Lesson 8 - Cyber security and Data Protection.pptx
ElleLegaspi1
3 views
95 slides
Mar 02, 2025
Slide 1 of 95
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
About This Presentation
cyber security
Size: 29.51 MB
Language: en
Added: Mar 02, 2025
Slides: 95 pages
Slide Content
Cybersecurity and Data Protection Maylene V. Samin , MIT
Let’s Play a Game!
Instagram
Pinterest
Skype
Yellow
Meta
Red
GMAIL
Right
Android
Microsoft Edge
OUR REALITY TODAY
Source: DICT National ICT Household Survey
Social Engineering Psychological manipulation of people into performing actions or divulging confidential information.
RA no. 10175: Anti Cybercrime Law Cybercrimes are 1 degree higher than other crimes.
The Cybercrime offenses wherein people who commit the acts stated will be punished. These offenses are the offense regarding confidentiality , illegal access, illegal interception, data interference, system interference, misuse of devices, cyber-squatting, using an existing or similar trademark or name of a person, forgery, fraud, identity theft, cybersex, child pornography, unsolicited commercial communications and libel.
Republic Act No. 10173 Data Privacy Act of 2012 is an act protecting individual personal information.
Types of Hacker White Hat Hacker White hat hackers are types of hackers who’re professionals with expertise in cybersecurity . They are authorized or certified to hack the system This hacking is done to test the level of cybersecurity in their organization. By doing so, they identify the weak points and fix them to avoid attacks from external sources. White hat hackers are also known as ethical hackers .
Types of Hacker Black Hat Hackers Black hat hackers are also knowledgeable computer experts but with the wrong intention. They attack other systems to get access to systems where they do not have authorized entry . To hack into organizations’ networks and steal bank data, funds or sensitive information. Normally, they use the stolen resources to profit themselves , sell them on the black market or harass their target company.
Types of Hacker Gray Hat Hacker The Gray hat hacker falls in between the black hat hackers and white hat hackers. They are not certified, hackers. The difference is, they don’t want to rob people nor want to help people in particular. Rather, they enjoy experimenting with systems to find loopholes, crack defenses, and generally find a fun hacking experience.
Video
What is a keylogger ? A keylogger is an insidious form of spyware. You enter sensitive data onto your keyboard, believing nobody is watching. In fact, keylogging software is hard at work logging everything that you type.
Two types of keyloggers 1. Some keyloggers are hardware devices embedded within your internal PC hardware. They also come as a form of a plug placed between the CPU box and keyboard cable in an inconspicuous manner. In either case, someone will have to physically plant the hardware into your PC or its peripherals. This will require a degree of secrecy if it needs to be achieved clandestinely.
Two types of keyloggers 2. The second type of keyloggers are software that can be easily installed on victims’ devices. While this software is a type of malware, it is “good” malware, wherein it doesn’t harm its host. Its sole job is to snoop into the keystrokes and not impact the computer. You merrily go about your business, while undetectable keyloggers start stealing personal or sensitive data, without you ever knowing.
VIDEO
1
With HTTPS, data is encrypted in transit in both directions :
Ctrl+Shift+n
. The main purpose of a VPN is to hide your online activity . VPNs are often used to guard against hackers and snoops on public networks, but they're also useful for hiding your IP address, browsing activity, and personal data on any Wi-Fi network — even at home