Denial of Service
Internet Scams
Theft
Social Networking Risks
7
Malicious Program
Also called malware
They are designed to damage or disrupt
a computer system
Three common types of malware
Virus
Worm
Trojan Horse
8
Virus
A virus is a program that has been
written to cause corruption of data on
a computer. The virus is attached to a
file and then spreads from one file to
another once the program is executed.
Some categories of viruses include
Boot sector virus:
Logic bombs
Macro viruses
Multipartite viruses
File viruses
Memory resident viruses
11
Worm and Trojan
Horse
Worm is a program that replicates
themselves in a computer system
clogging the system so that its
operations are slowed or stopped.
Trojan Horse are programs that come
into the computer system
masquerading as legitimate
programs but they are in fact
malicious programs
12
Spyware
• Ad Network: Type of cookies that record
activities across different sites
– It can be activated and accessed from
many of the web sites that you visit.
• Web bugs: are small images or HTML code
hidden within an e-mail message.
– One of the most common Web bugs is
used by companies that sell active
mailing lists to spammers.
• Keystroke Loggers: Programs that record
every activity and keystroke made on your
computer system, including credit card
numbers, bank account numbers, and e-mail
messages
13
Phishing
• Phishing is a scam where someone
tricks you into giving away personal
information or money.
– The attacker may send fake
emails, texts, or phone calls that
appear to come from a legitimate
source.
• Phishing is a type of social
engineering attack often used
to steal user data, including
login credentials and credit
card numbers.
– It occurs when an attacker,
masquerading as a trusted
entity, dupes a victim into
opening an email, instant
message, or text message.
14
Privacy
•Privacy refers to the right of individuals or organizations to control their personal
information and how it is collected, used, and shared in the digital space.
•Privacy concerns the collection and use of data about individuals.
•There are three primary privacy issues:
• Accuracy: relates to the responsibility of those who collect data to ensure
that the data is correct.
• Property: relates to who owns data and rights to software.
• Access: relates to the responsibility of those who have data to control and
who is able to use that data.
Key Aspects of Privacy:
•Personal Data Protection – Safeguarding sensitive information like names,
addresses, and financial details.
•Online Privacy – Controlling what information is shared on websites, social
media, and apps.
•Data Security – Ensuring personal data is encrypted and not misused by
unauthorized parties.
•Regulatory Compliance – Laws like GDPR protect users from data misuse.
15
Computer Crime and
Computer Fraud
Computer crime is an illegal action in which the
perpetrator uses special knowledge of
computer technology
Criminal activity where a computer or network
is the source, tool, target or place of a crime.
Computer fraud is the use of computer systems
to perpetrate fraud.
16
Denial of Service (DoS)
• Dos Attack
– Slows down or stop a computer system or network
by flooding it with request for information and data
– Main targets
• ISPs
• Specific Websites
17
Internet Scams
• Internet Scam
– A scam using the internet
– Initiated by a mass mailing to
unsuspecting individuals
– Phishing
• Technique employed by scammers
• Tricks internet users into thinking a
fake
but official looking web site or email
is legitimate.
18
Theft
• Forms of theft
– Hardware – theft of equipment
– Software
• Software Piracy - Unauthorized copying of software's for personal gain or for
commercial purposes
– Data - the theft of data in the form of confidential information such as student
records
– Computer time – use (theft) of a company’s computer time by an employee to
run another business.
19
Social Networking Risks
• Openness of social networking sites
can put individuals at risk
• Stealing of personal identities
• Click-Jacking - Concealing hyperlinks
beneath legitimate clickable
content which, when clicked,
causes a user to unknowingly
perform actions, such as
downloading malware, or sending
your ID to a site.
21
Basic
Cybersecurity
Practices
Practice safe computing
Don’t accept files from a known infected source.
Don’t execute or open unknown files without
first scanning for viruses.
Limit or block automatic download of files to
your system.
Use anti- virus software on all machines.
Restricting Access
– Security Guards
– Using biometric scanning devices
• Fingerprints
• Iris
– Use of Password
• Dictionary Attack
22
Password Security Measures
• Password should be at least 8 characters
long.
• In password, use a mixture of letters and
numbers.
• Personal data like phone no, date of birth,
name should not be used as password.
• Do not tell password to anyone.
• Change your passwords periodically, and do
not reuse old passwords. Do not use the
same password for more than one system or
service.
• Enable two-factor authentication for extra
security.
• Use a strong password manager to store and
generate unique passwords.
23
Other Computer
Security Measures
• Verify those you correspond with. It is easy for
people to fake identities over the Internet.
• Beware of unsolicited contacts from individuals in
person, on the telephone, or on the Internet who are
seeking corporate or personal data.
• Be thoughtful and limit personal information you
share such as job titles, locations, hobbies, likes and
dislikes, or names and details of family members,
friends, and co-workers
• Do not share usernames, passwords, social security
numbers, credit cards, bank information, salaries,
computer network details
• Only install applications or software that come from
trusted, well-known sites. “Free” software may
come with malware. Verify what information
applications will be able to access prior to enabling
them. Once installed, keep it updated. If you no
longer use it, delete it.
24
Firewall
• They act as security buffer and
checks information coming from
the internet or a network.
• It either blocks or allows the
information to pass through your
computer.
• It prevents hackers from gaining
access to your computer through
a network or internet.
25
Encrypting Data
Email
Encryption
Protects e-mail messages
as they move across the
Internet.
• One of the most widely
used personal e-mail
encryption programs is
Pretty Good Privacy
File Encryption
Protects sensitive files by
encrypting them before
they are stored on a hard
drive.
Web Site
Encryption
Web pages that accept
passwords or
confidential information
like a credit card number
are often encrypted.
Wireless
Network
Encryption
Restricts access to
authorized users on
wireless networks
• WEP (Wired Equivalent
Privacy)
Email Etiquette
Protect Sensitive
Information
Avoid sharing personal or
financial details in emails.
Be Aware of Attachments
Open attachments only from
trusted sources.
Delete Suspicious Emails
Report phishing emails to your
email provider.
27
Ethical and Legal
Aspects of
Cybersecurity
Computer Ethics
• Guidelines for the morally
acceptable use of
computers in our society.
• Two important issues
– Copyright and Digital
Rights Management
– Plagiarism
28
Ethical and Legal Aspects of Cybersecurity
• Copyright
– A legal concept that gives
content creators the right
to control use and
distribution of their
work.
• Some materials that can be
copyrighted:
– Paintings
– Books
– Music
– Films
– Video games
– Software
• Software Piracy
– Unauthorized copying
and distribution of
software.
• Digital Rights Management
(DRM)
– Prevent copyright
violations
– Typically used to:
• Control the number of
devices that access a
given file
• Limit the kinds of devices
that can access a file.
• Plagiarism
• Representing some other
person’s work and ideas as
your own without giving
credit to the original source.
• Computer technology as a
tool for plagiarism
• Computer technology has
made it easier to catch
plagiarists
– Turnitin - Prevent
internet plagiarism
Key Takeaways
1 Cybersecurity is essential for
protecting data, systems, and
users from cyber threats.
2 Common cybersecurity threats
include malware, phishing, and
denial-of-service attacks.
3 Weak passwords, outdated
software, and unsecured
networks create vulnerabilities.
4 Basic security practices such as
strong passwords, regular
updates, and safe browsing can
reduce risks.
5 Cybersecurity tools like
firewalls, encryption, and VPNs
help protect digital assets.
6 Ethical and legal considerations
play a crucial role in maintaining
cybersecurity standards.
Summary
Define cybersecurity
and explain its
significance in
protecting digital
assets.
Identify common
cybersecurity threats
and vulnerabilities.
Describe basic
cybersecurity practices
for individuals and
organizations.
Explain the importance
of cybersecurity
measures such as
firewalls, encryption,
and VPNs.
Understand ethical and
legal considerations in
cybersecurity.
Lecture 6 Cybersecurity-Basics and .pptx

Lecture 6 Cybersecurity-Basics and .pptx

  • 1.
    Cybersecurity Basics This presentationwill cover the fundamentals of cybersecurity, including common threats, vulnerabilities, and basic security practices.
  • 2.
    Lesson Objectives Define cybersecurityand explain its significance in protecting digital assets. Identify common cybersecurity threats and vulnerabilities. Describe basic cybersecurity practices for individuals and organizations. Explain the importance of cybersecurity measures such as firewalls, encryption, and VPNs. Understand ethical and legal considerations in cybersecurity.
  • 3.
    3 Introduction to Cybersecurity Cybersecurity refers tothe practice of protecting systems, networks, devices, and data from cyber threats, unauthorized access, damage, or theft. It involves implementing security measures to ensure the confidentiality, integrity, and availability (CIA) of digital assets. Importance of Cybersecurity • Cybersecurity is critical in today’s digital world because: • Cyber threats are increasing with technological advancements. • Personal, financial, and business data must be protected from cybercriminals. • Organizations and governments rely on secure networks for operations. • A lack of cybersecurity measures can lead to financial losses, data breaches, and identity theft. • Cybersecurity ensures trust in online transactions, communication, and digital services.
  • 4.
    Core Principles ofCyber/Computer security • Cybersecurity is built on three key principles, known as the CIA Triad: • Confidentiality – Ensuring that information is only accessible to authorized individuals. information that is considered to be confidential in nature must only be accessed, used, copied or disclosed by person who have been authorized to access, copy or use the information. (Example: Encryption protects sensitive emails.) • Integrity – Ensuring data remains accurate and unaltered by unauthorized parties. integrity means that data cannot be created, changed or deleted without authorization. A loss of integrity can also occur when a computer virus is released into the computer. It occurs when the online shopper is able to change the price of the product he/she is purchasing. • Availability – Ensuring that data and services are accessible when needed. It means that the information, the computing system used to process the information and the security controls used to protect the information are all available and functioning correctly when the information. Information should be readily available when needed. (Example: Redundant servers prevent website downtime.) 4
  • 5.
    5 Computer Security Computer securityis the process of preventing and detecting unauthorized use of your computer Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if they were successful, and what they may have done. Major Threats to Computer Security Employees Hackers and Crackers Terrorists Organized crime groups
  • 6.
    Common Security Threats 6 Creation ofmalicious programs Viruses Phishing Denial of Service Internet Scams Theft Social Networking Risks
  • 7.
    7 Malicious Program Also calledmalware They are designed to damage or disrupt a computer system Three common types of malware Virus Worm Trojan Horse
  • 8.
    8 Virus A virus isa program that has been written to cause corruption of data on a computer. The virus is attached to a file and then spreads from one file to another once the program is executed. Some categories of viruses include Boot sector virus: Logic bombs Macro viruses Multipartite viruses File viruses Memory resident viruses
  • 9.
    11 Worm and Trojan Horse Wormis a program that replicates themselves in a computer system clogging the system so that its operations are slowed or stopped. Trojan Horse are programs that come into the computer system masquerading as legitimate programs but they are in fact malicious programs
  • 10.
    12 Spyware • Ad Network:Type of cookies that record activities across different sites – It can be activated and accessed from many of the web sites that you visit. • Web bugs: are small images or HTML code hidden within an e-mail message. – One of the most common Web bugs is used by companies that sell active mailing lists to spammers. • Keystroke Loggers: Programs that record every activity and keystroke made on your computer system, including credit card numbers, bank account numbers, and e-mail messages
  • 11.
    13 Phishing • Phishing isa scam where someone tricks you into giving away personal information or money. – The attacker may send fake emails, texts, or phone calls that appear to come from a legitimate source. • Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers. – It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.
  • 12.
    14 Privacy •Privacy refers tothe right of individuals or organizations to control their personal information and how it is collected, used, and shared in the digital space. •Privacy concerns the collection and use of data about individuals. •There are three primary privacy issues: • Accuracy: relates to the responsibility of those who collect data to ensure that the data is correct. • Property: relates to who owns data and rights to software. • Access: relates to the responsibility of those who have data to control and who is able to use that data. Key Aspects of Privacy: •Personal Data Protection – Safeguarding sensitive information like names, addresses, and financial details. •Online Privacy – Controlling what information is shared on websites, social media, and apps. •Data Security – Ensuring personal data is encrypted and not misused by unauthorized parties. •Regulatory Compliance – Laws like GDPR protect users from data misuse.
  • 13.
    15 Computer Crime and ComputerFraud Computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology Criminal activity where a computer or network is the source, tool, target or place of a crime. Computer fraud is the use of computer systems to perpetrate fraud.
  • 14.
    16 Denial of Service(DoS) • Dos Attack – Slows down or stop a computer system or network by flooding it with request for information and data – Main targets • ISPs • Specific Websites
  • 15.
    17 Internet Scams • InternetScam – A scam using the internet – Initiated by a mass mailing to unsuspecting individuals – Phishing • Technique employed by scammers • Tricks internet users into thinking a fake but official looking web site or email is legitimate.
  • 16.
    18 Theft • Forms oftheft – Hardware – theft of equipment – Software • Software Piracy - Unauthorized copying of software's for personal gain or for commercial purposes – Data - the theft of data in the form of confidential information such as student records – Computer time – use (theft) of a company’s computer time by an employee to run another business.
  • 17.
    19 Social Networking Risks •Openness of social networking sites can put individuals at risk • Stealing of personal identities • Click-Jacking - Concealing hyperlinks beneath legitimate clickable content which, when clicked, causes a user to unknowingly perform actions, such as downloading malware, or sending your ID to a site.
  • 18.
    21 Basic Cybersecurity Practices Practice safe computing Don’taccept files from a known infected source. Don’t execute or open unknown files without first scanning for viruses. Limit or block automatic download of files to your system. Use anti- virus software on all machines. Restricting Access – Security Guards – Using biometric scanning devices • Fingerprints • Iris – Use of Password • Dictionary Attack
  • 19.
    22 Password Security Measures •Password should be at least 8 characters long. • In password, use a mixture of letters and numbers. • Personal data like phone no, date of birth, name should not be used as password. • Do not tell password to anyone. • Change your passwords periodically, and do not reuse old passwords. Do not use the same password for more than one system or service. • Enable two-factor authentication for extra security. • Use a strong password manager to store and generate unique passwords.
  • 20.
    23 Other Computer Security Measures •Verify those you correspond with. It is easy for people to fake identities over the Internet. • Beware of unsolicited contacts from individuals in person, on the telephone, or on the Internet who are seeking corporate or personal data. • Be thoughtful and limit personal information you share such as job titles, locations, hobbies, likes and dislikes, or names and details of family members, friends, and co-workers • Do not share usernames, passwords, social security numbers, credit cards, bank information, salaries, computer network details • Only install applications or software that come from trusted, well-known sites. “Free” software may come with malware. Verify what information applications will be able to access prior to enabling them. Once installed, keep it updated. If you no longer use it, delete it.
  • 21.
    24 Firewall • They actas security buffer and checks information coming from the internet or a network. • It either blocks or allows the information to pass through your computer. • It prevents hackers from gaining access to your computer through a network or internet.
  • 22.
    25 Encrypting Data Email Encryption Protects e-mailmessages as they move across the Internet. • One of the most widely used personal e-mail encryption programs is Pretty Good Privacy File Encryption Protects sensitive files by encrypting them before they are stored on a hard drive. Web Site Encryption Web pages that accept passwords or confidential information like a credit card number are often encrypted. Wireless Network Encryption Restricts access to authorized users on wireless networks • WEP (Wired Equivalent Privacy)
  • 23.
    Email Etiquette Protect Sensitive Information Avoidsharing personal or financial details in emails. Be Aware of Attachments Open attachments only from trusted sources. Delete Suspicious Emails Report phishing emails to your email provider.
  • 24.
    27 Ethical and Legal Aspectsof Cybersecurity Computer Ethics • Guidelines for the morally acceptable use of computers in our society. • Two important issues – Copyright and Digital Rights Management – Plagiarism
  • 25.
    28 Ethical and LegalAspects of Cybersecurity • Copyright – A legal concept that gives content creators the right to control use and distribution of their work. • Some materials that can be copyrighted: – Paintings – Books – Music – Films – Video games – Software • Software Piracy – Unauthorized copying and distribution of software. • Digital Rights Management (DRM) – Prevent copyright violations – Typically used to: • Control the number of devices that access a given file • Limit the kinds of devices that can access a file. • Plagiarism • Representing some other person’s work and ideas as your own without giving credit to the original source. • Computer technology as a tool for plagiarism • Computer technology has made it easier to catch plagiarists – Turnitin - Prevent internet plagiarism
  • 26.
    Key Takeaways 1 Cybersecurityis essential for protecting data, systems, and users from cyber threats. 2 Common cybersecurity threats include malware, phishing, and denial-of-service attacks. 3 Weak passwords, outdated software, and unsecured networks create vulnerabilities. 4 Basic security practices such as strong passwords, regular updates, and safe browsing can reduce risks. 5 Cybersecurity tools like firewalls, encryption, and VPNs help protect digital assets. 6 Ethical and legal considerations play a crucial role in maintaining cybersecurity standards.
  • 27.
    Summary Define cybersecurity and explainits significance in protecting digital assets. Identify common cybersecurity threats and vulnerabilities. Describe basic cybersecurity practices for individuals and organizations. Explain the importance of cybersecurity measures such as firewalls, encryption, and VPNs. Understand ethical and legal considerations in cybersecurity.

Editor's Notes

  • #2 By the end of this lesson, students should be able to: Define cybersecurity and explain its significance in protecting digital assets. Identify common cybersecurity threats and vulnerabilities. Describe basic cybersecurity practices for individuals and organizations. Explain the importance of cybersecurity measures such as firewalls, encryption, and VPNs. Understand ethical and legal considerations in cybersecurity.
  • #5 Employees: They have easiest access to computers and they are sometimes trying to steal something from the employer – equipment, software, proprietary information, etc Hackers and Crackers: Hackers are groups of people who gain unauthorized access to the computer system, try to understand the inner workings of the computer system and then work to discover weakness within the computer system. Crackers on the other hand equally also gain unauthorized access to the computer system but they destroy vital data, deny service to legitimate users, or cause problems in a targeted area. Their motive can be to make money in a illegitimate way. Terrorists: A group of people who use violent actions in order to achieve political aims or to force a government to act. These people could potentially crash satellites and disrupt communication systems. Organized crime groups: these group of people use computers for illegal purposes such as printing counterfeit documents, checks, drivers licenses and monies.
  • #8 Once infected, that file can spread the infection to other files and, through those files, to other machines. Boot sector virus: The code of this virus is found in the boot sector. Every time the computer starts, the virus goes into memory and this allows the virus to have control over certain functions. It can also spread to other drives (floppy, hard, and network). Logic Bombs: This virus, considered a Trojan horse, only executes when certain things happen such as changes to files, user logon, or reaching a certain date. Macro Viruses: These types of viruses attach themselves to a document file, such as a Microsoft Word document. If opened, the macro virus copies itself into other documents. Multipartite viruses: Multipartite viruses can infect boot sectors, executable files, and documents. After becoming resident in memory, they infect the boot sector and the other areas of the computer system. File viruses: File viruses attach themselves to or replace BIN, COM, DRV, EXE, OVL, OVY, and SYS files. They can be resident in memory or simply infect when an infected file is run. Memory resident viruses: These viruses stay resident in memory after their execution and infect other files.
  • #9 Once infected, that file can spread the infection to other files and, through those files, to other machines. Boot sector virus: The code of this virus is found in the boot sector. Every time the computer starts, the virus goes into memory and this allows the virus to have control over certain functions. It can also spread to other drives (floppy, hard, and network). Logic Bombs: This virus, considered a Trojan horse, only executes when certain things happen such as changes to files, user logon, or reaching a certain date. Macro Viruses: These types of viruses attach themselves to a document file, such as a Microsoft Word document. If opened, the macro virus copies itself into other documents. Multipartite viruses: Multipartite viruses can infect boot sectors, executable files, and documents. After becoming resident in memory, they infect the boot sector and the other areas of the computer system. File viruses: File viruses attach themselves to or replace BIN, COM, DRV, EXE, OVL, OVY, and SYS files. They can be resident in memory or simply infect when an infected file is run. Memory resident viruses: These viruses stay resident in memory after their execution and infect other files.
  • #10 Once infected, that file can spread the infection to other files and, through those files, to other machines. Boot sector virus: The code of this virus is found in the boot sector. Every time the computer starts, the virus goes into memory and this allows the virus to have control over certain functions. It can also spread to other drives (floppy, hard, and network). Logic Bombs: This virus, considered a Trojan horse, only executes when certain things happen such as changes to files, user logon, or reaching a certain date. Macro Viruses: These types of viruses attach themselves to a document file, such as a Microsoft Word document. If opened, the macro virus copies itself into other documents. Multipartite viruses: Multipartite viruses can infect boot sectors, executable files, and documents. After becoming resident in memory, they infect the boot sector and the other areas of the computer system. File viruses: File viruses attach themselves to or replace BIN, COM, DRV, EXE, OVL, OVY, and SYS files. They can be resident in memory or simply infect when an infected file is run. Memory resident viruses: These viruses stay resident in memory after their execution and infect other files.
  • #11 Clog: To block something or to become blocked. Trojan Horse: A example: free screen saver programs that are downloaded from the internet, once they are downloaded onto a computer system, the viruses are deposited and ready to activate.
  • #12 record your activities across different sites. Once deposited onto your hard drive, they can be activated and accessed from many of the Web sites that you visit. These cookies are deposited on your hard disk by organizations that compile and market the information. When a user opens an e-mail containing a Web bug, information is sent back to the source of the bug.
  • #13 record your activities across different sites. Once deposited onto your hard drive, they can be activated and accessed from many of the Web sites that you visit. These cookies are deposited on your hard disk by organizations that compile and market the information. When a user opens an e-mail containing a Web bug, information is sent back to the source of the bug.
  • #14 People: Part of the computer system. Privacy relates to collection and use of personal information Personal Data Protection – Safeguarding sensitive information like names, addresses, and financial details. Online Privacy – Controlling what information is shared on websites, social media, and apps. Data Security – Ensuring personal data is encrypted and not misused by unauthorized parties. Regulatory Compliance – Laws like GDPR and CCPA protect users from data misuse. GDPR – General Data Protection Regulation CCPA – California Consumer Privacy Act
  • #15 Computer crime ( cybercrime, e-crime, hi-tech crime or electronic crime) generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. A computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology
  • #16 Denial of Service A denial of service (DoS) attack attempts to slow down or stop a computer system or network by flooding a computer or network with requests for information and data. The targets of these attacks are usually Internet service providers (ISP) and specific Web sites. Once under attack, the servers at the ISP or the Web site become overwhelmed with these requests for service and are unable to respond to legitimate users. As a result, the ISP or Web site is effectively shut down.
  • #17 A scam is a fraudulent or deceptive act or operation designed to trick individuals into providing personal information or spending their time and money for little or no return. A technique often employed by scammers is phishing (pronounced “fishing”). Phishing attempts to trick Internet users into thinking a fake but official-looking Web site or e-mail is legitimate.
  • #18 Thieves steal equipment and programs, of course, but there are also white-collar crimes. These crimes include the theft of data in the form of confidential information such as student records. Another common crime is the use (theft) of a company’s computer time by an employee to run another business. Software Piracy: Unauthorized copying of software's for personal gain or for commercial purposes
  • #19 Others post detailed personal information such as their birth dates, family member names, home addresses, and photos of their children. This information can be used by others to steal personal identities and commit other types of crimes. Always exercise caution when providing information on Facebook, Twitter, MySpace, and other social networking sites. Always use the privacy settings and controls that are provided at the social networking sites you use. Click-jacking - Concealing hyperlinks beneath legitimate clickable content which, when clicked, causes a user to unknowingly perform actions, such as downloading malware, or sending your ID to a site.  Numerous click-jacking scams have employed “Like” and “Share” buttons on social networking sites. Disable scripting and iframes in whatever Internet browser you use. Research other ways to set your browser options to maximize security.
  • #21 A dictionary attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.
  • #22 Selorm – 53l0rm
  • #24 A firewall acts as security buffer and checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings. A firewall can help prevent hackers or malicious software such as worms from gaining access to your computer through a network or the Internet.
  • #25 encryption, the process of coding information to make it unreadable except to those who have a special piece of information known as an encryption key, or, simply, key. Web site encryption: Secures Web transactions, especially financial transactions. WEP: is one of the best known wireless encryption protocols
  • #27 Ethics, as you may know, are standards of moral conduct. Computer ethics are guidelines for the morally acceptable use of computers in our society
  • #28 Ethics, as you may know, are standards of moral conduct. Computer ethics are guidelines for the morally acceptable use of computers in our society Copyright is a legal concept that gives content creators the right to control use and distribution of their work. Materials that can be copyrighted include paintings, books, music, films, and even video games. Copyright is a legal concept that gives content creators the right to control use and distribution of their work. Materials that can be copyrighted include paintings, books, music, films, and even video games. DRM encompasses various technologies that control access to electronic media and files. Another ethical issue is plagiarism, which means representing some other person’s work and ideas as your own without giving credit to the original source. For example, simply cutting and pasting content from a Web page into a report or paper may seem tempting to an overworked student or employee.
  • #29  Cybersecurity is essential for protecting data, systems, and users from cyber threats. Common cybersecurity threats include malware, phishing, and denial-of-service attacks. Weak passwords, outdated software, and unsecured networks create vulnerabilities. Basic security practices such as strong passwords, regular updates, and safe browsing can reduce risks. Cybersecurity tools like firewalls, encryption, and VPNs help protect digital assets. Different industries have specific cybersecurity needs, including healthcare, banking, and government. Ethical and legal considerations play a crucial role in maintaining cybersecurity standards.