SlideShare a Scribd company logo
SOCIAL RESPONSIBILITY
OF IT PROFESSIONAL
SECURIT
Y
HACKIN
G
MARK JOHN P. LADO
FRANKLIN C. LASDOCE
PREPARED BY:
Technology is science or knowledge put into practical use to solve
problems or invent useful tools. A computer is one of the examples of
a technology it is a programmable electronic device that accepts raw
data as input and processes it with a set of instructions (a program) to
produce the result as an output.
Technology is robust, where hacking is now common, there are two
different types of hacking, the ethical hacking and unethical hacking.
INTRODUCTION
11-4-21 2
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
The Same Tools Are Used By Both Hackers And Ethical Hackers. The
Only Difference Is That Hackers Use Tools To Steal Or Destroy
Information Whereas Ethical Hackers Use Same Tools To Safeguard
Systems From “Hackers With Malicious Intent”. Ethical Hacking Is
Legal And Hacking Is Done With Permission From The Client.
Computer Security Is The Protection Of Computer Systems And
Networks From Information Disclosure, Theft Of Or Damage To Their
Hardware, Software, Or Electronic Data, As Well As From The
Disruption Or Misdirection Of The Services They Provide.
INTRODUCTION
3
11-4-21
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
• Tell the definition of Computer Hacking
• Recognize the Ethical hacking and Unethical
hacking
• Illustrate the penetration tester do
• Summarize the top Skills Required for
Cybersecurity Jobs
• Define Computer Security
• Recite the different types of Computer Security
OBJECTIVES
4
At the end of this topic, you will be able to;
11-4-21
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
• Describe the importance of Computer Security
• Summarize the objectives for computer security
in any organization
• Discover in securing your Computer from
Unauthorized Access
• Relate the 15 Best practices for Computer
Security and Cyber Security
• Recognize the Social Engineering and Cyber
Attacks
OBJECTIVES
5
At the end of this topic, you will be able to;
11-4-21
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
COMPUTER HACKING
The act of compromising digital devices and
networks through unauthorized access to an
account or computer system. Hacking is not always
a malicious act, but it is most commonly associated
with illegal activity and data theft by cyber criminals.
6
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
ETHICAL HACKING
Also known as White Hat, or Penetration Tester.
COMPUTE
R
HACKING
7
UNETHICAL HACKING
Also know as Black Hat.
11-4-21
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
A white hat is an ethical computer
hacker, or a computer security expert,
who specializes in penetration testing
and other testing methodologies that
ensure the security of an organization's
information systems. Ethical hacking is
a term meant to imply a broader
category than just penetration testing.
ETHICAL HACKING
1/7/20XX 8
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
As a penetration tester, you will perform
authorized tests on computer systems
in order to expose weaknesses in their
security that could be exploited by
criminals. You can choose to specialise
in manipulating a particular type of
system, such as: networks and
infrastructures.
WHAT DOES A
PENETRATION TESTER DO?
1/7/20XX 9
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
COMPUTE
R
HACKING
10
UNETHICAL HACKING
Also know as Black Hat.
11-4-21
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 11
WHAT DOES A BLACK
HAT HACKER DO?
A black hat hacker is a hacker who
violates computer security for their
own personal profit or out of malice.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 12
UNETHICAL HACKING
Black Hat hackers are criminals who break into
computer networks with malicious intent. They may
also release malware that destroys files, holds
computers hostage, or steals passwords, credit
card numbers, and other personal information.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
One of the most famous black hat hackers is Kevin Mitnick, who, at
one point, was the most wanted cybercriminal in the world. As a black
hat hacker, he hacked into over 40 major corporations, including IBM
and Motorola, and even the US National Defense warning system.
Source:
Black hat, white hat & gray hat hackers | Kasperskyhttps://www.kaspersky.com ›
HACKING
11-4-21 13
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
SOURCE: WIKIPEDIA/KEVIN_MITNIC
COMPUTER SECURITY
Computer security,
cybersecurity, or information
technology security is the
protection of computer systems
and networks from information
disclosure, theft of or damage to
their hardware, software, or
electronic data, as well as from
the disruption or misdirection of
the services they provide.
11-4-21 15
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Also called cybersecurity, the protection of
computer systems and information from harm,
theft, and unauthorized use. Computer
hardware is typically protected by the same
means used to protect other valuable or
sensitive equipment—namely, serial numbers,
doors and locks, and alarms.
11-4-21 16
COMPUTER SECURITY
1011001010100101010111010100101
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
PROBLEM-
SOLVING SKILLS
KNOWLEDGE OF
SECURITY ACROSS
VARIOUS
PLATFORMS
ATTENTIO
N TO
DETAIL
TECHNICA
L
APTITUDE
THE TOP SKILLS REQUIRED FOR CYBERSECURITY JOBS
11-4-21 17
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
As a cybersecurity professional, problem-
solving will play a major role in your day-
to-day work. Those in the field need to
find creative ways to take on and address
complex information security challenges
across a variety of existing and emerging
technologies and digital environments.
11-4-21 18
PROBLEM-SOLVING SKILLS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
As the name implies, cybersecurity is a
technology-focused field: you will be likely be
tasked with responsibilities such as
troubleshooting, maintaining, and updating
information security systems; implementing
continuous network monitoring; and providing
real-time security solutions. Being technologically
savvy is essential in order to perform the daily
activities of a cybersecurity professional.
Technical aptitude helps assess a candidate's:
Ability to reason with logic
11-4-21 19
TECHNICAL APTITUDE
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Cybersecurity isn't just limited to
computers: you'll need to be
comfortable working on a variety of
operating systems, computer
systems, mobile devices, cloud
networks, and wireless networks -
and keep up to date on advances in
the field for all of them.
11-4-21 20
KNOWLEDGE OF SECURITY ACROSS VARIOUS
PLATFORMS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Being able to defend an organization
against cyber breaches requires you to be
highly vigilant and detail-oriented, in order
to effectively detect vulnerabilities and
risks. You'll like be responsible for
continuous network monitoring and will
need to be able to quickly identify
concerns and come up with real-time
security solutions to address them.
11-4-21 21
ATTENTION TO DETAIL
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
• Physical Security
• Network Security
• Executable Security
11-4-21 22
DIFFERENT TYPES OF COMPUTER SECURITY
THERE ARE THREE DIFFERENT TYPES OF COMPUTER SECURITY. THEY ARE AS
FOLLOWS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
This type of computer security is one of
the simplest and easiest to interpret.
Anyone who has access to the computer
can access it.
Always we need to make sure not to share
our passwords in-order to safeguard our
system from data thefts.
11-4-21 23
DIFFERENT TYPES OF COMPUTER SECURITY
PHYSICAL SECURITY
Our computers should not be left
unattended, as others can access
all our files.
Physical security is one of the
basic securities that one must
consider.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Firewall is one of the most
important computer security.
11-4-21 24
DIFFERENT TYPES OF COMPUTER SECURITY
NETWORK SECURITY
This firewall helps the network
security by stopping any of the
unauthorized networks that
would attempt to access your
computer.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Anti-virus security is known as
executable security.
This type of security is quite complex
as it requires a team to code the anti-
virus. Anti-virus is a must, to block the
virus from attacking the system.
11-4-21 25
DIFFERENT TYPES OF COMPUTER SECURITY
EXECUTABLE SECURITY
These anti-virus securities are called
executable security as they are
executable files that need to be run
on the computer, to be installed. With
this, our computers would be more
reliable.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
IMPORTANCE OF COMPUTER SECURITY
Computer security is one of the most important aspects,
as it keeps all our data safe.
Prevention helps to stop hackers (unauthorized users)
from accessing our computers.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
IMPORTANCE OF COMPUTER SECURITY
Today most of the transactions that we perform from shopping to
banking are by accessing the websites (through a network).
The main intention of a hacker is to attack the system and get all
the data stored in the system.
Once the hacker can access different computers, they can cause
damage by formatting the hard drive.
Also, it would be easy for the hacker to attack other computers
through your computer as they can hide their actual information.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
28
SOME OF THE OBJECTIVES FOR COMPUTER SECURITY
IN ANY ORGANIZATION ARE
• Confidentiality – This means that information should be
accessed only by authorized users.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
29
SOME OF THE OBJECTIVES FOR COMPUTER SECURITY
IN ANY ORGANIZATION ARE
• Integrity – Here information should be added, modified, or
deleted only by an authorized user which means we need to
protect information being modified.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
30
SOME OF THE OBJECTIVES FOR COMPUTER SECURITY
IN ANY ORGANIZATION ARE
• Availability – This means that the information should be
available only to authorized people on demand.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
31
HOW TO SECURE YOUR COMPUTER FROM
UNAUTHORIZED ACCESS
• Secure passwords – Always we should keep in mind to
create passwords that have at least 15 characters which
include capital letters, special characters, and numbers.
• Anti-virus – Make sure to install and update the anti-virus
regularly to prevent malware. Examples are Norton and
McAfee.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
32
HOW TO SECURE YOUR COMPUTER FROM
UNAUTHORIZED ACCESS
• Two-way authentication – Here there would be two layers of
authentication making it difficult for the hackers to get access
to your accounts.
• Firewalls – Firewalls do not allow unauthorized users from
accessing the network connected to the internet.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
33
HOW TO SECURE YOUR COMPUTER FROM
UNAUTHORIZED ACCESS
• Anti-phishing tactics – Attackers normally try to send an
email with a malicious link or ask us to provide our data or
send us any attached files. By doing this (by clicking on the
malicious link, sending our personal data, or clicking on any
attachments) we fall into their trap and they would succeed to
hack our computers.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
34
HOW TO SECURE YOUR COMPUTER FROM
UNAUTHORIZED ACCESS
• Encryption – This is a method of converting plain text to
secret text. Many applications follow this – Banking
transactions, Computer passwords, etc.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
People need to be smart and
need to pay attention to the
security of their personal
computers. Few points that we
need to keep in mind.
35
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
1. Do not click on anything you
are not sure to be safe.
2. Do not open any
attachments that show up in
emails from an unknown
person. 36
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
3. Do not hand over your
personal identification or
debit card details, credit
card details to strangers.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
4. Do not use unsecured public
Wi-Fi networks as we don’t
know if someone is looking at
our data
5. Always keep data back up
safe elsewhere. 37
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
6. Make sure to keep
changing the passwords
often and follow the
standards while choosing a
password.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
7. Install a good Anti-virus on
your computer and keep it up
to date.
8. Always enable the firewall
38
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
9. Install the security
software that helps to
recognize the website that
you be aware of.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
10. Do not use USBs or hard
disks in other machines that
you don’t trust.
11. Make sure all the software
is up to date.
39
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
12. Lock your computers
when you are not around.
13. Do not run the programs
that are unknown to you.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
14. Keep an eye on installed
software and remove
unnecessary software.
40
15 BEST PRACTICES FOR COMPUTER SECURITY
AND CYBER SECURITY
1010010101001010100000101010
15. Use a pop-up blocker.
11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
When the network is secure,
hackers fail to hack it and
they in-turn target the users
of that network. This is called
Social Engineering.
11-4-21 41
SOCIAL ENGINEERING AND CYBER ATTACKS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
In recent days these types of
hackers have increased
subsequently.
11-4-21 42
SOCIAL ENGINEERING AND CYBER ATTACKS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
Following are different
techniques used in social
engineering attacks –
11-4-21 43
SOCIAL ENGINEERING AND CYBER ATTACKS
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 44
SOCIAL ENGINEERING AND CYBER
ATTACKS
VISHING
PHISHING SMISHING WHALING
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 45
SOCIAL ENGINEERING AND CYBER ATTACKS
• Phishing – This is one of the oldest methods used. In this
method, the Attacker sends an email expecting to get the
information from the user back.
• Vishing – Here attackers attack in the form of voice phishing.
They would contact you over the phone and pretend to be
from a bank or any other company.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 46
SOCIAL ENGINEERING AND CYBER ATTACKS
• Smishing – Here attackers use SMS phishing and the
person will receive a text message which looks like it is from
the bank, asking for all the personal details.
• Whaling – In this form of phishing, the attackers attack the
CEO or high-level person from the organization to get all the
financial information.
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
• Computer Hacking and Computer Security
• Ethical hacking and Unethical hacking
• What penetration tester do
• Top Skills Required for Cybersecurity Jobs
11-4-21 47
WRAP-UP
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
• Different types of Computer Security
• The importance of Computer Security
• Objectives for computer security in any
organization
• Securing your Computer from Unauthorized
Access
• Best practices for Computer Security and Cyber
Security
• Social Engineering and Cyber Attacks
11-4-21 48
WRAP-UP
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL
11-4-21 49
Online References
https://www.classmate4u.com/computer-security-and-cyber-security/
THANK YOU!
• Mark John P. Lado
• Franklin C. Lasdoce
PREPARED BY:
MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT
PROFESSIONAL

More Related Content

What's hot (20)

PDF
Cyber Security - awareness, vulnerabilities and solutions
inLabFIB
 
PDF
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
PPT
The Changing Security Landscape
Arrow ECS UK
 
PDF
Outlook Briefing 2016: Cyber Security
Mastel Indonesia
 
PDF
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
 
PDF
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 
PPTX
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
PDF
Data Safety And Security
Constantine Karbaliotis
 
PPTX
2016 - Cyber Security for the Public Sector
Scott Geye
 
PDF
Chapter 2 konsep dasar keamanan
newbie2019
 
PPT
The Future of Cyber Security
Stephen Lahanas
 
PPT
HIPAA, Privacy, Security, and Good Business
Stephen Cobb
 
PPTX
2015: The year-ahead-in-cyber-security
Stephen Cobb
 
PPT
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
PDF
The role of big data, artificial intelligence and machine learning in cyber i...
Aladdin Dandis
 
PPTX
Securing the Cloud
GGV Capital
 
PPTX
Topic11
Anne Starr
 
PDF
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Knowledge Group
 
PDF
The IBM X-Force 2016 Cyber Security Intelligence Index
Kanishka Ramyar
 
PDF
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
XEventsHospitality
 
Cyber Security - awareness, vulnerabilities and solutions
inLabFIB
 
Whitepaper Avira about Artificial Intelligence to cyber security
GopiRajan4
 
The Changing Security Landscape
Arrow ECS UK
 
Outlook Briefing 2016: Cyber Security
Mastel Indonesia
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
IBM Security
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Knowledge Group
 
Data Safety And Security
Constantine Karbaliotis
 
2016 - Cyber Security for the Public Sector
Scott Geye
 
Chapter 2 konsep dasar keamanan
newbie2019
 
The Future of Cyber Security
Stephen Lahanas
 
HIPAA, Privacy, Security, and Good Business
Stephen Cobb
 
2015: The year-ahead-in-cyber-security
Stephen Cobb
 
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
The role of big data, artificial intelligence and machine learning in cyber i...
Aladdin Dandis
 
Securing the Cloud
GGV Capital
 
Topic11
Anne Starr
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Knowledge Group
 
The IBM X-Force 2016 Cyber Security Intelligence Index
Kanishka Ramyar
 
Global Cyber Security Outlook - Deloitte (Hotel_Digital_Security_Seminar_Sept...
XEventsHospitality
 

Similar to Computer hacking and security - Social Responsibility of IT Professional by Mark John Lado and Franklin Lasdoce (20)

PPTX
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
PPTX
ID-20305090 Fahim Montasir.pptx
FahimMuntasir21
 
PPTX
Corporate ethics
Melvin DCruz
 
PPTX
corporateethics11111111111111111111.pptx
hali086
 
PPT
Ethical hacking a licence to hack
Dharmesh Makwana
 
PPTX
Computer Ethics and History Of computer .pptx
harshjyotsingh34
 
PPT
obrien13e_chap011.ppt
Pradeep513562
 
PPT
security and ethical challenges
Vineet Dubey
 
PPTX
Cyber ethics.pptx
GagandeepSinghJass
 
PDF
Ethical hacking
Mohammad Affan
 
PPTX
CYBER SECURITY AND ETHICAL HACKING KOCHI
nasrisajla
 
PPTX
security and ethical challenges in information systems
hilal12
 
PPTX
Computer ethics
RitikaSharma238
 
PPTX
Ethical hacking & cyber security
ankit gandharkar
 
PPTX
Introduction of ethical hacking.........
AalyanAbid
 
PPT
Cyber security & Importance of Cyber Security
Mohammed Adam
 
DOCX
Final report ethical hacking
samprada123
 
DOCX
Security and ethical challenges of it
Praveen Choursiya
 
PPTX
Computer security and safety ethic and privacy Lecture 10.pptx
abbasmursaleen786
 
PPTX
Lecture 10.pptx For dpt computer security
adilkhan55485453
 
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
ID-20305090 Fahim Montasir.pptx
FahimMuntasir21
 
Corporate ethics
Melvin DCruz
 
corporateethics11111111111111111111.pptx
hali086
 
Ethical hacking a licence to hack
Dharmesh Makwana
 
Computer Ethics and History Of computer .pptx
harshjyotsingh34
 
obrien13e_chap011.ppt
Pradeep513562
 
security and ethical challenges
Vineet Dubey
 
Cyber ethics.pptx
GagandeepSinghJass
 
Ethical hacking
Mohammad Affan
 
CYBER SECURITY AND ETHICAL HACKING KOCHI
nasrisajla
 
security and ethical challenges in information systems
hilal12
 
Computer ethics
RitikaSharma238
 
Ethical hacking & cyber security
ankit gandharkar
 
Introduction of ethical hacking.........
AalyanAbid
 
Cyber security & Importance of Cyber Security
Mohammed Adam
 
Final report ethical hacking
samprada123
 
Security and ethical challenges of it
Praveen Choursiya
 
Computer security and safety ethic and privacy Lecture 10.pptx
abbasmursaleen786
 
Lecture 10.pptx For dpt computer security
adilkhan55485453
 

More from Mark John Lado, MIT (20)

PDF
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Mark John Lado, MIT
 
PDF
Optimizing Embedded System Device Communication with Network Topology Design
Mark John Lado, MIT
 
PDF
Embedded Systems IO Peripherals Wireless Communication.pdf
Mark John Lado, MIT
 
PDF
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Mark John Lado, MIT
 
PDF
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
Mark John Lado, MIT
 
PDF
4 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
PDF
3 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
PDF
1 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
PDF
2 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
PPSX
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
Mark John Lado, MIT
 
PPSX
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
Mark John Lado, MIT
 
PPSX
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
Mark John Lado, MIT
 
PPSX
Dart Programming Language by Mark John Lado
Mark John Lado, MIT
 
PPTX
What is CRUD in TPS?
Mark John Lado, MIT
 
PDF
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
Mark John Lado, MIT
 
PPTX
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
PPTX
IT Security and Management - Security Policies
Mark John Lado, MIT
 
PPTX
Systems Administration - MARK JOHN LADO
Mark John Lado, MIT
 
PPTX
IT Security and Management - Prelim Lessons by Mark John Lado
Mark John Lado, MIT
 
PPTX
Introduction to Networks and Programming Language
Mark John Lado, MIT
 
Exploring Parts of Speech, Creating Strong Objectives, and Choosing the Right...
Mark John Lado, MIT
 
Optimizing Embedded System Device Communication with Network Topology Design
Mark John Lado, MIT
 
Embedded Systems IO Peripherals Wireless Communication.pdf
Mark John Lado, MIT
 
Implementing the 6S Lean Methodology for Streamlined Computer System Maintena...
Mark John Lado, MIT
 
ISO IEC 25010 2011 Systems and Software Quality Requirements and Evaluation S...
Mark John Lado, MIT
 
4 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
3 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
1 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
2 Module - Operating Systems Configuration and Use by Mark John Lado
Mark John Lado, MIT
 
PART 1 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
Mark John Lado, MIT
 
PART 2 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
Mark John Lado, MIT
 
PART 3 CT-318-Microprocessor-Systems Lesson 3 - LED Display by Mark John Lado...
Mark John Lado, MIT
 
Dart Programming Language by Mark John Lado
Mark John Lado, MIT
 
What is CRUD in TPS?
Mark John Lado, MIT
 
A WIRELESS DIGITAL PUBLIC ADDRESS WITH VOICE ALARM AND TEXT-TO-SPEECH FEATURE...
Mark John Lado, MIT
 
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
IT Security and Management - Security Policies
Mark John Lado, MIT
 
Systems Administration - MARK JOHN LADO
Mark John Lado, MIT
 
IT Security and Management - Prelim Lessons by Mark John Lado
Mark John Lado, MIT
 
Introduction to Networks and Programming Language
Mark John Lado, MIT
 

Recently uploaded (20)

PPTX
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
PDF
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
PPTX
Constitutional Design Civics Class 9.pptx
bikesh692
 
PDF
EXCRETION-STRUCTURE OF NEPHRON,URINE FORMATION
raviralanaresh2
 
PPT
DRUGS USED IN THERAPY OF SHOCK, Shock Therapy, Treatment or management of shock
Rajshri Ghogare
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
PDF
Exploring-the-Investigative-World-of-Science.pdf/8th class curiosity/1st chap...
Sandeep Swamy
 
PPTX
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PPTX
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
Various Psychological tests: challenges and contemporary trends in psychologi...
santoshmohalik1
 
PDF
A guide to responding to Section C essay tasks for the VCE English Language E...
jpinnuck
 
PPTX
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
PPTX
IDEAS AND EARLY STATES Social science pptx
NIRANJANASSURESH
 
PDF
Stepwise procedure (Manually Submitted & Un Attended) Medical Devices Cases
MUHAMMAD SOHAIL
 
PPTX
THE JEHOVAH’S WITNESSES’ ENCRYPTED SATANIC CULT
Claude LaCombe
 
PPTX
Translation_ Definition, Scope & Historical Development.pptx
DhatriParmar
 
PPTX
YSPH VMOC Special Report - Measles Outbreak Southwest US 7-20-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 
Applied-Statistics-1.pptx hardiba zalaaa
hardizala899
 
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
Constitutional Design Civics Class 9.pptx
bikesh692
 
EXCRETION-STRUCTURE OF NEPHRON,URINE FORMATION
raviralanaresh2
 
DRUGS USED IN THERAPY OF SHOCK, Shock Therapy, Treatment or management of shock
Rajshri Ghogare
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
Exploring-the-Investigative-World-of-Science.pdf/8th class curiosity/1st chap...
Sandeep Swamy
 
Applications of matrices In Real Life_20250724_091307_0000.pptx
gehlotkrish03
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
CONCEPT OF CHILD CARE. pptx
AneetaSharma15
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
Various Psychological tests: challenges and contemporary trends in psychologi...
santoshmohalik1
 
A guide to responding to Section C essay tasks for the VCE English Language E...
jpinnuck
 
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
IDEAS AND EARLY STATES Social science pptx
NIRANJANASSURESH
 
Stepwise procedure (Manually Submitted & Un Attended) Medical Devices Cases
MUHAMMAD SOHAIL
 
THE JEHOVAH’S WITNESSES’ ENCRYPTED SATANIC CULT
Claude LaCombe
 
Translation_ Definition, Scope & Historical Development.pptx
DhatriParmar
 
YSPH VMOC Special Report - Measles Outbreak Southwest US 7-20-2025.pptx
Yale School of Public Health - The Virtual Medical Operations Center (VMOC)
 

Computer hacking and security - Social Responsibility of IT Professional by Mark John Lado and Franklin Lasdoce

  • 1. SOCIAL RESPONSIBILITY OF IT PROFESSIONAL SECURIT Y HACKIN G MARK JOHN P. LADO FRANKLIN C. LASDOCE PREPARED BY:
  • 2. Technology is science or knowledge put into practical use to solve problems or invent useful tools. A computer is one of the examples of a technology it is a programmable electronic device that accepts raw data as input and processes it with a set of instructions (a program) to produce the result as an output. Technology is robust, where hacking is now common, there are two different types of hacking, the ethical hacking and unethical hacking. INTRODUCTION 11-4-21 2 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 3. The Same Tools Are Used By Both Hackers And Ethical Hackers. The Only Difference Is That Hackers Use Tools To Steal Or Destroy Information Whereas Ethical Hackers Use Same Tools To Safeguard Systems From “Hackers With Malicious Intent”. Ethical Hacking Is Legal And Hacking Is Done With Permission From The Client. Computer Security Is The Protection Of Computer Systems And Networks From Information Disclosure, Theft Of Or Damage To Their Hardware, Software, Or Electronic Data, As Well As From The Disruption Or Misdirection Of The Services They Provide. INTRODUCTION 3 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 4. • Tell the definition of Computer Hacking • Recognize the Ethical hacking and Unethical hacking • Illustrate the penetration tester do • Summarize the top Skills Required for Cybersecurity Jobs • Define Computer Security • Recite the different types of Computer Security OBJECTIVES 4 At the end of this topic, you will be able to; 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 5. • Describe the importance of Computer Security • Summarize the objectives for computer security in any organization • Discover in securing your Computer from Unauthorized Access • Relate the 15 Best practices for Computer Security and Cyber Security • Recognize the Social Engineering and Cyber Attacks OBJECTIVES 5 At the end of this topic, you will be able to; 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 6. COMPUTER HACKING The act of compromising digital devices and networks through unauthorized access to an account or computer system. Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals. 6 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 7. ETHICAL HACKING Also known as White Hat, or Penetration Tester. COMPUTE R HACKING 7 UNETHICAL HACKING Also know as Black Hat. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 8. A white hat is an ethical computer hacker, or a computer security expert, who specializes in penetration testing and other testing methodologies that ensure the security of an organization's information systems. Ethical hacking is a term meant to imply a broader category than just penetration testing. ETHICAL HACKING 1/7/20XX 8 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 9. As a penetration tester, you will perform authorized tests on computer systems in order to expose weaknesses in their security that could be exploited by criminals. You can choose to specialise in manipulating a particular type of system, such as: networks and infrastructures. WHAT DOES A PENETRATION TESTER DO? 1/7/20XX 9 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 10. COMPUTE R HACKING 10 UNETHICAL HACKING Also know as Black Hat. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 11. 11-4-21 11 WHAT DOES A BLACK HAT HACKER DO? A black hat hacker is a hacker who violates computer security for their own personal profit or out of malice. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 12. 11-4-21 12 UNETHICAL HACKING Black Hat hackers are criminals who break into computer networks with malicious intent. They may also release malware that destroys files, holds computers hostage, or steals passwords, credit card numbers, and other personal information. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 13. One of the most famous black hat hackers is Kevin Mitnick, who, at one point, was the most wanted cybercriminal in the world. As a black hat hacker, he hacked into over 40 major corporations, including IBM and Motorola, and even the US National Defense warning system. Source: Black hat, white hat & gray hat hackers | Kasperskyhttps://www.kaspersky.com › HACKING 11-4-21 13 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 15. COMPUTER SECURITY Computer security, cybersecurity, or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. 11-4-21 15 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 16. Also called cybersecurity, the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms. 11-4-21 16 COMPUTER SECURITY 1011001010100101010111010100101 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 17. PROBLEM- SOLVING SKILLS KNOWLEDGE OF SECURITY ACROSS VARIOUS PLATFORMS ATTENTIO N TO DETAIL TECHNICA L APTITUDE THE TOP SKILLS REQUIRED FOR CYBERSECURITY JOBS 11-4-21 17 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 18. As a cybersecurity professional, problem- solving will play a major role in your day- to-day work. Those in the field need to find creative ways to take on and address complex information security challenges across a variety of existing and emerging technologies and digital environments. 11-4-21 18 PROBLEM-SOLVING SKILLS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 19. As the name implies, cybersecurity is a technology-focused field: you will be likely be tasked with responsibilities such as troubleshooting, maintaining, and updating information security systems; implementing continuous network monitoring; and providing real-time security solutions. Being technologically savvy is essential in order to perform the daily activities of a cybersecurity professional. Technical aptitude helps assess a candidate's: Ability to reason with logic 11-4-21 19 TECHNICAL APTITUDE MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 20. Cybersecurity isn't just limited to computers: you'll need to be comfortable working on a variety of operating systems, computer systems, mobile devices, cloud networks, and wireless networks - and keep up to date on advances in the field for all of them. 11-4-21 20 KNOWLEDGE OF SECURITY ACROSS VARIOUS PLATFORMS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 21. Being able to defend an organization against cyber breaches requires you to be highly vigilant and detail-oriented, in order to effectively detect vulnerabilities and risks. You'll like be responsible for continuous network monitoring and will need to be able to quickly identify concerns and come up with real-time security solutions to address them. 11-4-21 21 ATTENTION TO DETAIL MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 22. • Physical Security • Network Security • Executable Security 11-4-21 22 DIFFERENT TYPES OF COMPUTER SECURITY THERE ARE THREE DIFFERENT TYPES OF COMPUTER SECURITY. THEY ARE AS FOLLOWS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 23. This type of computer security is one of the simplest and easiest to interpret. Anyone who has access to the computer can access it. Always we need to make sure not to share our passwords in-order to safeguard our system from data thefts. 11-4-21 23 DIFFERENT TYPES OF COMPUTER SECURITY PHYSICAL SECURITY Our computers should not be left unattended, as others can access all our files. Physical security is one of the basic securities that one must consider. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 24. Firewall is one of the most important computer security. 11-4-21 24 DIFFERENT TYPES OF COMPUTER SECURITY NETWORK SECURITY This firewall helps the network security by stopping any of the unauthorized networks that would attempt to access your computer. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 25. Anti-virus security is known as executable security. This type of security is quite complex as it requires a team to code the anti- virus. Anti-virus is a must, to block the virus from attacking the system. 11-4-21 25 DIFFERENT TYPES OF COMPUTER SECURITY EXECUTABLE SECURITY These anti-virus securities are called executable security as they are executable files that need to be run on the computer, to be installed. With this, our computers would be more reliable. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 26. IMPORTANCE OF COMPUTER SECURITY Computer security is one of the most important aspects, as it keeps all our data safe. Prevention helps to stop hackers (unauthorized users) from accessing our computers. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 27. IMPORTANCE OF COMPUTER SECURITY Today most of the transactions that we perform from shopping to banking are by accessing the websites (through a network). The main intention of a hacker is to attack the system and get all the data stored in the system. Once the hacker can access different computers, they can cause damage by formatting the hard drive. Also, it would be easy for the hacker to attack other computers through your computer as they can hide their actual information. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 28. 28 SOME OF THE OBJECTIVES FOR COMPUTER SECURITY IN ANY ORGANIZATION ARE • Confidentiality – This means that information should be accessed only by authorized users. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 29. 29 SOME OF THE OBJECTIVES FOR COMPUTER SECURITY IN ANY ORGANIZATION ARE • Integrity – Here information should be added, modified, or deleted only by an authorized user which means we need to protect information being modified. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 30. 30 SOME OF THE OBJECTIVES FOR COMPUTER SECURITY IN ANY ORGANIZATION ARE • Availability – This means that the information should be available only to authorized people on demand. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 31. 31 HOW TO SECURE YOUR COMPUTER FROM UNAUTHORIZED ACCESS • Secure passwords – Always we should keep in mind to create passwords that have at least 15 characters which include capital letters, special characters, and numbers. • Anti-virus – Make sure to install and update the anti-virus regularly to prevent malware. Examples are Norton and McAfee. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 32. 32 HOW TO SECURE YOUR COMPUTER FROM UNAUTHORIZED ACCESS • Two-way authentication – Here there would be two layers of authentication making it difficult for the hackers to get access to your accounts. • Firewalls – Firewalls do not allow unauthorized users from accessing the network connected to the internet. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 33. 33 HOW TO SECURE YOUR COMPUTER FROM UNAUTHORIZED ACCESS • Anti-phishing tactics – Attackers normally try to send an email with a malicious link or ask us to provide our data or send us any attached files. By doing this (by clicking on the malicious link, sending our personal data, or clicking on any attachments) we fall into their trap and they would succeed to hack our computers. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 34. 34 HOW TO SECURE YOUR COMPUTER FROM UNAUTHORIZED ACCESS • Encryption – This is a method of converting plain text to secret text. Many applications follow this – Banking transactions, Computer passwords, etc. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 35. People need to be smart and need to pay attention to the security of their personal computers. Few points that we need to keep in mind. 35 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 36. 1. Do not click on anything you are not sure to be safe. 2. Do not open any attachments that show up in emails from an unknown person. 36 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 3. Do not hand over your personal identification or debit card details, credit card details to strangers. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 37. 4. Do not use unsecured public Wi-Fi networks as we don’t know if someone is looking at our data 5. Always keep data back up safe elsewhere. 37 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 6. Make sure to keep changing the passwords often and follow the standards while choosing a password. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 38. 7. Install a good Anti-virus on your computer and keep it up to date. 8. Always enable the firewall 38 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 9. Install the security software that helps to recognize the website that you be aware of. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 39. 10. Do not use USBs or hard disks in other machines that you don’t trust. 11. Make sure all the software is up to date. 39 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 12. Lock your computers when you are not around. 13. Do not run the programs that are unknown to you. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 40. 14. Keep an eye on installed software and remove unnecessary software. 40 15 BEST PRACTICES FOR COMPUTER SECURITY AND CYBER SECURITY 1010010101001010100000101010 15. Use a pop-up blocker. 11-4-21 MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 41. When the network is secure, hackers fail to hack it and they in-turn target the users of that network. This is called Social Engineering. 11-4-21 41 SOCIAL ENGINEERING AND CYBER ATTACKS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 42. In recent days these types of hackers have increased subsequently. 11-4-21 42 SOCIAL ENGINEERING AND CYBER ATTACKS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 43. Following are different techniques used in social engineering attacks – 11-4-21 43 SOCIAL ENGINEERING AND CYBER ATTACKS MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 44. 11-4-21 44 SOCIAL ENGINEERING AND CYBER ATTACKS VISHING PHISHING SMISHING WHALING MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 45. 11-4-21 45 SOCIAL ENGINEERING AND CYBER ATTACKS • Phishing – This is one of the oldest methods used. In this method, the Attacker sends an email expecting to get the information from the user back. • Vishing – Here attackers attack in the form of voice phishing. They would contact you over the phone and pretend to be from a bank or any other company. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 46. 11-4-21 46 SOCIAL ENGINEERING AND CYBER ATTACKS • Smishing – Here attackers use SMS phishing and the person will receive a text message which looks like it is from the bank, asking for all the personal details. • Whaling – In this form of phishing, the attackers attack the CEO or high-level person from the organization to get all the financial information. MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 47. • Computer Hacking and Computer Security • Ethical hacking and Unethical hacking • What penetration tester do • Top Skills Required for Cybersecurity Jobs 11-4-21 47 WRAP-UP MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 48. • Different types of Computer Security • The importance of Computer Security • Objectives for computer security in any organization • Securing your Computer from Unauthorized Access • Best practices for Computer Security and Cyber Security • Social Engineering and Cyber Attacks 11-4-21 48 WRAP-UP MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL
  • 49. 11-4-21 49 Online References https://www.classmate4u.com/computer-security-and-cyber-security/ THANK YOU! • Mark John P. Lado • Franklin C. Lasdoce PREPARED BY: MASTER IN INFORMATION TECHNOLOGY – NONESCOST - SOCIAL RESPONSIBILITY OF IT PROFESSIONAL