Chapter 5 Slides
Chapter 5 Slides
1 2 3
CONFIDENTIALITY 🔒 INTEGRITY ✅ AVAILABILITY 🌍
x100000
Distributed Denial of Service (DDOS)
How does it attack?
Sorry
can't do
x100000 it!
Distributed Denial of Service (DDOS)
Signs to detect a DDOS attack
Display filter
Captured
Packets
Detail of
packet header
Packet content in
hexadecimal and
ASCII
Data Interception
To tackle data interception
Encryption of data.
Eg. Wired Equivalent privacy (WEP)
Black-hat White-hat
hacker hacker
Trojan Ransomware
Virus Worm Spyware Adware
Horse
Virus
Trojan Ransomware
Virus Worm Spyware Adware
Horse
Trojan Horse
• A trojan horse is malware that is hidden away in the code of
software that appears to be harmless. A Trojan horse replaces all or
part of the legitimate software with the intent of carrying out some
harm to the user’s computer system.
Trojan Ransomware
Virus Worm Spyware Adware
Horse
Worm
Trojan Ransomware
Virus Worm Spyware Adware
Horse
Spyware
Trojan Ransomware
Virus Worm Spyware Adware
Horse
Adware
Trojan Ransomware
Virus Worm Spyware Adware
Horse
R Ransomware
Trojan Ransomware
Virus Worm Spyware Adware
Horse
P Phishing
• Sending out legitimate-
• Banks never email
multiple receivers
looking emails • No personal info
designed to trick the
required
recipients into giving • Wont use free email
their personal details to
gmail etc
the sender of the email. • No spelling mistakes
• These emails may
• Check at forums like
contain links or
virustotal
attachments, when
initiated, take the user
to a fake website to
enter personal details.
Phishing
• Sending out legitimate-
looking emails
designed to trick the
receiver.
• Upon user instructions, the software will then remove and delete
the offending malware or virus.
Password
Biometrics Two-step Credit Card &
and user Authentication verification Hotel Card
names
Password and user names
Password
and user
names
Tips for a stronger password
• Combine different types of character (lowercase, uppercase,
special character)
Password
and user
names
Biometric Authentication
• Biometrics relies on certain unique characteristics of human
beings:
• Fingerprint scans (compare image stored versus image
scanned; fingerprints are unique)
• Face recognition
• Voice recognition
Biometric
Authentication
Analog-Digital Converter Digital-Analog Converter
Two-step verification
Two-step
verification
Credit Card & Hotel Card
www.gougle.com
www.amozon.com
Firewall
• Firewalls are the primary defense to any computer system to help protect
it from hacking, malware (viruses and spyware), phishing and pharming.
• Main tasks
• Examine the ‘traffic’ between user’s computer (or internal network)
and a public network
•Action: Block
Privacy Setting
• Benefits?
Proxy Server
1. User Request: When you try to visit a website, your request first goes
to the proxy server instead of directly to the website.
2. Proxy Forwards the Request: The proxy server then sends your
request to the website on your behalf.
3. Website Sends Data to Proxy: The website responds by sending the
requested data (like a webpage or a video) to the proxy server.
4. Proxy Delivers Data to You: The proxy server then sends the data
back to you.
Proxy Server
• Benefits:
• Allows internet traffic to be filtered; it is possible to block access to a
website if necessary - Parental Control
• Act as a firewall
Secure socket layer
Certificate
An SSL certificate is a form of digital certificate
which is used to authenticate a website and
enables an encrypted connection
Secure Socket Layer Handshake
A user will know if SSL is being applied when they see https or the
small padlock in the status bar at the top of the screen.
How do we know if a website is using SSL?