0% found this document useful (0 votes)
58 views

Module G - Cybersecurity

This document provides an outline for a lesson on cybersecurity that covers the following topics: 1. An introduction to cybersecurity including definitions and the CIA triad of information security. 2. Categories of cyber crimes such as those targeting computers or using computers as weapons. 3. Types of cyber crimes like hacking, phishing, denial of service attacks, spam emails, and different types of malware. 4. Types of security tools including firewalls, antivirus software, VPNs, intrusion detection systems, encryption tools, and password managers. 5. Advantages of cybersecurity like defending against hacks and viruses while browsing safely. 6. Safety tips to prevent cyber crimes like

Uploaded by

Raquel Yumul
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views

Module G - Cybersecurity

This document provides an outline for a lesson on cybersecurity that covers the following topics: 1. An introduction to cybersecurity including definitions and the CIA triad of information security. 2. Categories of cyber crimes such as those targeting computers or using computers as weapons. 3. Types of cyber crimes like hacking, phishing, denial of service attacks, spam emails, and different types of malware. 4. Types of security tools including firewalls, antivirus software, VPNs, intrusion detection systems, encryption tools, and password managers. 5. Advantages of cybersecurity like defending against hacks and viruses while browsing safely. 6. Safety tips to prevent cyber crimes like

Uploaded by

Raquel Yumul
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

CYBER

SECURITY BY
DEPARTMENT OF BIOLOGICAL SCIENCES

MODULE G

OK
LESSON OUTLINE
01 02 03
INTRODUCTION TO CATEGORIES OF TYPES OF CYBER
CYBERSECURITY CYBER CRIME CRIME

04 05 06
TYPES OF SECURITY ADVANTAGE OF SAFETY TIPS TO
TOOLS CYBER SECURITY CYBER CRIME
Cybersecurity is as simple
as A B C:
Always Be Careful!
01
INTRODUCTION
TO CYBER
SECURITY
WHAT IS CYBERSECURITY?
✓ Cybersecurity is the practice of
protecting computer systems,
networks, and programs from digital
attacks, damage, or unauthorized
access.

✓ It involves implementing measures,


protocols, and technologies to ensure
the confidentiality, integrity, and
availability of information in the
digital realm. © ISACA
THE CIA TRIAD OF
INFORMATION SECURITY

© IT GOVERNANCE
OK 02
CATEGORIES OF
CYBER CRIME
CATEGORIES
COMPUTER AS THE COMPUTER AS THE
TARGET WEAPON
● Computer is used to ● Computer is used to
attack another commit real-world
computer. crime.
● E.g. hacking, viruses, ● E.g. credit card
worms, DoS attacks frauds
03
THINK BEFORE
YOU CLICK
TYPES OF
CYBER CRIME
HACKING
Hacking refers to the unauthorized access,
manipulation, or exploitation of computer
systems, networks, or data usually in a large
organization such as the government.

White Hat Hacking: An ethical hacking where


individuals use their skills to find and fix security
vulnerabilities.
Black Hat Hacking: A darker side of hacking, involving
individuals or groups who exploit vulnerabilities for
malicious purposes.

© SIMPLEARN.COM
PHISHING
Phishing is a digital version of fishing where
cybercriminals are attempting to lure people
into revealing sensitive information, such as
passwords or credit card numbers.

This can be done through deceptive emails or messages.

The attacker lures the recipient into clicking on a


link or attachment leading them to a fraudulent site
that captures their sensitive information.

© FRONTIER BLOG
DENIAL OF SERVICE
A Denial of Service (DoS) attack is a digital
traffic jam that disrupts the normal
functioning of a computer system, network, or
website.

In a DoS attack, the perpetrator overwhelms


the target with a flood of traffic, making it
unable to respond to legitimate requests.

© NAMESHIELD
SPAM EMAIL
Spam emails are unsolicited and often
irrelevant messages sent in bulk to a large
number of recipients.

The goal of spam emails can vary—from


promoting products and services to spreading
malware or phishing for sensitive information.

© GMASS
MALWARES
Malware, a.k.a malicious software, is a
broad term that encompasses various
types of harmful software designed to
disrupt, damage, or gain unauthorized
access to computer systems.

E.g. viruses, worms, trojans,


ransomware, spyware
TYPES OF MALWARES
Viruses: These attach themselves to
clean files and spread when the infected
file is executed.

Worms: Self-replicating and capable of


spreading across networks without human
intervention.
TYPES OF MALWARES
Trojans: Disguised as legitimate
software, Trojans deceive users into
installing them, allowing malicious
activities.

Ransomware: Encrypts files on a user's


system, demanding payment (often in
cryptocurrency) for their release.
TYPES OF MALWARES
Spyware: Stealthily monitors and
collects information about a user's
activities without their knowledge.

Adware: Bombards endless ads and pop-up


windows that could potentially be
dangerous for your device.
ATM SKIMMING
ATM skimming involves installing a small
device, called a skimmer, on an ATM to
secretly collect data from the magnetic
stripe of debit or credit cards.

© RAPPLER
04
TYPES OF
SECURITY
TOOLS
TYPES OF SECURITY TOOLS
Firewalls Antivirus Software Virtual Private
Networks (VPNs)
It monitors and controls It detects, prevents,
incoming and outgoing
and removes malicious It encrypts your
network traffic,
software (malware) to internet connection,
deciding which data
keep your system enhancing privacy and
packets can enter or
security, especially
leave based on healthy. when you're using public
predetermined security
Wi-Fi.
rules.

© HOWSTUFFWORKS © THE TELEGRAPH © CYBER YODHA


TYPES OF SECURITY TOOLS
Intrusion Detection Encryption Tools Password Managers
Systems (IDS)
It is a digital It generates complex
It monitors network translator that passwords, reducing
or system activities converts sensitive the risk of
for suspicious information into a unauthorized access
behavior and alerts secret code. to your accounts.
administrators to
potential threats.

© SPICEWORKS © HEIMDAL SECURITY © WIRED


TYPES OF SECURITY TOOLS
Security Information and Multi-Factor
Event Management (SIEM) Authentication (MFA)
Systems
It requires users to
It collects and analyzes provide more than one
log data from various form of identification
systems, providing a (e.g., password and
comprehensive view of an fingerprint) before
organization's security granting access.
posture.

© ISOLUTIONS ASSOCIATES © HARVARD UNIVERSITY © FLATICON


OK 05
ADVANTAGES OF
CYBERSECURITY
ADVANTAGES OF CYBERSECURITY
1. It defends us from hacks and viruses. It helps
us browse websites safely.
2. It processes all the incoming and outgoing
data on our computer.
3. It defends us from critical online attacks.
4. It forces the applications in a computer to be
updated regularly.
5. It detects the emergence of new viruses when
the database is updated.
06
THINK BEFORE
YOU CLICK
SAFETY TIPS TO
CYBER CRIME
SAFETY TIPS TO CYBER CRIME
1. Use anti-virus software.
2. Insert firewalls.
3. Uninstall unnecessary software.
4. Maintain backup.
5. Check security settings.
6. Never provide full name,
address, or other personal
information to strangers.
7. Learn more about the internet
ARE YOU
privacy.
READY?
SPECIAL TOPIC…

THE RISE OF ARTIFICIAL INTELLIGENCE (AI)

Have you joined the


bandwagon?
NOTABLE USES OF AI NOWADAYS

© MAVERICK-AI
NOTABLE USES OF AI NOWADAYS

The ERAs Tour in


Tondo!!
© FACEBOOK
NOTABLE USES OF AI NOWADAYS

© WORLD YMCA
NOTABLE USES OF AI NOWADAYS

© INDIA TODAY
NOTABLE USES OF AI NOWADAYS

© EUROPEAN PARLIAMENT
ARTIFICIAL INTELLIGENCE

Artificial Intelligence is the simulation of


human intelligence processes by machines,
especially computer systems.

a) Narrow AI (Weak AI): Designed for a particular


task (e.g., virtual assistants).
b) General AI (Strong AI): Capable of
understanding, learning, and performing any
intellectual task that a human can.
HOW AI WORKS

© WEKA
CHALLENGES OF
ARTIFICIAL INTELLIGENCE
1. Ethical concerns
2. Bias in algorithms
3. Job displacement
4. Lack of transparency
5. Data privacy and security
6. Regulatory challenges
7. Explainability and interpretability
8. AI in warfare
THANKS!
What part of the topic did you
least understand? ☺

CREDITS: This presentation template was created by Slidesgo,


including icons by Flaticon, infographics & images by Freepik

You might also like