Cyber Security part 2


digital asset:
Cyber security deals with digital assets, comp, mobile,tablets
digital asset is a digital entity owned by an individual or company. Examples include digital photos, videos, and songs. These assets are not tangible, meaning they have no physical presence. Instead, they are files that reside on storage device, such as a local computer or a cloud-based storage network.
Personal data information.

Malware: the program which was installed in the computer is called Malware.
Bots are bits of code that live on your computer awaiting a command from the internet to perform acts on your behalf, such as sending a message to other computers.
Firewall: it watches for certain types of actions, such as an outsider trying to run something on your computer, and prevents it from happening.
How do we keep our customers data safe?
The cloud is a location that contains a large number of computers called servers in a facility called a data center.

Ransomware:
Hackers may could encrypt all the files on your computer so you can’t use them without password, to get the password you need to pay money for the password so you can use you computer again. That’s why they call it ‘ransomware.”


Bot:
bot, short for "robot", is a type of software application or script that performs automated tasks on command. Bad bots perform malicious tasks that allow an attacker to remotely take control over an affected computer. Once infected, these machines may also be referred to as zombies.
It is nothing but a small bits of code tha sleep somewhere on your computer, usually in a hidden file. When the right command comes in over the network they wake up and send messages to other computers using your MAC address.
What is MAC address?
MAC (Media Access Control) address is a unique ID assigned to every internet-connected machine that allows it to be identified when connected to a specific network. To find the MAC address on your Windows computer: Click on the Start menu in the bottom-left corner of your computer.
along with an IP address (which is networks software), there's also a hardware address. Typically it is tied to a key connection device in your computer called the network interface card, or NIC.
The NIC is essentially a computer circuit card that makes it possible for your computer to connect to a network.
An NIC turns data into an electrical signal that can be transmitted over the network.
Every NIC has a hardware address that's known as a MAC, for Media Access Control. Where IP addresses are associated with TCP/IP (networking software), MAC addresses are linked to the hardware of network adapters.
Once again, that's hardware and software working together, IP addresses and MAC addresses working together.
As you've probably noticed, the MAC address itself doesn't look anything like an IP address 
To see the MAC Address:
1.    Go to control panelàclick on network and internetànetwork and sharing
2.    Click on Wi-fi (internet)àclick on details in the dialogue box
3.    There you can see the physical address:
What is firmware?
It is a software for hardware. Firmware is a software program permanently etched into a hardware device such as keyboards, hard drive, BIOS, or video cards. It is programmed to give permanent
instructions to communicate with other devices and perform functions like basic
input/output tasks. Hardware makers use embedded firmware to
control the functions of various hardware devices and systems, much like a
computer's operating system (OS) ...

Points to remember:
1.    Look for the lock
2.    
Check the URL

Download from trustworthy sources


1.    Install security updates
1.    Don’t email private data

1.    Use strong password
Enable two-factor authentication

1.    Don’t plug in strangers device


Next Data Analysis
Previous: cyber security

Comments

Popular Posts