0% found this document useful (0 votes)
17 views3 pages

Cybersecurity Topics

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views3 pages

Cybersecurity Topics

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Cybersecurity Topics

1) Cybercrime and Information Security

- Cybercrime refers to illegal activities conducted via computers or networks, including hacking,

identity theft, phishing, ransomware, cyberbullying, and fraud.

- Information Security involves protecting information systems from unauthorized access,

disclosure, modification, destruction, or disruption.

- Core aspects include:

- Confidentiality: Ensuring information is accessible only to authorized individuals.

- Integrity: Protecting data from being altered or corrupted.

- Availability: Ensuring authorized users have access to information when needed.

- Strategies to combat cybercrime include firewalls, antivirus software, encryption, and best

practices like regular updates and training.

2) Cybercafe and Cybercrimes

- Cybercafe: A public place offering internet access to users for a fee, often used for browsing,

gaming, or communication.

- Cybercrimes in Cybercafes:

- Identity theft: Users may forget to log out from accounts.

- Phishing attacks: Falling prey to fake websites.

- Illegal downloads: Sharing pirated content.

- Cyberstalking: Misusing anonymity to harass others.

- Preventive Measures:
- Monitoring systems in cybercafes.

- Keeping logs of user activity.

- Educating users about safe browsing practices.

3) Botnets & Proliferation of Mobile and Wireless Devices

- Botnets:

- Networks of infected computers controlled remotely by attackers.

- Used for DDoS attacks, spam distribution, and malware spreading.

- Proliferation of Mobile and Wireless Devices:

- Increased attack surface due to mobile phones, IoT devices, and wireless networks.

- Vulnerabilities include outdated software, unsecured apps, and weak configurations.

- Protection:

- Install security patches and antivirus software.

- Use strong authentication for wireless networks.

- Avoid installing apps from untrusted sources.

4) Attacks on Mobile/Cell Phones

- Types of Attacks:

- Phishing: Sending fake messages to steal credentials.

- SIM Cloning: Duplicating a SIM card to intercept communication.

- Spyware: Secretly tracking user activity.

- Malware: Infecting the phone to steal data or control it.

- Wi-Fi Attacks: Exploiting unsecured public Wi-Fi networks.


- Protection:

- Regular updates for OS and apps.

- Avoid public Wi-Fi for sensitive transactions.

- Install apps from trusted sources and use antivirus software.

- Enable multi-factor authentication.

5) Network and Computer Attacks

- Common Attacks:

- Denial of Service (DoS) and Distributed DoS (DDoS): Overloading a system to make it

inaccessible.

- Man-in-the-Middle (MITM): Intercepting communication between two parties.

- Phishing: Deceiving users to steal sensitive information.

- Ransomware: Encrypting data and demanding payment for decryption.

- SQL Injection: Exploiting vulnerabilities in databases.

- Preventive Measures:

- Use intrusion detection and prevention systems (IDS/IPS).

- Implement network segmentation.

- Use strong passwords and encryption protocols.

- Regularly update and patch systems.

You might also like