3.6 Cybersecurity
3.6 Cybersecurity
3.6 Cybersecurity
Cybersecurity is essential for protecting personal, financial, and governmental data, maintaining
business operations, and ensuring trust in digital environments.
Cybersecurity Threats:
Penetration Testing:
Penetration testing (or pen testing) is a cybersecurity practice where authorized professionals
simulate attacks on a system, network, or application to identify vulnerabilities and weaknesses.
The goal is to discover security flaws before malicious attackers can exploit them.
Social engineering relies on human psychology to trick victims into divulging sensitive
information (such as passwords, personal details, or financial information) or performing actions
(like clicking malicious links or granting access). It often involves impersonation, deception, and
manipulation.
1. Blagging (Pretexting):
o Definition: Blagging, or pretexting, involves creating a fabricated scenario or
false identity to trick a target into providing sensitive information. The attacker
often pretends to be someone in a position of authority or trust.
o Example: A scammer pretending to be from a bank asks for account details to
“verify” a suspicious transaction.
o Protection: Train employees to verify the authenticity of the person asking for
information, require identification, and encourage caution when divulging
information over phone or email.
2. Phishing:
oDefinition: Phishing is a technique where attackers send deceptive emails,
messages, or websites that appear legitimate to trick individuals into revealing
personal information or clicking malicious links.
o Example: An email that looks like it's from a well-known company asking the
recipient to reset their password using a malicious link.
o Protection: Use email filtering, warn users about phishing attempts, and verify
URLs before clicking. Never provide sensitive information through unsolicited
communication.
3. Shouldering (Shoulder Surfing):
o Definition: Shouldering, or shoulder surfing, involves spying on someone’s
physical actions to obtain sensitive information, such as observing someone
entering their PIN at an ATM or typing a password.
o Example: An attacker looks over someone's shoulder to capture their password or
PIN number.
o Protection: Encourage individuals to cover their hand while entering PINs or
passwords and be mindful of their surroundings when accessing sensitive
information in public spaces.
Definition of Malware:
Malware (short for malicious software) is any software intentionally designed to harm, exploit,
or otherwise compromise the integrity of computer systems, networks, or data.
1. Antivirus Software: Use reputable antivirus programs to detect and remove malware.
2. Firewalls: Set up strong firewalls to prevent unauthorized access to systems.
3. Keep Software Updated: Regularly update operating systems and applications to patch
vulnerabilities that malware can exploit.
4. Avoid Suspicious Links and Downloads: Educate users to avoid clicking on unverified
links or downloading files from unknown sources.
5. Regular Backups: Frequently back up important data to minimize damage in case of a
malware attack.
Forms of Malware:
1. Computer Virus:
o Definition: A virus is a type of malware that attaches itself to legitimate files or
programs and spreads when those files are executed. It can corrupt files, disrupt
system operations, or delete data.
o How It Works: Once a virus infects a system, it replicates and spreads to other
files or devices. It often requires user interaction to trigger its execution, like
opening an infected file.
o Protection: Use antivirus software, avoid downloading files from untrusted
sources, and be cautious with email attachments.
2. Trojan:
o Definition: A trojan (or trojan horse) is malware that disguises itself as legitimate
software to trick users into installing it. Once installed, it allows attackers to
access the system remotely.
o How It Works: Trojans typically hide in seemingly harmless programs or files.
Once activated, they can create backdoors, steal data, or install additional
malware.
o Protection: Avoid downloading software from untrusted sources, use reputable
antivirus programs, and monitor system behavior for unusual activities.
3. Spyware:
o Definition: Spyware is malware designed to secretly monitor user activities and
gather information, such as passwords, browsing habits, or personal data, without
consent.
o How It Works: Spyware often runs in the background, logging keystrokes,
capturing screenshots, or tracking web activity to send sensitive information to
attackers.
o Protection: Use anti-spyware tools, avoid downloading suspicious software, and
be mindful of permissions requested by apps or programs.
Each of these security measures plays a vital role in strengthening defenses against cyber threats
by protecting user data, preventing unauthorized access, and securing systems from potential
attacks.