Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber security. Malicious Code Social Engineering Detect and prevent.

Similar presentations


Presentation on theme: "Cyber security. Malicious Code Social Engineering Detect and prevent."— Presentation transcript:

1 Cyber security

2 Malicious Code Social Engineering Detect and prevent

3 Penetration Testing

4 Malicious Code or Malware VirusTrojanSpywareAdware

5 Computer Virus A computer virus is a malware that, when executed, replicates by reproducing itself or infecting other programs by modifying them. They commonly spread through emails – remember don’t open an email if it looks suspicious.

6 Trojan A Trojan is any malicious computer program which is used to hack into a computer by misleading users of its true intent. Named after the original Trojan horse from Greek myth

7 Spyware Spyware is software that aims to gather information about a person or organisation without their knowledge and that may send such information to another entity without their consent.

8 Adware a form of malware (malicious software) which presents unwanted advertisements to the user of a computer. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in an "un-closable window” Unlike most malware, Adware is not illegal and so is used by some well known companies Malware

9 Social Engineering Blagging Phishing Pharming Shouldering Social engineering is a set of methods criminals use to trick us into handing over information like passwords and credit card details. Hover over a topic on the left for more information

10 Social Engineering Blagging Phishing Pharming Shouldering Blagging is the act of creating and using an invented scenario (the pretext) to engage a targeted victim in a manner that increases the chance the victim will divulge information or perform actions that would be unlikely in ordinary circumstances. Example are the Nigerian Prince scam and more recently the emails from friends who have been mugged (in a foreign country) and need you to send money.

11 Social Engineering Blagging Phishing Pharming Shouldering Phishing is when the user is sent a fake e-mail. It might look like it comes from a bank or other legitimate business. The criminal hopes that the user will follow give away some important information eg by following a link to a false website and logging in with their ID.

12 Social Engineering Blagging Phishing Pharming Shouldering Pharming is a cyber attack intended to redirect a website's traffic to another, fake site. This can be done by hacking a DNS server or redirecting your computer electronically.

13 Social Engineering Blagging Phishing Pharming Shouldering Shouldering is a simpler way of obtaining peoples Password or Pin Numbers. Criminals just stand behind and watch what you type.

14 Detect and prevent Some of the measures which can be taken to improve system security. Click images for more information Biometric measures Password systems CAPTCHA Using email confirmations to confirm a user’s identity Automatic software updates.

15 Captcha-Completely Automated Public Turing Test To Tell Computers and Humans Apart A Captcha is a test that a human can pass but a computer program cannot. They stops people writing programs that automatically sign in to websites. An automatic program could try thousands of passwords.

16 Biometrics Biometrics are ways of using something that is unique to you as a person. A fingerprint / or thumbprint is common Iris scanners and hand scanners are also used. Phones and tablets are often protected this way

17 Passwords Many websites and computers systems require us to use a password to access. In companies different users may have very different levels of access to secure information. Password tips Don’t use a word or a name Include digits, capitals and or special characters Change your password regularly Don’t write it down Don’t let others watch you type it in

18 Email Confirmation When you sign up to a new site like Ebay or Amazon, you are typically asked to provide an email address. An email is then sent with a link to confirm your identity. This does not prevent people presenting fake identities as email accounts are easy to create but does stop hackers creating thousands of accounts automatically

19 Automatic Software Updates What do you do when you see those little icons and pop-up messages that appear in the system tray, indicating there is a new software update available for you to download and install? Most people find such notifications and the process of installing new software updates insignificant and disrupting. The truth is, people ignore such notifications for various reasons, such as, ‘Do I really need to install this update?’, ‘My computer is working just fine, I don’t think this update is for me!’, ‘I don’t have time to reboot my computer’, etc. If you are accustomed to dismissing those update notifications, you need to reconsider that practice. Applying software updates is one of the most important things you can do with your computer. In fact, if you don’t do it, you’re very likely going to get some kind of malware in your system and even get hijacked. (SuperAntiSpyware 2013)


Download ppt "Cyber security. Malicious Code Social Engineering Detect and prevent."

Similar presentations


Ads by Google