logo

Cyber Security: Scams, Browser Security, Malware Prevention, DoS Attacks, Hacking Tools and Cryptography Methods

12 Pages2636 Words382 Views
   

Added on  2023-06-11

About This Document

This article covers various aspects of cyber security such as scams, browser security, malware prevention, DoS attacks, hacking tools and cryptography methods. It provides insights on how to secure your network and prevent cyber attacks. The article is relevant for students studying computer science, cyber security or related courses in universities and colleges.

Cyber Security: Scams, Browser Security, Malware Prevention, DoS Attacks, Hacking Tools and Cryptography Methods

   Added on 2023-06-11

ShareRelated Documents
Running head: CYBER SECURITY
Cyber Security
[Name of the Student]
[Name of the University]
[Author note]
Cyber Security: Scams, Browser Security, Malware Prevention, DoS Attacks, Hacking Tools and Cryptography Methods_1
1CYBER SECURITY
Question 1:
A. Top internet scams:
Some of the scams conducted over the internet mainly includes the following:
Phishing email scams: It has been seen almost more than one-third of the security
incidents has taken place due to the phishing emails or malicious attachments. This type
of attack has been faced by company employee and by individuals as well. This type of
scam has continued to evolve and this acts as a significant online threat for both the users
as well as organizations where the malicious attacker gains access of the various sensitive
information.
The Nigerian Scam: This can be considered as one of the oldest and the most popular
scam which is mostly used by a member of a Nigerian family by making use of the
wealth to trick various peoples. This type of attack is also known as the Nigerian 419.
This type of scam mainly involves the sending of an emotional letter, email, text message
or social networking message which generally comes from the scammer who is asking
for help in order to retrieve a lot of money from the bank and by paying a little amount of
initial small fees for the paper and for the legal matters. It is generally promised by the
scammer that they would provide huge amount of money if someone helps them.
Greeting cards scam: It has been seen that we receive greeting cards via email in different
occasions which seems to be coming from a friend or from someone we care about. This
is also one of the oldest scam which is generally used by the malicious attackers to inject
malware which would followed by the harvesting of the valuable data of the user.
Cyber Security: Scams, Browser Security, Malware Prevention, DoS Attacks, Hacking Tools and Cryptography Methods_2
2CYBER SECURITY
B. Mozilla Firefox v3.6 Browser:
Some ways of securing the browser has been listed below:
Anti-Malware: Firefox is associated with providing protection against various kind of
viruses, worms, Trojan horses and spyware which are generally delivered over the Web.
In case if an user computer is accidentally falla in front of an attack site, then it would be
instantly associated with warning the user and would also provide the information why it
isn’t safe to use.
Anti-Virus Software: Firefox has the capability of getting easily integrated with your
antivirus software used in the Windows. When a file is being downloaded by making use
of this browser then the antivirus program would be associated with automatically
checking the file in order to protect the computer from any kind oft viruses and other
malware.
Private Browsing: This browser also provides the facility of private browsing which
helps in securing the browsing history. It is very easy to use this mode. This modes is
greatly suited for doing online banking on a computer which is being shared or while
checking email in an Internet café.
Customized Security Settings: This browser is associated with Controlling the different
levels of scrutiny for the various kind of site along with providing a enter exception.
Besides this the browser also consists of Customize settings related to the loading images,
passwords, cookies and installing add-ons in order to have a fully empowered Web
experience.
Cyber Security: Scams, Browser Security, Malware Prevention, DoS Attacks, Hacking Tools and Cryptography Methods_3
3CYBER SECURITY
Question 2:
A. The different kind of virus, malware and spyware mainly includes the following along
with the ways how they can be prevented:
Adware: This is a type of malware that is associated with delivering advertisements and
the most common example includes the pop-up ads on the website along with the
advertisements which are displayed by the software. Many times it has been seen that the
software and the applications are associated with providing of free versions of the
software which are generally coming as bundles along with the malware. A great amount
of adware is sponsored or authored by the advertisers or by the servers which acts as a
revenue generating tool.
Bot; this can be considered as a software program which are generally created for the
purpose of performing specific operations automatically. Despite of this it has been seen
that many bots are there which has been created for relatively harmless purposes and the
increased amount of bot is being used in today’s world. This bots can be used in the
botnets which is generally used for attacks like DDoS attacks and other malicious attacks.
This happens mainly due to the reason that the spambots are associated with rendering
the advertisements present on the website this is one of the example of this type of virus.
Bug: Bug can be considered as a flaw that is associated with producing an undesired
outcome. These type of flaws are generally happening due to the human error and the
typically existing in the source code or the compilers in a program. The bugs which are
minor in size are associated with affecting slightly on the behavior of the program
whereas the result can go for a long period unless and until they are discovered. The bugs
which are significant might be leading to crashing or freezing of the system.
Cyber Security: Scams, Browser Security, Malware Prevention, DoS Attacks, Hacking Tools and Cryptography Methods_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Different Kinds of Scams and Fraudulent Acts on Computer Networks
|12
|3315
|76

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Assignment on Cyber Scams 2022
|5
|769
|19

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

(PDF) Study of Botnets and their threats to Internet Security
|8
|1126
|478

Cyber Security Fraud, Scams, and Identity Theft
|10
|2857
|310