CYBER SECURITY THREATS - Polytechnic Ungku Omar

17
z96x Name : Muhammad ***** bin [ ++++++++ ] Cyber Security Threat by

description

WIDS :D Cyber security refers to processes to protect computers, networks and data from unauthorized access, vulnerabilities and attacks by cyber criminals. Cyber threats refer to persons who trespassing unauthorized access to a control system and network by using various techniques Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details. Keylogging or keyboard capturing, is the action of recording (or logging) the keys struck (or press) on a keyboard, usually it installed secretly on computer so user unaware they action is recorded.

Transcript of CYBER SECURITY THREATS - Polytechnic Ungku Omar

Page 1: CYBER SECURITY THREATS - Polytechnic Ungku Omar

z96x

Name : Muhammad ***** bin[ ++++++++ ]

Cyber Security Threat

by

Page 2: CYBER SECURITY THREATS - Polytechnic Ungku Omar

What is Cyber Security ?

Cyber security refers to processes to protect computers, networks and data from unauthorized access, vulnerabilities and attacks by cyber criminals.

Page 3: CYBER SECURITY THREATS - Polytechnic Ungku Omar
Page 4: CYBER SECURITY THREATS - Polytechnic Ungku Omar

What is Cyber Security Threat ?

Cyber threats refer to persons who trespassing unauthorized access to a control system and network by using various techniques.

Page 5: CYBER SECURITY THREATS - Polytechnic Ungku Omar
Page 6: CYBER SECURITY THREATS - Polytechnic Ungku Omar

Type of Threats

• Phishing

• Key Logging

• Malicious Software

Page 7: CYBER SECURITY THREATS - Polytechnic Ungku Omar

Phishing

Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details.

Page 8: CYBER SECURITY THREATS - Polytechnic Ungku Omar

How Phishing Works on Google Mail(Intro and Graphic View)

Page 9: CYBER SECURITY THREATS - Polytechnic Ungku Omar
Page 10: CYBER SECURITY THREATS - Polytechnic Ungku Omar

How Phishing Works on Google Mail(continue)

Hacke

r send

fake

link to victim

Victim opens

link

A similar

LOGIN

page

like Google Mail appear

Victim

inputs

usernam

e and Password on LOGI

N pag

e

Google login

page

displays

Google.com

Page 11: CYBER SECURITY THREATS - Polytechnic Ungku Omar

Keylogging / Keyboard Capturing

Keylogging or keyboard capturing, is the action of recording (or logging) the keys struck (or press) on a keyboard, usually it installed secretly on computer so user unaware they action is recorded.

Page 12: CYBER SECURITY THREATS - Polytechnic Ungku Omar

How Keylogger Works

• Via Hardware

• Via Software

Page 13: CYBER SECURITY THREATS - Polytechnic Ungku Omar

Avoiding Keylogger Threat

• Use Linux or Mac operating system.

• Never download suspicious software

• Have self awareness

Page 14: CYBER SECURITY THREATS - Polytechnic Ungku Omar

Malicious Software Malicious software or malware

also known as, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems

Page 15: CYBER SECURITY THREATS - Polytechnic Ungku Omar

How Malware Work

• Via Virus

• Via Worm

• Via Trojan Horse

Page 16: CYBER SECURITY THREATS - Polytechnic Ungku Omar

Avoiding Malware Threat• Make sure your antivirus program includes

malware and spyware protection.• Avoid clicking on pop-up advertisements• Avoid downloading free software from sites

you are unfamiliar with.

Page 17: CYBER SECURITY THREATS - Polytechnic Ungku Omar

Why Cyber Security is important ?

• Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of sensitive information on computers and transmit that data across networks to other computers.

• An Security Expert Team should be established to overcome cyber security threats.