0% found this document useful (0 votes)
22 views21 pages

Personal Data Security and Malware Awareness

Chapter 5 eSecurity

Uploaded by

yasin mujjuzi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views21 pages

Personal Data Security and Malware Awareness

Chapter 5 eSecurity

Uploaded by

yasin mujjuzi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

eSecurity

By
mujjuziy@[Link]
LEARNING INTENTIONS

By the end of this chapter, you will be able to:

know and understand what is meant by personal data, how to keep it


secure and prevent its misuse

recognise types and uses of malware, their consequences for


organisations and individuals and methods of prevention
Introduction
• The world of Information Technology can
be a fun and exciting experience.
• It also comes with its dangers, and it is
important that you are aware of these, so
that you can safeguard against them.
• Sadly, there are people with malicious
intentions online, and the more you are
aware of the actions that they could take,
the more protection you can put in place.
• This increased awareness and
preventative measures can make sure
that your time spent online, and further
afield with technology, does not endanger
you, your data or your identity.
Personal data
• The importance of caution in revealing
Personal data is any data that relates
personal data, especially online, is
to you and your identity. This
emphasized due to the potential risks such as
includes data such as:
identity theft, fraud, bullying, and blackmail.
• Name
• Address
• By sharing personal information, individuals
• Telephone number
expose themselves to dangers arising from
• Email address
divulging thoughts and feelings that can be
• Bank details
exploited against them.
• Medical records • While interacting with others, especially
• Salary online, is not discouraged, it is crucial to
• Political opinions recognize potential threats and adopt
measures to safeguard identity.
Guidelines for you to be aware of to
keep your personal data confidential
• Have strong passwords set on any account that holds personal data. Stronger passwords
include characters, numbers and symbols and are not a recognizable word.
• Encrypt (scramble text so that it cannot be read without a decryption key) any personal
data that you store on your computer.
• Have a firewall present, scanning incoming and outgoing data from your computer system.
• Regularly scan your computer with preventative software, such as an anti-virus package,
that is used to identify a virus on a computer and remove it.
• Make use of any biometric devices (devices that measures a person’s biological data, such
as thumbprints), that are built into technology.
• Do not open any email attachments from a sender you do not recognize.
• Check the URL attached to any link requesting data to see if it is genuine.
Guidelines for you to be aware of to
keep your personal data confidential
• Be cautious about any pictures or opinions that you post or send to people.
• Remove data about your location that is normally attached to your photos and videos that you may
post, such as geotags.
• Do not become friends on social networking sites with people you do not know.
• Set all the privacy controls to the most secure setting that are available on social media accounts.
• Report and block any suspicious user.
• Use a nickname or pseudonym when using the internet for entertainment, for example, playing
games.
• If it is possible, use a virtual private network (VPN), an encrypted connection that can be used to
send data more securely across a network.
How is personal
data collected?
• Phishing is a form of cyber attack where
perpetrators send seemingly legitimate emails
containing links to fake websites, or simply
request personal information via email.
• Users are deceived into providing their
personal data, believing the source to be
genuine.
• This data is collected by unauthorized
individuals and can be used for criminal
activities such as fraud or identity theft.
• Phishing emails often employ intimidation
tactics, pressuring users to act quickly or face
consequences.
• The primary goal of phishing attacks is to steal
personal data from users.
To recognize phishing attempts, follow
these guidelines:

• Only open emails from recognized or trusted senders.


• Beware of emails requesting personal data; legitimate companies typically don't ask
for this via email.
• Legitimate companies usually address you by name, not generic terms like "Dear
Member" or "Dear Customer."
• Check the sender's email address by hovering over it; if it doesn't match the
legitimate domain name or looks suspicious, it's likely fake.
• Watch for grammar or spelling mistakes in the email, as legitimate companies
typically ensure their communications are error-free.
• Inspect links in emails; legitimate ones should include the company's domain name.
Hover over the link or right-click to inspect it for errors or inconsistencies.
Smishing
• Smishing, or SMS phishing, is a form of phishing
that utilizes SMS text messages to deceive users
into divulging personal information.
• These messages may include links to fake
websites or prompt users to call a specified
number to address urgent issues.
• Similar to phishing, users should be cautious of
unfamiliar or suspicious links and messages.
• It's recommended to independently verify the
legitimacy of the message by typing the
company's domain name into a web browser
instead of clicking on provided links.
• Additionally, users can block suspicious numbers
to mitigate the risk of further smishing attempts
from those sources.
• Vishing, or voice phishing, shares the same objective as phishing: obtaining
personal details from users.
Vishin • In vishing, individuals receive telephone calls, which may be automated or from
a real person, claiming issues with their accounts, such as suspicious activity.
g • Users are prompted to call another number or provide account details over the
phone to resolve the supposed issue.
• This information is then exploited by unauthorized individuals for criminal
activities.
• Precautions against vishing include recognizing that legitimate companies will
never ask for login or PIN details over the phone.
• If in doubt, users should hang up and contact the company directly using a
known, legitimate number.
Pharming
• Pharming involves unauthorized
installation of malicious code on a user's
device or server.
• This code redirects users to fake websites
resembling legitimate ones, where they
unwittingly input personal information.
• Techniques like DNS cache poisoning
exploit vulnerabilities to divert internet
traffic to fake servers.
• Attackers typically distribute malicious
code through email attachments or links,
tricking users into downloading it.
To prevent pharming
attacks, follow these
guidelines:
• Utilize the same precautions as for phishing attacks,
such as being cautious with unfamiliar links and
emails.
• Install and maintain a firewall to monitor incoming
and outgoing traffic, flagging and stopping any
suspicious activity.
• Have an updated antivirus program designed to
detect malicious pharming code. Regularly scan
your computer for any threats.
• Exercise caution when using public Wi-Fi
connections, as hackers may attempt to install
malicious code. Consider using a VPN to encrypt
your internet activity and protect personal details
from potential attacks.
Malware
Malware
• Malware (or malicious software) refers
to any software designed to disrupt or
damage a computer system or a user.
There are various types of malware.
These include:
• virus
• trojan
• worm
• spyware
• adware
• rootkit
• malicious bots
• ransomware.
Minimizing the Risk of Viruses:
1. Install robust antivirus
software and regularly scan
Viruses the computer.
2. Set up automatic daily scans
• The information provided offers a to detect and quarantine
comprehensive overview of viruses, including infected files.
how they infect systems, signs of infection, 3. Keep antivirus software
and methods for minimizing the risk of virus updated to detect the latest
attacks. known viruses.
• Viruses are a well-known type of malware 4. Some antivirus software offers
that infects new files in computer systems. real-time checking for
• They attach themselves to clean files, downloaded files.
replicate, and then attach to other clean files, 5. Use a firewall to monitor and
spreading throughout the system like a filter incoming and outgoing
human virus. traffic to detect and block
• A virus aims to corrupt and disrupt data, malicious software.
often serving as a method of sabotage. 6. Be cautious when sharing
• Signs of a virus infection include slower resources using portable
system performance, files multiplying or storage devices like USB
duplicating on their own, and files being memory sticks, and scan them
deleted without the user's knowledge. immediately upon insertion.
• Trojans disguise themselves as legitimate software or are
bundled with legitimate software, tricking users into executing
them.
• Unlike viruses, Trojans do not replicate themselves but rely on
user interaction to run.
• Once executed, a Trojan may release other types of malware,
such as viruses, to further compromise the system.
• Common tactics used by Trojans include posing as software
updates or enticing users to click on malicious links.

Trojans • Minimizing the risk of Trojans is challenging due to their ability


to masquerade as legitimate software.
• Unlike viruses, Trojans may not be detected by antivirus or
firewall software because they rely on human error rather than
exploiting system vulnerabilities.
• Therefore, the main way to mitigate the risk of Trojans is to
exercise caution when opening files or running software,
especially from untrusted sources.
• Users should only open files or execute programs from trusted
sources, such as reputable software companies or trusted
• To minimize the risk of worms,
• users are advised to regularly update their

worms operating systems and applications to


patch known vulnerabilities.
• Additionally, precautions against phishing
• The passage describes worms as a type of malware that replicate attacks are recommended to prevent
themselves and spread independently, unlike viruses which unwittingly downloading worms via email
require a host file to attach to. attachments or links.
• Worms exploit security vulnerabilities in computer systems, often •
Using antivirus software to scan for and
in the operating system or applications, to replicate and spread.
detect worms is another important
• One notable characteristic of worms is their ability to consume measure for mitigating risk.
system resources and slow down the infected computer.
• Disconnecting computers from networks
• They aim to fill up available disk space, leading to decreased when network resources are not required
system performance and a noticeable decrease in available
storage.
can also prevent the spread of worms
through network connections.
• Worms commonly spread through various means, including email
attachments, peer-to-peer file-sharing networks, or links to • This measure is particularly relevant for
websites. preventing worm propagation in
organizational networks where multiple
• Once downloaded, they can replicate themselves without
requiring further human interaction. computers are interconnected.
• Spyware is a type of malware designed to covertly
gather information about a user's activities on their
computer. Spyware
• It operates by spying on the user's interactions without
their knowledge or consent, to obtain personal or • To minimize the risk of spyware, users should
sensitive data for fraudulent purposes. exercise caution when downloading software,
• One common example of spyware is a keylogger, especially from unknown or untrustworthy sources
which records keystrokes made by the user.
• They should avoid clicking on links or offers in pop-
• Spyware can also perform other actions, such as up ads and be wary of hidden clauses in user
tracking browsing habits for targeted marketing, agreements that may allow spyware to be installed.
displaying unwanted pop-up ads, or redirecting users
to advertising websites. • Additionally, users should regularly scan their
• Spyware can be unknowingly downloaded while
computers with anti-malware software to detect
browsing the internet, often embedded in enticing and remove any spyware present.
offers such as pop-up ads promising prizes or free • If spyware is detected, it's crucial to change all
products. passwords immediately to prevent unauthorized
• Users may inadvertently consent to the download of access to sensitive information.
spyware by agreeing to user agreements without
thoroughly reading them.
• Being proactive in addressing spyware threats is
essential to safeguarding personal and sensitive
data from malicious actors.
• Adware is a type of software that can be quite annoying, as it is designed to display
targeted advertisements on a user's computer.
• It does this by collecting data about their internet browsing habits, which can be used to
display ads that are more likely to be of interest to them.
• While some adware may be legitimate and may be used to generate revenue, others may
A be illegitimate and can be quite intrusive.
• One of the challenges with adware is that it can be bundled with legitimate software
d downloads.

w • This means that users may inadvertently install it without their knowledge.
• This often occurs when users are given the option to customize their downloads, with
ar adware hidden as an additional component.
• Once installed, adware can be difficult to remove and may continue to display unwanted
e advertisements or promote certain products or services.
• To minimize the risk of adware, users should carefully review the components included in
software downloads and deselect any items that appear to be adware before proceeding
with the installation.
• To manage adware proactively, users can regularly scan their computers with anti-malware
software to detect and remove any unwanted adware.
A rootkit
• A rootkit is a malicious computer program that allows unauthorized access to a victim's
computer, enabling various criminal activities such as hiding illegal files, participating in
cyber attacks, or stealing personal data.
• It remains hidden on the system, allowing remote control from a distant location.
• Rootkits can be installed by exploiting security vulnerabilities or cracking passwords,
often buried deep within the operating system to evade detection by anti-malware
software.
• They may include other malware to cause harm.
• To minimize the risk of rootkits, users should:
• 1. Use strong, complex passwords and change them regularly.
• 2. Download software only from trusted sources to avoid inadvertently installing rootkits.
• 3. Avoid inserting unknown USB memory sticks into their computers, as these can sometimes be
used to distribute rootkits.
• 4. Be cautious of suspicious behavior on their computers, such as unexpected system slowdowns
or unusual network activity, which could indicate a rootkit infection.

You might also like