What isit?:Cloud is a(9603) (early computing days)
are comking cloud computing of how to
protecting systems systems
• Protecting systems protect digital system
digital attacks
• Data integrity > maintain non-annual data
aiwore
Authentication maintain lampayer operation
Core SecurityPrinciples (The CIA Triad)
Confidentiality
conniction
Integrity
madens
Su iniscenaivity
secure cia &
integrity Availability
development
data on store
Main Types of Threats (Cyber Attacks):
Malware > eating
eate in cloud, server
Phishing phishing on email A overloaded
PRansomware ransomware.
| DoS/DDoS traffic spike
Security_ Measures & Tools:
PEncryption data code code 22
Firewalls - firewalls/ app
Þ Multi-FactorAuth (MEA)
Antivirus check / files
Important Concepts & Dates:
988) Morris Worm (first self-replicating worm)
2001) Code Red worm
Zero-Day Vulnerability
Security Patching
-m raid in exploiton
security patch outs of unsite
, MALWARE, PHISHING, & RANSOMWARE)- STUDY NOTES
OWHAT ARE THEY?
These are types of malicious activity for hand to
protecting systems after tramplexnstem in (1989):
• Malicious Software protect digital system
•Deceptive Attacks > maintain-annual data operation
•Extortion > maintain lampayer operation
p Data - wurs - protect eating bugs
Virus Parbyware - ornmomeat phishing
Worm > Email : demorage infan email &
Trojan
Spyware
MALWARE PHISHING Email Phishing
Adware Spear Phishing
* tiny ovon
maskefed
THREAT Whaling
TYPES
DoS/DDoS RANSOMWAREL
TRAFFIC
Þ Denial of Service
RANSOMWARE
Distributed PEncrypting File
Traffic Spike 61989)
X ("AIDS
Blocking Access
Ransom Demand
3 HOW DO THEY WORK?
(PHASES)
Trojan)
2017)
(2017 WannaCry)
1. Delivery
|2. Infection
X
loading 3. Encryption (Ransomware) PREVENTION & DEFENSE
4.Action (Malware) b Use Anti-Malware
Patch Software
3. Encryption (Ransomware) Avoid Suspicious Links
|4.Action (Malware)
5. Demand (Ransomware) P Backup Data
|5.Demand (Ransomware) bUse strong passcaincs