2. Confidential Customized for Lorem Ipsum LLC Version 1.0
Causes of Computer Damage
Network attacks
Interception
Hardware Theft
Software Theft
Identity Theft
System Failure
Virus Attacks
3. Digital Security Risk
A digital security risk is any event or action that could
cause a loss of or damage to a computer or mobile device
hardware, software, data, information, or processing
capability which also include computer and cyber crimes.
11. Hacker
1
● A computer hacker is any skilled
computer expert that uses their technical
knowledge to overcome a problem.
● While "hacker" can refer to any skilled
computer programmer, the term has
become associated in popular culture
with a "security hacker", someone who,
with their technical knowledge, uses bugs
or exploits to break into computer
systems.
12. Cracker
2
● someone who breaks into
someone else's computer
system, often on a network;
bypasses passwords or licenses
in computer programs ; or in
other ways intentionally
breaches computer security.
13. Script Kiddie
3
● a person who uses existing
computer scripts or code to
hack into computers, lacking
the expertise to write their
own.
14. Corporate Spy
4
● is a form of espionage
(spying, intelligence,
surveillance) conducted for
commercial purposes
instead of purely national
security.
15. Unethical Employee
5
● is one who illegally accesses
their company network for
numerous reasons.
● one could be the money they
can get from selling top secret
information, or some may be
bitter and want revenge.
16. Cyberextortionist
6
● someone who uses email as an offensive
force.
● they usually send a company a
threatening email stating that they will
release some confidential information,
exploit a security leak, or launch an attack
that will harm a company network
● they use blackmail to demand a certain
amount of money in exchange for not
launching an attack.
17. Cyber Terrorist
7
● someone who uses a computer
network or the Internet to destroy
computer systems for political
reasons.
● it is similar to a terrorist attack
because it requires highly skilled
individuals, millions of dollars to
implement and years of planning.
18. An Open Thought: The Power of The Dark Web
The Cesspool for Cyber Criminals
Monitoring illicit traffic is getting harder. We are starting to see peer-to-peer
technology taking over the dark web – which is far harder to track. If there's no
central hub, then there's nowhere to start. The dark web is changing
underneath us and it's certainly not going to stop any time soon. And this leads
us to new and deadlier attacks in digital security
-Sarah Jamie Lewis, Anonymity Researcher
20. Malware
Malware, short for
malicious software, consists
of programs that act
without a user’s knowledge
and deliberately alter the
operations of computers
and mobile devices
QUICK TIP
Try right clicking on a photo and
using "Replace Image" to show
your own photo.
21. Virus
● a type of malicious
software that, when
executed, replicates
itself by modifying other
computer programs and
inserting its own code.
22. Worm
● A computer worm is a standalone
malware computer program that
replicates itself in order to spread
to other computers
● Often, it uses a computer network
to spread itself, relying on security
failures on the target computer to
access it.
23. Trojan Horse
● One of the most insidious
types of Trojan horse is a
program that claims to rid
your computer of viruses
but instead introduces
viruses onto your computer.
24. Phishing
● Phishing is a cyber attack that uses
disguised email as a weapon.
● The goal is to trick the email recipient into
believing that the message is something
they want or need — a request from their
bank, for instance, or a note from someone
in their company — and to click a link or
download an attachment.
25. Adware
● The term adware is frequently used to
describe a form of malware (malicious
software) which presents unwanted
advertisements to the user of a
computer.
● The advertisements produced by
adware are sometimes in the form of a
pop-up or sometimes in an "unclosable
window".
26. The State of Cyber Security in the Philippines
In the 3rd quarter of 2015, Kaspersky Lab reports the
Philippines took the 33rd spot out of 233 countries prone to
cybersecurity threats – a huge jump from the previous quarter’s
43rd rank.
28. Botnet
1
● A botnet is a group of compromised
computers or mobile devices
connected to a network
● can be used to perform distributed
denial-of-service attack (DDoS
attack), steal data, send spam, and
allows the attacker to access the
device and its connection.
–A compromised computer or device is
known as a zombie
29. 2
● A denial of service attack (DoS
attack) disrupts computer access
to an Internet service
● In a DoS attack, the attacker
usually sends excessive messages
asking the network or server to
authenticate requests that have
invalid return addresses.
● DDoS attack
DoS Attack
30. 3
● A back door is a program or set of
instructions in a program that allow
users to bypass security controls
● is a method, often secret, of
bypassing normal authentication or
encryption in a computer system, a
product, or an embedded device
Back Door
31. 4
● Spoofing is a technique intruders
use to make their network or
Internet transmission appear
legitimate
● in general, it is a fraudulent or
malicious practice in which
communication is sent from an
unknown source disguised as a
source known to the receiver
Spoofing
33. Assignment:
What is a software/hardware that
protects a network ‘s resources from
intrusion?
How do/does it work?
- Prepare for a quiz next meeting