CYBER SECURITY THREATS - Polytechnic Ungku Omar
-
Upload
zakuan-zolkefly -
Category
Technology
-
view
177 -
download
0
description
Transcript of CYBER SECURITY THREATS - Polytechnic Ungku Omar
z96x
Name : Muhammad ***** bin[ ++++++++ ]
Cyber Security Threat
by
What is Cyber Security ?
Cyber security refers to processes to protect computers, networks and data from unauthorized access, vulnerabilities and attacks by cyber criminals.
What is Cyber Security Threat ?
Cyber threats refer to persons who trespassing unauthorized access to a control system and network by using various techniques.
Type of Threats
• Phishing
• Key Logging
• Malicious Software
Phishing
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details.
How Phishing Works on Google Mail(Intro and Graphic View)
How Phishing Works on Google Mail(continue)
Hacke
r send
fake
link to victim
Victim opens
link
A similar
LOGIN
page
like Google Mail appear
Victim
inputs
usernam
e and Password on LOGI
N pag
e
Google login
page
displays
Google.com
Keylogging / Keyboard Capturing
Keylogging or keyboard capturing, is the action of recording (or logging) the keys struck (or press) on a keyboard, usually it installed secretly on computer so user unaware they action is recorded.
How Keylogger Works
• Via Hardware
• Via Software
Avoiding Keylogger Threat
• Use Linux or Mac operating system.
• Never download suspicious software
• Have self awareness
Malicious Software Malicious software or malware
also known as, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems
How Malware Work
• Via Virus
• Via Worm
• Via Trojan Horse
Avoiding Malware Threat• Make sure your antivirus program includes
malware and spyware protection.• Avoid clicking on pop-up advertisements• Avoid downloading free software from sites
you are unfamiliar with.
Why Cyber Security is important ?
• Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great deal of sensitive information on computers and transmit that data across networks to other computers.
• An Security Expert Team should be established to overcome cyber security threats.