Internet Technologies & Cyber Security
Internet Technologies & Cyber Security
2
INTERNET
The vast network that connects digital devices all over the world.
Simply “network of networks,”
3
WORLD WIDE WEB
AKA(Also Known As) WWW.
An interconnected system of all the public websites and pages that users can access on their
local computers and other devices through the internet.
4
ACTIVITY
Compare & contrast internet and www.
5
Basis of Comparison Internet WWW
A
Definition The internet is a global network of The World Wide Web or WWW refers to
interconnected computer networks online content that is formatted in
that use the TCP/IP protocol to HTML and accessible via the
connect devices worldwide. HTTP/HTTPS protocol.
Functionality The internet is a vast network that World Wide Web is a service provided
connects computer networks all by the internet.
over the world.
Type The internet is primarily hardware- In comparison to the Internet, WWW is
based. more software-oriented.
Protocol The Internet utilizes the The World Wide Web utilizes the Hyper
Transmission Control Text Transfer Protocol (HTTP).
Protocol/Internet Protocol
(TCP/IP).
Applications The internet has a wide range of The World Wide Web is utilized to
applications in entertainment, access resources all across the world.
education, research, navigation,
advertising, and banking.
6
E-MAIL
Electronic mail.
The exchange of computer-stored messages from one user to one or more recipients via the
internet.
Emails are a fast, inexpensive and accessible way to communicate for business or personal
use.
7
ACTIVITY
Sign up for gmail.
Send an email to [email protected]
8
FTP & P2P FILE DISTRIBUTION
The File Transfer Protocol (FTP) is a standard communication protocol used for the
transfer of computer files from a server to a client on a computer network.
9
P2P (Peer-to-Peer) is a file-sharing technology, that allows users to access mainly the
multimedia files like videos, music, e-books, games, etc. The technology enables computers
using the same or compatible P2P programs to form a network and share digital files
directly with other computers on the network.
10
STREAMING AUDIO AND
VIDEO BROADCASTING
Transmission of video or audio content over the internet to a user's local device, and how it
works.
Video or audio content sent in compressed form over the internet and played immediately over
a user's device, rather than being saved to the device hard drive or solid-state drive.
11
PRESENTATION TOOLS
Programs and software individuals or organizations can use to display their information in a
slideshow format.
Google slides
MS Power point
Canva
Visme
Powtoon
SlideCamp
12
COLLABORATION
BRAINSTORMING TOOLS
The process of conducting a brainstorming session digitally using sticky notes to share ideas
on an online whiteboard.
Online brainstorming allows remote teams to connect, collaborate and ideate as easily as ever.
13
BLOGS, BLOGGING AND
MICROBLOGGING
A blog is a informational website or page that is a part of a larger website published on the
WWW.
Features articles written in a conversational style with accompanying pictures or videos.
(Posts)
Posts are typically displayed in reverse chronological order so that the most recent post
appears first, at the top of the web page.
14
WIKIS
A website, database or online community that is managed by its users.
Accordingly, any user is able to add, edit or remove content. Wikis usually have different
pages dedicated to different topics or themes.
15
SOCIAL NETWORKING
Uses internet-based social media platforms to connect with friends, family, or peers.
Some of the most popular social networking sites include
Facebook
Instagram
TikTok
WhatsApp
Twitter.
16
VIRTUAL WORLD
A virtual world is a computer-simulated representation of a world with specific spatial and
physical characteristics, and users of virtual worlds interact with each other via representations
of themselves called “avatars.”
17
CLOUD COMPUTING
Cloud computing is the delivery of computing resources, such as IT infrastructure or data
center over the internet.
This model allows businesses to rent storage space or access software programs from a cloud
service provider (Google Cloud, Microsoft Azure, and Amazon Web Services (AWS)), instead
of building and maintaining their own IT infrastructure or data center.
There are three main models for cloud computing.
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
18
IAAS
Contains the basic building blocks for cloud IT and typically provide access to networking
features, computers (virtual or on dedicated hardware), and data storage space.
Infrastructure as a Service provides you with the highest level of flexibility and management
control over your IT resources and is most similar to existing IT resources that many IT
departments and developers are familiar with today.
19
PAAS
Remove the need for organizations to manage the underlying infrastructure (usually hardware
and operating systems) and allow you to focus on the deployment and management of your
applications.
This helps you be more efficient as you don’t need to worry about resource procurement,
capacity planning, software maintenance, patching, or any of the other undifferentiated heavy
lifting involved in running your application.
20
SAAS
Provides you with a completed product that is run and managed by the service provider.
In most cases, people referring to Software as a Service are referring to end-user applications.
With a SaaS offering you do not have to think about how the service is maintained or how the
underlying infrastructure is managed; you only need to think about how you will use that
particular piece of software.
A common example of a SaaS application is web-based email where you can send and receive
email without having to manage feature additions to the email product or maintaining the
servers and operating systems that the email program is running on.
21
22
COMMON EXAMPLES FOR
IAAS, PAAS & SAAS
23
CYBER
SECURITY
24
MEANING OF THE WORD
“CYBER”
It is a combination form relating to information technology, the Internet, and virtual reality.
25
CYBER SECURITY
The term cyber security is used to refer to the security offered through on-line services to
protect the online information.
With an increasing amount of people getting connected to Internet, the security threats that
cause massive harm are increasing also.
26
NEED OF CYBER SECURITY
Cyber security is necessary since it helps in securing data from threats such as data theft or
misuse, also safeguards your system from viruses.
27
PHYSICAL SECURITY
The protection of personnel, hardware, software, networks and data from physical actions and
events that could cause serious loss or damage to an enterprise, agency or institution.
This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and
terrorism.
Solutions: CCTV cameras, motion sensors, intruder alarms
28
GENERAL SECURITY
CONCEPTS
CIA
Confidentiality
Integrity
Availability
Additional Concepts
Identification
Authentication
Authorization
Accountability
Privacy
Non-repudiation
29
CYBERCRIME
Cybercrime is criminal activity that either targets or uses a computer, a computer network or a
networked device. Most cybercrime is committed by cybercriminals or hackers who want to
make money.
30
MAJOR CYBERCRIMES
Virus & worms
Hacker
Malware
Ransomware
Trojan horses
Password cracking
Phishing scams
Website spoofing
31
VIRUSES & WORMS
A virus is a program that is loaded onto your computer without your knowledge and runs
against your wishes.
Solutions : Install a security suite that protects the computer against threats such as viruses and
worms.
32
HACKERS
In common a hacker is a person who breaks into computers, usually by gaining access to
administrative controls.
Types of Hackers,
White hat hacker
Grey hat hacker
Black hat hacker
33
White hat hacker
A white hat hacker -- or ethical hacker -- is an individual who uses hacking skills to identify
security vulnerabilities in hardware, software or networks. However, unlike black hat hackers --
or malicious hackers -- white hat hackers respect the rule of law as it applies to hacking.
34
Black hat hackers
Black hat hackers are criminals who break into computer networks with malicious intent. They
may also release malware that destroys files, holds computers hostage, or steals passwords,
credit card numbers, and other personal information.
35
Gray hat hackers
Gray hat hackers enact a blend of both black hat and white hat activities. Gray hat hackers often
look for vulnerabilities in a system without the owner's permission or knowledge. If issues are
found, they report them to the owner, sometimes requesting a small fee to fix the problem.
36
MALWARE
Malware – Malicious software
Malware is any software that infects and damages a computer system without the owner’s
knowledge or permission.
Ex: Ransomware, spyware, worms, adware, trojans, botnets
Solution: Download an anti-malware program that also prevent infections, Activate network
threat protection: Firewall, antivirus.
37
ACTIVITY
Name 2 anti-virus softwares.
38
RANSOMWARE
A form of malware that locks the user out of their files or their device, then demands a
payment to restore access.
39
TROJAN HORSES
Trojan horses are email viruses that can
duplicate themselves, steal information,
or harm the computer system.
These viruses are the most serious threats
to computers.
Solution : Security suites, such as Avast
Internet Security, will prevent the user from
downloading Trojan Horses.
40
PASSWORD CRACKING
Password attacks are attacks by hackers that are able to determine passwords or find
passwords to different protected electronic areas and social network sites.
Ex: Phishing, Man-in-the middle attack, brute force attack, dictionary attack,
credential stuffing, keyloggers
Solution: Use always strong password, Never use same password for two different sites.
41
WEBSITE SPOOFING
Website spoofing is the creation of a replica of a trusted site with the intention of misleading
visitors to a phishing site.
Solutions: Packet filtering can prevent an IP spoofing attack since it is able to filter out and
block packets that contain conflicting source address information, Using cryptographic
network protocols such as HTTP Secure (HTTPS) and Secure Shell (SSH) can add another
layer of protection to your environment.
42
PHISHING SCAMS
Criminals use scam emails, text messages or phone calls to
trick their victims.
The aim is to make the victim visit a website, which may
download a virus onto their computer, or steal bank
details or other personal information.
43
GROUP ACTIVITY
Describe the following, at least one point for each.
1. Virus & worms
2. Hacker
3. Malware
4. Ransomware
5. Trojan horses
6. Password cracking
7. Phishing scams
8. Website spoofing
44
CYBERSTALKING
Cyberstalking is the use of the Internet or other electronic means
to stalk or harass an individual, group, or organization. It may include false
accusations and It may also include monitoring, identity theft, threats, vandalism
or blackmail.
45
SOLUTIONS
Know what a phishing scam looks like
Don’t click on that link
Don’t give your information to an unsecured site
Rotate passwords regularly
46
SECURE WEB USE & SECURE
SOCIAL NETWORKING
47
HOW TO BROWSE THE WEB
SECURELY
Keep your browser and plugins updated
Only visit HTTPS sites
Think before downloading any apps or files. Always go through official sites
Clear Cookies and the Web Browser Cache
Install Antivirus and Firewall Protection
Impose Strong Passwords with a Password Manager
Use Two-Factor Authentication (2FA)
Use a VPN
Use a Ad Blocker
48
SOCIAL MEDIA SECURITY
Refers to strategies businesses and individuals can use to protect their social accounts from
threats like hacking, phishing, and malware.
Most common social media security risks
Phishing attacks and scams
Imposter accounts
Malware attacks and hacks
Vulnerable third-party apps
Password theft
Privacy settings and data security
Unsecured mobile devices
49
SAFETY TIPS FOR SOCIAL
NETWORKING
Manage your privacy settings
Remember: once posted is always posted
Build a positive online reputation
Keep personal information personal
Protect your computer
Know what action to take
Use strong and unique passwords
Be cautious on social networking sites
Use 2FA(Two Factor Authentication)
50
ACTIVITY
Name 5 safety tips for social network use.
51
THANK
YOU!
52