cyber security threats - polytechnic ungku omar
DESCRIPTION
WIDS :D Cyber security refers to processes to protect computers, networks and data from unauthorized access, vulnerabilities and attacks by cyber criminals. Cyber threats refer to persons who trespassing unauthorized access to a control system and network by using various techniques Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details. Keylogging or keyboard capturing, is the action of recording (or logging) the keys struck (or press) on a keyboard, usually it installed secretly on computer so user unaware they action is recorded.TRANSCRIPT
![Page 1: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/1.jpg)
z96x
Name : Muhammad ***** bin[ ++++++++ ]
Cyber Security Threat
by
![Page 2: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/2.jpg)
What is Cyber Security ?
Cyber security refers to processes to protect computers, networks and data from unauthorized access, vulnerabilities and attacks by cyber criminals.
![Page 3: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/3.jpg)
![Page 4: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/4.jpg)
What is Cyber Security Threat ?
Cyber threats refer to persons who trespassing unauthorized access to a control system and network by using various techniques.
![Page 5: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/5.jpg)
![Page 6: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/6.jpg)
Type of Threats
• Phishing
• Key Logging
• Malicious Software
![Page 7: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/7.jpg)
Phishing
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details.
![Page 8: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/8.jpg)
How Phishing Works on Google Mail(Intro and Graphic View)
![Page 9: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/9.jpg)
![Page 10: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/10.jpg)
How Phishing Works on Google Mail(continue)
Hacke
r send
fake
link to victim
Victim opens
link
A similar
LOGIN
page
like Google Mail appear
Victim
inputs
usernam
e and Password on LOGI
N pag
e
Google login
page
displays
Google.com
![Page 11: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/11.jpg)
Keylogging / Keyboard Capturing
Keylogging or keyboard capturing, is the action of recording (or logging) the keys struck (or press) on a keyboard, usually it installed secretly on computer so user unaware they action is recorded.
![Page 12: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/12.jpg)
How Keylogger Works
• Via Hardware
• Via Software
![Page 13: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/13.jpg)
Avoiding Keylogger Threat
• Use Linux or Mac operating system.
• Never download suspicious software
• Have self awareness
![Page 14: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/14.jpg)
Malicious Software Malicious software or malware
also known as, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems
![Page 15: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/15.jpg)
How Malware Work
• Via Virus
• Via Worm
• Via Trojan Horse
![Page 16: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/16.jpg)
Avoiding Malware Threat• Make sure your antivirus program includes
malware and spyware protection.• Avoid clicking on pop-up advertisements• Avoid downloading free software from sites
you are unfamiliar with.
![Page 17: CYBER SECURITY THREATS - Polytechnic Ungku Omar](https://reader036.vdocument.in/reader036/viewer/2022062514/5589e73dd8b42aba1b8b461c/html5/thumbnails/17.jpg)
Why Cyber Security is important ?
• Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of sensitive information on computers and transmit that data across networks to other computers.
• An Security Expert Team should be established to overcome cyber security threats.