Cybersecurity Topics
1) Cybercrime and Information Security
- Cybercrime refers to illegal activities conducted via computers or networks, including hacking,
identity theft, phishing, ransomware, cyberbullying, and fraud.
- Information Security involves protecting information systems from unauthorized access,
disclosure, modification, destruction, or disruption.
- Core aspects include:
- Confidentiality: Ensuring information is accessible only to authorized individuals.
- Integrity: Protecting data from being altered or corrupted.
- Availability: Ensuring authorized users have access to information when needed.
- Strategies to combat cybercrime include firewalls, antivirus software, encryption, and best
practices like regular updates and training.
2) Cybercafe and Cybercrimes
- Cybercafe: A public place offering internet access to users for a fee, often used for browsing,
gaming, or communication.
- Cybercrimes in Cybercafes:
- Identity theft: Users may forget to log out from accounts.
- Phishing attacks: Falling prey to fake websites.
- Illegal downloads: Sharing pirated content.
- Cyberstalking: Misusing anonymity to harass others.
- Preventive Measures:
- Monitoring systems in cybercafes.
- Keeping logs of user activity.
- Educating users about safe browsing practices.
3) Botnets & Proliferation of Mobile and Wireless Devices
- Botnets:
- Networks of infected computers controlled remotely by attackers.
- Used for DDoS attacks, spam distribution, and malware spreading.
- Proliferation of Mobile and Wireless Devices:
- Increased attack surface due to mobile phones, IoT devices, and wireless networks.
- Vulnerabilities include outdated software, unsecured apps, and weak configurations.
- Protection:
- Install security patches and antivirus software.
- Use strong authentication for wireless networks.
- Avoid installing apps from untrusted sources.
4) Attacks on Mobile/Cell Phones
- Types of Attacks:
- Phishing: Sending fake messages to steal credentials.
- SIM Cloning: Duplicating a SIM card to intercept communication.
- Spyware: Secretly tracking user activity.
- Malware: Infecting the phone to steal data or control it.
- Wi-Fi Attacks: Exploiting unsecured public Wi-Fi networks.
- Protection:
- Regular updates for OS and apps.
- Avoid public Wi-Fi for sensitive transactions.
- Install apps from trusted sources and use antivirus software.
- Enable multi-factor authentication.
5) Network and Computer Attacks
- Common Attacks:
- Denial of Service (DoS) and Distributed DoS (DDoS): Overloading a system to make it
inaccessible.
- Man-in-the-Middle (MITM): Intercepting communication between two parties.
- Phishing: Deceiving users to steal sensitive information.
- Ransomware: Encrypting data and demanding payment for decryption.
- SQL Injection: Exploiting vulnerabilities in databases.
- Preventive Measures:
- Use intrusion detection and prevention systems (IDS/IPS).
- Implement network segmentation.
- Use strong passwords and encryption protocols.
- Regularly update and patch systems.