Lesson 8 - Cyber security and Data Protection.pptx

ElleLegaspi1 3 views 95 slides Mar 02, 2025
Slide 1
Slide 1 of 95
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95

About This Presentation

cyber security


Slide Content

Cybersecurity and Data Protection Maylene V. Samin , MIT

Let’s Play a Game!

Instagram

Pinterest

Skype

Yellow

Meta

Red

GMAIL

Right

Android

Microsoft Edge

OUR REALITY TODAY

Source: DICT National ICT Household Survey

Social Engineering Psychological manipulation of people into performing actions or divulging confidential information.

RA no. 10175: Anti Cybercrime Law Cybercrimes are 1 degree higher than other crimes.

 The Cybercrime offenses wherein people who commit the acts stated will be punished. These offenses are the offense regarding confidentiality , illegal access, illegal interception, data interference, system interference, misuse of devices, cyber-squatting, using an existing or similar trademark or name of a person, forgery, fraud, identity theft, cybersex, child pornography, unsolicited commercial communications and libel.

Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal information.

Types of Hacker White Hat Hacker White hat hackers are types of hackers who’re professionals with expertise in cybersecurity . They are authorized or certified to hack the system This hacking is done to test the level of cybersecurity in their organization. By doing so, they identify the weak points and fix them to avoid attacks from external sources. White hat hackers are also known as ethical hackers .

Types of Hacker Black Hat Hackers Black hat hackers are also knowledgeable computer experts but with the wrong intention. They attack other systems to get access to systems where they do not have authorized entry . To hack into organizations’ networks and steal bank data, funds or sensitive information. Normally, they use the stolen resources to profit themselves , sell them on the black market or harass their target company.

Types of Hacker Gray Hat Hacker The Gray hat hacker falls in between the black hat hackers and white hat hackers. They are not certified, hackers. The difference is, they don’t want to rob people nor want to help people in particular. Rather, they enjoy experimenting with systems to find loopholes, crack defenses, and generally find a fun hacking experience.

Video

What is a keylogger ? A keylogger is an insidious form of spyware. You enter sensitive data onto your keyboard, believing nobody is watching. In fact, keylogging software is hard at work logging everything that you type.

Two types of keyloggers 1. Some keyloggers are hardware devices embedded within your internal PC hardware. They also come as a form of a plug placed between the CPU box and keyboard cable in an inconspicuous manner. In either case, someone will have to physically plant the hardware into your PC or its peripherals. This will require a  degree of secrecy if it needs to be achieved clandestinely.

Two types of keyloggers 2. The second type of keyloggers are software that can be easily installed on victims’ devices. While this software is a type of malware, it is “good” malware, wherein it doesn’t harm its host. Its sole job is to snoop into the keystrokes and not impact the computer. You merrily go about your business, while undetectable keyloggers start stealing personal or sensitive data, without you ever knowing.

VIDEO

1

With HTTPS,  data is encrypted in transit in both directions :

Ctrl+Shift+n

. The main purpose of a VPN is  to hide your online activity . VPNs are often used to guard against hackers and snoops on public networks, but they're also useful for hiding your IP address, browsing activity, and personal data on any Wi-Fi network — even at home

Video