LECTURE-MODULE-CYBER-SECURITY
LECTURE-MODULE-CYBER-SECURITY
EC 2 CYBER SECURITY
Course Description
Effective information security is a challenge in the field of Criminal Justice Education and the
future officers in the Law Enforcement service and private enterprise. It is an effort that requires
academic staff to work together in relation to the current and future problems in the digital world.
Fortunately, the information security community has developed a variety of resources, methods,
and best practices to help modern enterprises and law enforcement agencies address the
challenge.
1
INTRODUCTION
The problem of cybercrime has spread throughout the world. World leaders are working hard
to win the fight against transnational crime. Because of the adaptation of various technologies,
these are instruments for continuing a cyber-attack. In relation to this topic, it is critical to
understand how to protect our data and network from cyber-criminals. The practice of defending
computers, servers, mobile devices, electronic systems, networks, and data from hostile
intrusions is known as cyber security. It is often referred to as information technology security or
electronic information security.
However, every sovereign faces a hurdle in securing their cyber elements. The capability of
those who will undertake cyber security processes is also an issue, thus trainings and seminars
are both important considerations. Law enforcement personnel and individuals in the legal system
are increasingly embracing technology to combat crime as technology is utilized to perpetrate
more sophisticated crimes. To keep the public secure and protect human life, the criminal justice
system must employ cutting-edge software, tracking systems, and other tools. Technology is
improving law enforcement and, as a result, the interaction between officers and the communities
they serve. Technology has made towns safer places to live and work by providing numerous
methods of dealing with crime.
TOPIC 1
Orientation of the students on the University Vision, Mission and Hymn; Program Goals,
Objectives and Intended Learning outcomes
University Vision
2
CSU is a University with global stature in the arts, culture, agriculture and fisheries, the
sciences as well as technology and professional fields.
University Mission
Cagayan State University shall produce globally competent graduates through excellent
instruction, innovative and creative research, responsive public service and productive industry
and community engagement.
University Hymn
Fount of our visions, cradle of our dreams, well-spring of the fondest hopes for the youth
of this our vale. God bless you, our University God go before you always. That we your sons and
daughters be servants of truth Guardians of justice and instruments of love Rise without fear for
our freedoms. Search without ceasing for all that is true. God be with you, our cherished CSU,
May His light ever unfold you.
Lesson 2. Program Goal and Objectives and Program Intended Learning Outcomes
Goals
➢ To provide the students with a strong foundation in criminal justice principles, concept and
theories; and accord them with a practice orientation to justice administration through core
instruction in criminal justice in the domains and law enforcement administration and
courts and correctional administration.
Objectives
3
2. Internalize the concepts of human rights and victim welfare.
3. Demonstrate competence and broad understanding in Law enforcement administration, public
safety and criminal justice.
4. Utilize criminalistics or forensic Science in the investigation and detection of crime.
5. Apply the principles and jurisprudence of criminal law, evidence, and criminal procedure
TOPIC 2
4
Organizations transmit sensitive data across networks and to other devices in the course
of doing business, and cyber security describes the discipline dedicated to protecting that
information and the systems used to process or store it. As the volume and sophistication of
cyber-attacks grow, companies and organizations, especially those that are tasked with
safeguarding information relating to national security, health, or financial records, need to take
steps to protect their sensitive business and personnel information.
FOR STUDENTS
Cyber security is important for students because they often target cyber- attacks. In a
recent case, a group of students from a college was targeted by hackers who gained access to
their personal information, including their Social Security numbers and credit card information.
The hackers then used this information to fraudulently charge thousands of dollars to the students'
credit cards. The students were left with massive debt and had to spend months repairing their
credit. This case highlights the importance of cyber security for students, who are often the victims
of cybercrime.
IN BUSINESS / ORGANIZATIONS
The importance of Cyber Security for businesses and organizations can be seen in the
case of the target data breach. In this case, hackers were able to gain access to the target's
customer data, including credit and debit card information. It led to target having to pay out millions
of dollars in damages and losing customer trust. Target's data breach is just one example of how
cyber security is important for businesses and organizations.
A real-life example of the importance of cyber security for the banking sector is the 2014
JPMorgan Chase data breach. In this breach, hackers gained access to the names, addresses,
phone numbers, and email addresses of 76 million households and 7 million small businesses.
The hackers also gained access to the account information, including account numbers and
balances, of 83 million JPMorgan Chase customers.
This breach highlights the importance of cyber security for the banking sector, as
hackers were able to gain access to a large amount of sensitive customer data. If this data had
fallen into the wrong hands, it could have been used for identity theft, fraud, or other malicious
purposes.
According to Daniel Castro, the Vice-president of the Information Technology & Innovation
Foundation, a cyber-attack can lead to cost between $57 and &109 billion. It has been found that
5
roughly, 36% of the businesses around the world lose all its money due to cyber-attacks. The
annual loss has an estimation of $79,841 on an average. Most of the time people tend to think
that their business is too small to face cyber-attack and this is where they make a blunder to turn
the tables upside down.
Security measures are taken to safeguard computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks, illegal access, and improper use. If you
operate a business, you need to make efforts to make yourself cyber security in order to keep
your data protected from hackers. Anti-malware and antivirus protection is critical for keeping
dangerous actors out of your machine.
1. Network security is the practice of securing a computer network from intruders, whether
targeted attackers or opportunistic malware.
3. Information security protects the integrity and privacy of data, both in storage and in
transit.
4. Operational security includes the processes and decisions for handling and protecting
data assets. The permissions users have when accessing a network and the procedures
that determine how and where data may be stored or shared all fall under this umbrella.
6
REFERENCES:
https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
https://www.ibm.com/ph-en/topics/cybersecurity#:~:text=Resources-
,What%20is%20cybersecurity%3F,sensitive%20information%20from%20digital%20attacks.
https://digitalguardian.com/blog/what-cyber-security
https://www.knowledgehut.com/blog/security/importance-of-cyber-security
ACTIVITY #1
2. As a law enforcer someday, how will you promote cyber security and awareness in
the community?
7
PROMPTING KNOWLEDGE RECALL
Before you begin studying Basic network security, consider the current event below:
The Philippines’ data privacy watchdog and top law enforcement agency are investigating
allegations that electoral systems being used for the country’s upcoming general election were
hacked.
The Manila Bulletin, the Philippines’ largest English-language newspaper, published
claims from an anonymous source that the servers of the Philippines Commission on Elections
(COMELEC) were breached on January 8, and that attackers downloaded more than 60 GB of
data.
The data included usernames and PINs of vote-counting machines, as well as “network
diagrams, IP addresses, list of all privileged users, domain admin credentials, list of all passwords
and domain policies, access to the ballot handling dashboard, and QR code captures of the
bureau of canvassers with login and password”, reported the Manila Bulletin.
The data was also alleged to include a “list of overseas absentee voters, [the] location of
all voting precincts with details of board of canvassers, all configuration list of the database, and
list of all user accounts of COMELEC personnel”.
‘No independent verification’
COMELEC said in a statement dated January 10 that it was “presently validating the allegations”,
but added that “usernames and PINS of vote-counting machines” did “not exist in COMELEC
systems simply because the configuration files – which includes usernames and PINs – have not
yet been completed. This calls into question the veracity of the hacking claim”.
QUESTIONS:
8
TOPIC 3
BASIC NETWORK SECURITY
1. Builds trust
✓ Security for large systems translates to security for everyone. Network security boosts
client and consumer confidence, and it protects your business from the reputational and
legal fallout of a security breach.
2. Mitigates risk
✓ The right network security solution will help your business stay compliant with business
and government regulations, and it will minimize the business and financial impact of a
breach if it does occur.
3. Protects proprietary information
✓ Your clients and customers rely on you to protect their sensitive information. Your
business relies on that same protection, too. Network security ensures the protection of
information and data shared across the network.
4. Enables a more modern workplace
9
✓ From allowing employees to work securely from any location using VPN to encouraging
collaboration with secure network access, network security provides options to enable
the future of work. Effective network security also provides many levels of security to
scale with your growing business.
1. Access control
o Access control is much like it sounds; it controls access to sensitive areas within the
network. By recognizing each user and each divide, you can limit access to only
known users and devices and block or limit access to unrecognized devices and
users.
2. Antivirus and anti-malware software
o Malware, short for “malicious software,” takes many forms to attack your network,
including viruses, worms, Trojans, spyware, or ransomware. While some malware
acts immediately to steal or corrupt data, other malware is stealthier, lying dormant
before secretly infiltrating systems and information.
o Top antivirus and anti-malware software programs will not just scan and monitor
networks for malware upon entry, but will continuously monitor the network for
suspicious behavior and anomalies to help mitigate risk and protect against threats.
3. Application security
o Network security involves not just the integrity of your own systems but the integrity
of the systems you use to support your operations. Each device, software product,
and application used in your network must be vetted and updated to prevent
infiltration via a third-party network. Application security is the practice of protecting
against any vulnerabilities caused by integrating third-party systems and applications.
4. Behavioral analytics
o Behavioral analytics tools are designed to identify risky user behavior that typically
precedes a potential security breach. Identifying threats early on gives network
security administrators the best chance of mitigating any potential threats.
5. Cloud security
o Many businesses are moving to the cloud to benefit from increased efficiency,
reduced costs, integrated tools, and easier collaboration, especially between remote
employees. However, cloud migration comes with its own share of challenges—when
users can connect directly to the Internet, IT professionals lose the visibility into what
employees are doing and increase the risk of data being exposed. To combat this
issue, cloud computing security may include encryption and identify management.
10
installed on a system, and it should be updated regularly to include the latest
definitions.
2. Create strong passwords
• Another essential step in protecting a network is to create strong passwords.
Passwords should be at least eight characters long and include a mix of letters,
numbers, and symbols. They should also not be easy to guess—for instance, the
user’s name or the name of the company.
3. Enforce security policies.
• A third way to reduce risk of attacks on a network is to enforce security policies.
Security policies can help ensure that all devices on a network are protected
against viruses and malware and that users are using strong passwords. These
policies can also restrict access to some network regions and limit user privileges.
4. Use firewalls.
• Firewalls are another essential tool in defending networks against security threats.
A firewall can help prevent unauthorized access to a network by blocking incoming
traffic from untrusted sources. Additionally, firewalls can be configured to allow
only certain types of traffic, such as web traffic or email.
5. Monitor activity.
• Finally, it’s important to monitor activity on the network. Tracking logs and other
data enables suspicious activity to be identified quickly, allowing security personnel
to take steps to investigate and mitigate potential threats.
RESOURCES:
https://www.forcepoint.com/cyber-edu/network-security ty Vulnerabilities in a Network
https://www.vmware.com/topics/glossary/content/network-
security.html#:~:text=Network%20security%20is%20a%20set,wide%20variety%20of%20pote
ntial%20threats.
https://www.lucidchart.com/blog/network-security-basics-and-benefits
https://www.eccouncil.org/cybersecurity-exchange/network-security/how-to-prevent-network-
security-attacks/
https://portswigger.net/daily-swig/was-comelec-hacked-philippines-commission-on-elections-
casts-doubt-on-data-breach-claims
11
ACTIVITY #2
Give the top five network security threats and explain how these attacks are managed.
12
TOPIC 4
Secure Network Administration Principles is essential for ensuring the security and
smooth trafficking of information through systems and controlling the access of such
information. It also helps in tracking the network resources and their allotment method. You as
a security professional must be committed to understand the importance and details of how
these principles work in the bigger picture of InfoSec examination.
Secure networks are a primary necessity for organizations nowadays. However, even
strong networks cannot always prevent threats coming from inside and many other issues
related to security.
The key aspects of administration principles for network security are as follows:
Rules-Based Management
Firewall rules
• A Firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization's previously established security
policies.
• The rule system followed by a firewall is the first match-apply type. In this case, the final
firewall rule by default is to deny. The principles of this rule are that if any data packet
is not denied or allowed explicitly by any other rule systems then firewall rules always
block that packet by default.
VLAN management
• This is a hardware implementation that segregates the LAN with the help of switches.
In Virtual Local Area Network, every port is assigned to VLAN 1 by default. The network
13
administrator, of course, may change the assigned VLAN on any of the ports or group
together different ports assigning the same VLAN. The main objective of using VLAN is
to manage traffic on networks. VLAN offers fast communication within the network
without any hindrance. However, VLAN communication needs to have a routing function
which may be provided either by the routers or through a specialized switch called the
multilayer switch.
• The VLAN is utilized primarily to control traffic for enhanced performance and
security of the network. It is also used for isolation of traffic from the network segment.
During communication, certain VLANs can be avoided by not defining any specific route
between them. This can also be achieved by specifying a filter between VLANs. The
VLAN should be designed to allow necessary data packets while denying unnecessary
ones.
• The ACL defines whether one can access or be allowed to carry forward a particular
function. It is applicable mostly to access objects but can be extended for use in
communication as well. ACL is mostly used in firewalls, switches and routers as a
measure for security management. The ACL rules are known as “Filters” or “Rules of
ACL” where data packets are allowed as an exception and denied by default.
Port security
14
• It helps in avoiding unauthorized access, which is possible through open ports. Unused
ports are thereby blocked or locked with the help of wiring closets and server vaults.
Finally, it is disconnected from the main workstation by disconnecting from the patch
panel.
Flood guards
• This mechanism is used to thwart large-scale DDOS attacks. The primary purpose of
using this process is to identify malicious activities and blocking them automati cally.
This action prevents cyber attackers from entering into the network.
Loop Protection
Implicit Deny
• Another important security measure is the “implicit deny.” As the name suggests it is a
denied by default system which grants resources specifically. The default -deny does
not need to be defined as it is implicit in the management agreement’s permissions.
• The difference between implicit deny and firewalls is that here the routers have the
default deny all calls as the last rule. The default response is an implicit deny only when
in the absence of any explicit allow or deny.
Network Separation
• A desired network design feature is Network Bridging, which has many good attributes.
It avoids 5-4-3 later 1 limitations, maintains the isolation of collision domain and is
inexpensive, transparent to layer 3+ protocols and self-configuring. However, it also
carries drawbacks like latency, no option of collision division, not well scaled and can
result in a loop formation. All these problems can be solved by adding the feature
Network Separation.
Log Analysis
• This process aims to review the log files, audit trails and other types of records
generated by computers to identify policy violations, malicious events, downtimes and
other related issues.
15
This is also known as “All in One Security Appliances.” It is hardware designed
specifically to work in between the Internet and private networks. Undefined threat
management is used for filtering the inbound and outbound traffic that is entering or
leaving the network. Such management is implemented to act more as a firewall,
IPS, IDS, DDOS protection, virus scanning, spam and web filtering, and for tracking
activity. Several unified threat management tools work on the server end for the
maintenance of web applications as well as for the wireless security features.
REFERENCES:
https://resources.infosecinstitute.com/certification/security-plus-secure-network-
administration-principles-sy0-401
https://www.google.com/search?q=firewalls&source=lmns&bih=668&biw=1422&hl=en
&sa=X&ved=2ahUKEwiuzPy5loL9AhXculYBHRCNCWUQ_AUoAHoECAEQAA
ACTIVITY #3
DESCRIPTIONS
16
TOPIC 5
What is TCP/IP?
TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP/IP is a
set of standardized rules that allow computers to communicate on a network such as
the internet.
How it works?
TCP/IP is a two-layered program: the higher layer (TCP) disassembles message
content into small "data packets" that are then transmitted over the Internet to be re-
assembled by the receiving computer's TCP back into the message's original form
Wireless networks are computer networks that are not connected by cables of
any kind. The use of a wireless network enables enterprises to avoid the costly
process of introducing cables into buildings or as a connection between different
equipment locations. The basis of wireless systems are radio waves, an
implementation that takes place at the physical level of network structure.
Wireless networks use radio waves to connect devices such as laptops to the
Internet, the business network and applications. When laptops are connected to
Wi-Fi hot spots in public places, the connection is established to that business’s
wireless network.
17
✓ Wireless Local Area Network (LAN): Links two or more devices using a wireless
distribution method, providing a connection through access points to the wider
Internet.
✓ Wireless Metropolitan Area Networks (MAN): Connects several wireless LANs.
✓ Wireless Wide Area Network (WAN): Covers large areas such as neighboring towns
and cities.
✓ Wireless Personal Area Network (PAN): Interconnects devices in a short span,
generally within a person’s reach.
Definition
✓ Wi-Fi is a wireless technology used to connect computers, tablets, smartphones and other
devices to the internet.
✓ Wi-Fi is the radio signal sent from a wireless router to a nearby device, which translates
the signal into data you can see and use. The device transmits a radio signal back to the
router, which connects to the internet by wire or cable.
A Wi-Fi network is simply an internet connection that’s shared with multiple devices in
a home or business via a wireless router. The router is connected directly to your
internet modem and acts as a hub to broadcast the internet signal to all your Wi-Fi
enabled devices. This gives you flexibility to stay connected to the internet as long as
you’re within your network coverage area.
The term was created by a marketing firm because the wireless industry was looking
for a user-friendly name to refer to some not so user-friendly technology known
as IEEE 802.11 and the name stuck. Wi-Fi, often referred to as WiFi, wifi, wi-fi or wi fi,
is often thought to be short for Wireless Fidelity and the organization that paid for the
marketing firm is sometimes referred to as the Wireless Fidelity Alliance Inc.
Wi-Fi uses radio waves to transmit data from your wireless router to your Wi-Fi
enabled devices like your TV, smartphone, tablet and computer. Because they
communicate with each other over airwaves, your devices and personal information
can become vulnerable to hackers, cyber-attacks and other threats.
Wire line/router
18
Most homes use a wireless router to access the internet these days. The pros include
convenience of setup, mobility within range of the Wi-Fi access point (router) and the
ability to connect multiple devices.
Mobile hotspot or jetpack
Mobile and dedicated hotspots are becoming a more popular way of connecting safely
on the go. Two common hotspot devices are your smartphone and a jetpack. Most any
smartphone or tablet today can be used as a temporary hotspot and is a great option
if you occasionally need it. It’s easy to use and doesn’t require buying extra devices,
but it can zap your battery life and data pretty fast.
LTE Home Internet
If you live in a rural area where your internet options are limited, 4G LTE Home
Internet is worth considering. It offers high speed internet service delivered over cell
phone towers and mobile networks with average download speeds around 25 Mbps.
The advantages of LTE over satellite are better speeds and reliability depending on
your carrier.
5G Home Internet
5G Home Internet (Fixed Wireless Access) is now in more places around the country.*
Even with multiple devices connected, it’s reliable and fast enough to power your
whole home. Fixed wireless access has a simple plug and play setup, which means
there are no messy wires and no need to wait for a technician to come to your home
for setup.
REFERENCES:
https://www.google.com/search?q=tcp+ip+network&source=lmns&bih=668&biw=1
422&hl=en&sa=X&ved=2ahUKEwjg2pGkr4L9AhXYkVYBHWTGCdIQ_AUoAHoEC
AEQAA
https://www.techopedia.com/definition/26186/wireless-network
https://www.verizon.com/articles/internet-essentials/wifi-
definiton/#:~:text=A%20Wi%2DFi%20network%20is,your%20Wi%2DFi%20enable
d%20devices.
19
ACTIVITY #4
DIRECTION: Compare LAN and WIFI by using the Ven diagram below
1.
2.
3.
4.
5.
6.
20
TOPIC 6
RISK MITIGATION
Intended Learning Objective
• Explain how to Best Mitigate Cyber security Risks and Protect Your Data
• Cyber risk mitigation is the application of policies, technologies and procedures to reduce
the likelihood and impact of a successful cyber-attack. It is a critical practice to help guide
decision-making around risk control and mitigation and allows your organization to stay
protected and achieve its business goals.
o A cyber risk assessment uncovers risks that exist across your organization’s
networks, devices, applications, and users, and helps you determine how big an
impact those risks are.
o Once you have assessed your assets and identified security gaps, the next step is to
establish network access controls to mitigate the risk of threats from malicious
insiders and outside attackers. These controls will also reduce the number of issues
due to negligence or a lack of familiarity with security best practices.
21
3. Implement firewall and threat detection software
o Another cyber risk mitigation strategy is to install firewall and threat detection
software. A firewall and other threat detection systems (such as endpoint detection
and remediation solutions) monitor your network traffic to identify any suspicious
activity.
✓ Installing updates and security patches on a regular basis is a critical step for mitigating
cyber risk. The faster security gaps are closed, the less opportunity there is for
cybercriminals to exploit vulnerabilities in unpatched or outdated software. Moreover, a
consistent patch management schedule mitigates cyber risk by identifying your
enterprise’s vulnerabilities, checking for availability of patches and then systematically
rolling patches out to the appropriate assets.
✓ One of the best ways to mitigate cyber risk is to provide security training to employees.
Training raises awareness about how to properly identify and respond to the security
threats facing your organization.
✓ It is no longer possible for people to manage the expanding attack surface, nor process
the high volume of vulnerabilities emerging every day, without assistance. Security
automation tools such as Cyber Asset Attack Surface Management (CAASM), Risk-
based Vulnerability Management (RBVM) and Cyber Risk Quantification (CRQ) automate
cyber risk mitigation processes and allow security teams to work at scale.
✓ Your attack surface is the sum of all of the points on your enterprise network where an
attacker can attempt to gain unauthorized access to your information systems. To
effectively mitigate cyber risk, you need to make your attack surface smaller and harder
to compromise. You can do this by accurately inventorying your assets and removing
applications and devices you don’t need. It can also be done by continuously identifying,
prioritizing and remediating vulnerabilities. Tools like penetration tests and cyber risk
quantification solutions can help you to prioritize remediation efforts based on risk
likelihood and impact.
22
MAJOR CYBER SECURITY TIPS
1. Back up your data
✓ When you’re alerted to an update for your device or one of your apps, don’t ignore it —
install it as soon as possible. Updates aren’t just about adding new features. They’re also
about fixing vulnerabilities in a device or an app that attackers could find and use to gain
access to your system. If your device can’t receive updates anymore, we recommend
planning to upgrade to a newer model.
✓ We all have so many online accounts now that it’s become hard to keep track of all of the
passwords we need for them. To combat this, many of us use the same password for all
of our accounts, or stick to two or three different ones that we use over and over. The
problem with this is that if an attacker gets access to one of your account passwords, it
often gives them access to many of your other accounts as well.
✓ Two-factor authentication (2FA) is another way that you can help to protect your online
accounts from being hacked. You can choose to have a code sent or generated on your
device, like your phone, that you can use to authenticate who you are every time you log
in. That way, even if someone gets access to the account password, if they don’t have
your phone to receive the code they can’t get into your accounts.
✓ When you set up a new account online, you’re often asked to set an answer to an ‘account
recovery question’. These are generally used as a way to identify you if you forget your
password and need a prompt. They’re often based on easy to remember things about you
— like your mother’s maiden name, the name of your first pet or where you went to school.
Unfortunately, these are also easy things for an attacker to find out, and could be used to
gain access to your accounts without your knowledge.
23
It’s good to be careful about what you do online when you’re using a hotspot or free wifi — if
you’re logging on at a cafe, for example — as these networks are often unsecure. When a
network’s unsecure, anyone can access it and get hold of your data.
✓ Antivirus software can help you detect and remove malware — viruses — from your
computer system. If you don’t have antivirus installed already, consider investing in it. If
you’re using Microsoft Windows 7 or newer, it comes with a free antivirus called Windows
Defender. Otherwise, get a legitimate antivirus from a well-known, trusted company —
your local computer services company can give you advice on what would work best for
you. Don’t just download any free antivirus software online, as many of the ones you see
advertised for free are fake. They could download malware or adware onto your computer
instead of helping you detect and remove it.
✓ Did you know that the information you post to your Facebook profile, your Twitter feed or
your Instagram account could be used to steal your identity or hack into your online
accounts? We’re so used to sharing things online that we don’t really think about it
anymore. Everyone knows your pet's name, where you went to school, where you work,
and even when you’re away on holiday.
✓ Scams, fraud and phishing emails all attempt to trick you into giving away your personal
information or your financial details — often by pretending to be a legitimate business, like
a bank. It’s good to be aware of this so you can work out what’s a genuine request and
what isn’t. Don’t give out personal information online unless you know who’s asking for it
and why.
REFERENCES:
https://www.balbix.com/insights/what-is-cyber-risk-
mitigation/#:~:text=cyber%20risk%20mitigation%3F-
,Cyber%20risk%20mitigation%20is%20the%20application%20of%20poli
cies%2C%20technologies%20and,and%20achieve%20its%20business%
20goals.
https://www.cert.govt.nz/individuals/guides/get-started-cyber-security/
24
ACTIVITY #5
REFLECTION:
1. What do you believe the long-term consequences of phishing attacks will be if they
are not stopped and controlled?
25
TOPIC 7
Prior to understand the Basic incident response and forensics. Label the following
basic parts of computer.
26
5 BASIC COMPUTER COMPONENT
Whether it's a gaming system or a home PC, the five main components that make
up a typical, present-day computer include:
• A motherboard
▪ A motherboard is the main printed circuit board (PCB) in a computer.
The motherboard is a computer's central communications backbone
connectivity point, through which all components and external peripherals
connect. ... Additional components can be added to a motherboard
through its expansion slots.
27
o The main goal of digital forensics is to extract data from the electronic evidence,
process it into actionable intelligence and present the findings for prosecution.
All processes utilize sound forensic techniques to ensure the findings are
admissible in court
Electronic evidence is a component of almost all criminal activities and digital forensics
support is crucial for law enforcement investigations.
Electronic evidence can be collected from a wide array of sources, such as computers,
smartphones, remote storage, unmanned aerial systems, ship borne equipment, and more.
28
Examples of electronic records include: emails, websites, Word/Excel documents, digital
purchase receipts, databases, text messages, social media postings, and information stored
on SharePoint sites and content management systems.
29
Two types of volatile data
1. Volatile Data on the Physical Computer like open network connections, running
processes and services, arp3 and caches.
2. Transient Data that are not volatile in their nature but are only accessible on scene.
Encrypted volumes as well as remote resources are examples for this kind of data. The
characteristic of these data is that the contents of the data might get inaccessible, altered
or deleted after the search, if the investigator is not be able to acquire them.
REFERENCES:
https://www.interpol.int/en/How-we-work/Innovation/Digital-forensics
https://finance.uw.edu/recmgt/erecords#:~:text=Examples%20of%20ele
ctronic%20records%20include,%2C%20DropBox%2C%20etc.).
https://www.rudderstack.com/learn/data-security/what-is-persistent-
data/#:~:text=A%20persistent%20(or%20non%2Dvolatile,magnetic%20t
ape%2C%20and%20optical%20media.
TOPIC 8
✓ Cyber security awareness training for all employees, regardless of role, is an absolute
necessity if an organization is serious about shielding its sensitive data from
cybercriminals. Additionally, the industry in which your organization operates and the
functions it performs may fall under federal and state regulatory mandates that require
annual cybersecurity awareness training for employees. According to Ken Crawshaw, a
United Training instructor and cybersecurity subject matter expert,
30
BACKGROUND ON THE DIFFERENT CYBER-CRIME UNITS IN THE PHILIPPINES
SPECIALISED INSTITUTIONS
✓ Republic Act No. 10175 or the Cybercrime Prevention Act of 2012 created
the Office of Cybercrime (OOC) within the DOJ and designated it as
the Central Authority in all matters relating to international mutual assistance
and extradition for cybercrime and cyber-related matters.
Cybercrime Courts
✓ It also acts as the focal agency in formulating and implementing law enforcement
investigation and prosecution strategies in curbing cybercrime and cyber-related
offenses nationwide.
31
THE TEN COMMANDMENTS OF COMPUTER ETHICS
REFERENCES:
https://unitedtraining.com/resources/blog/the-importance-of-cybersecurity-awareness-
for-all-employees
https://www.doj.gov.ph/office-of-cybercrime.html
https://www.pna.gov.ph/articles/1164371#:~:text=The%20NBI%20Cybercrime%20Divisi
on%20continues,online%20chatter%20indicating%20future%20attacks.
https://www.manilatimes.net/2022/08/25/opinion/columns/the-evolving-nature-of-
cicc/1855863#:~:text=Its%20main%20functions%20as%20a,%2DAgency%20Committee
%20(NCIAC).
ACTIVITY #6
32
FINAL COVERAGE
TOPIC 9
Defining Malware
Some of the most common sources of malware are email attachments, malicious websites,
torrents, and shared networks.
1. Phishing
- Emails can be disguised to be coming from a fraudulent company for the sole purpose
of getting you to reveal personal information
2. Malicious Websites
- Some websites may attempt to install malware onto your computer, usually through
popups or malicious links
3. Torrents
- Files shared through Bit Torrents are generally unsafe because you never know what
to expect until they’re downloaded
4. Shared Networks
- A malware-infected computer on the same shared network may spread malware onto
your computer
1. Trojans
- A Trojan (or Trojan Horse) disguises itself as legitimate software with the purpose of
tricking you into executing malicious software on your computer.
2. Spyware
33
- Spyware invades your computer and attempts to steal your personal information such
as credit card or banking information, web browsing data, and passwords to various
accounts.
3. Adware
- Adware is unwanted software that displays advertisements on your screen. Adware
collects personal information from you to serve you with more personalized ads.
4. Rootkits
- Rootkits enable unauthorized users to gain access to your computer without being
detected.
5. Ransomware
- Ransomware is designed to encrypt your files and block access to them until a ransom
is paid.
6. Worms
- A worm replicates itself by infecting other computers that are on the same network.
They’re designed to consume bandwidth and interrupt networks.
https://www.titanfile.com/blog/types-of-computer-malware/
Malware can get onto your computer in a number of different ways. Here are some common
examples:
• Downloading free software from the Internet that secretly contains malware
• Downloading legitimate software that's secretly bundled with malware
• Visiting a website that's infected with malware
• Clicking a fake error message or pop-up window that starts a malware download
• Opening an email attachment that contains malware
As mentioned earlier in this article, sometimes malware can cause irrevocable damage — such
as file encryption and file loss. To save yourself a lot of trouble, it’s important to keep your files
backed up so you can restore them in case something like this happens.
https://support.google.com/google-ads/answer/2375413?hl=enn
34
CURRENT STATUS OF PHILIPPINES IN TERMS OF CYBER ATTACK
✓ The Philippines was the second most-attacked country by web threats worldwide last year,
according to a global cyber security firm’s online security monitoring.
✓ Data from the Kaspersky Security Network (KSN) revealed that the country moved two places
up, ranking second among countries most attacked by web threats within the period from
January to December last year.
✓ The 2022 global ranking is topped by Mongolia with 51.1 percent of the attacks recorded,
followed by the Philippines (49.8 percent), Ukraine (49.6 percent), Greece (49.5 percent) and
Belarus (49.1 percent).
✓ Attempts of local malware spread through removable drives such as flash drives dropped from
35,825,044 in 2021 to 25,060,519 last year. This placed the Philippines in the 72nd spot
worldwide, two notches down from its 70th ranking a year ago.
✓ Worms and file viruses accounted for a majority of such incidents that were detected and
blocked by Kaspersky products in devices of its Filipino customers, according to the KSN
report.
✓ It also showed that cyber criminals tried to penetrate systems through attacks via browsers.
https://www.philstar.com/headlines/2023/03/15/2251710/philippines-2nd-most-attacked-web-threats-worldwide-last-
year#:~:text=Worms%20and%20file%20viruses%20accounted,systems%20through%20attacks%20via%20browsers.
INTERNET SCAMS
• Phishing is a cyber attack where scammers send spam messages to an unknown number
of users to obtain confidential information or to earn money. These letters are mostly
disguised as legitimate organizations or companies, which helps the fraudster gain
confidence in his victim. Unfortunately, fraudulent scammers get what they want, which
can either hijack your identity, get money from you or infect your PC with viruses. Yes,
such fake emails may also contain malicious links or attachments, clicking on which
you can distribute malware to your PC. For phishing, attackers use a text message that
35
forces targeted individuals to perform certain actions. “Your package could not be
delivered” smishing – USPS online scam text to beware of.
An example of phishing attempt on one of the most popular social media platforms Linkedin
• Love scams aren’t the new way to make money by cheating. Fraudsters forge their profiles
on social media or online dating sites, hoping to gain confidence in the victim and engage
in an affair. These scammers then use psychological tricks to create an emotional bond
and profit from it.
• Unfortunately, these cheaters pretend to be victims who need money, and there’s no
one to help them. In some cases, they even blackmail their victims on a permanent basis
and demand a certain amount of money.
• This is one of the most dangerous types of online scam, as it relies upon human
emotional ties – even though the companion is purely fictional.
• Shopping on the Internet is not dangerous by itself. But the fraudsters have also found
traps that can steal data and money from users. They lower the prices of products and
give them significant discounts to get users to buy them. There will be no problems with
payment, but that does not guarantee that you’ll receive the goods from the description,
or will receive at least something.
36
Ad of fake iWatch for extremely low price
4. Mobile Scams
• Many fraudsters also attack mobile devices, for example, using malware or apps that look
legitimate. These applications disintegrate malicious pop-ups, banners, through which
other pests can spread and even steal confidential data. Another often target of mobile
scams is installing spyware – to spy on you or just collect your personal details in order to
spoof your identity in future.
https://gridinsoft.com/blogs/online-scams-sings/
37
2. Emotional abuse is any type of abuse that involves the continual emotional
mistreatment of a child and this can happen both on and offline.
3. Grooming is when someone builds a relationship with a child so they can sexually
abuse, exploit or traffic them. Children and young people can be groomed online or
face-to-face by a stranger or by someone they know.
4. Sexting is when someone shares sexual, naked or semi-naked images or videos of
themselves or others, or sends sexual messages. It's online abuse if a child or young
person is pressured or coerced into creating or sending these types of images
5. Child sexual exploitation is a type of sexual abuse. When a child is sexually exploited
online they may be persuaded or forced to create sexually explicit photos or videos or
have sexual conversations.
- If abuse is persistent and harming your mental health, and that of those around you, it
may well be time to leave social media. This can mean deleting accounts entirely or
just taking a break from them for a while. Some social media platforms allow users to
temporarily 'unpublished' or 'deactivate' accounts.
https://www.nspcc.org.uk/what-is-child-abuse/types-of-abuse/online-abuse/
IDENTITY THEFT
1. Be defensive with sensitive information. Don't put sensitive information in email, social
media, or text messages. ...
2. Create strong passwords and keep them secret. ...
3. Protect your accounts and your credit. ...
4. Boost your computer's security.
https://support.microsoft.com/en-us/office/protecting-yourself-from-identity-theft-online-6019708f-e990-4894-
9ca7-fdb53ee70830
38
PHISHING SCAM
• This type of attack involves hackers sending malicious
email attachments or URLs to users to gain access to
their accounts or computer. Cybercriminals are
becoming more established and many of these emails
are not flagged as spam. Users are tricked into emails
claiming they need to change their password or update
their billing information, giving criminals access.
1. Email phishing
- Most phishing attacks are sent by email. The crook will register a fake domain that
mimics a genuine organisation and sends thousands of generic requests.
- The fake domain often involves character substitution, like using ‘r’ and ‘n’ next to each
other to create ‘rn’ instead of ‘m’.
- In other cases, the fraudsters create a unique domain that includes the legitimate
organisation’s name in the URL. The example below is sent from
‘[email protected]’.
-The recipient might see the word ‘Amazon’ in the sender’s address and
assume that it was a genuine email.
- There are many ways to spot a phishing email, but as a general rule, you
should always check the email address of a message that asks you to click a
link or download an attachment.
2. Spear phishing
- There are two other, more sophisticated, types of phishing involving email.
- The first, spear phishing, describes malicious emails sent to a specific person.
Criminals who do this will already have some or all of the following information
about the victim:
39
▪ Their name.
▪ Place of employment.
▪ Job title.
▪ Email address; and
▪ Specific information about their job role.
You can see in the example below how much more convincing spear phishing emails
are compared to standard scams.
- The fraudster has the wherewithal to address the individual by name and
(presumably) knows that their job role involves making bank transfers on
behalf of the company.
- The informality of the email also suggests that the sender is a native English
speaker and creates the sense that this is a real message rather than a
template.
3. Whaling
- Whaling attacks are even more targeted, taking aim at senior executives.
Although the end goal of whaling is the same as any other kind of phishing
attack, the technique tends to be a lot subtler.
- Tricks such as fake links and malicious URLs aren’t helpful in this instance, as
criminals are attempting to imitate senior staff.
- Whaling emails also commonly use the pretext of a busy CEO who wants an
employee to do them a favour.
40
- Emails such as the above might not be as sophisticated as spear phishing
emails, but they play on employees’ willingness to follow instructions from their
boss.
- Recipients might suspect that something is amiss but are too afraid to confront
the sender to suggest that they are being unprofessional.
In this example, the message suggests that you have been the victim of fraud and
tells you to follow a link to prevent further damage. However, the link directs the recipient
to a website controlled by the fraudster and designed to capture your banking details.
https://www.itgovernance.eu/blog/en/the-5-most-common-types-of-phishing-attack
41
DISTRIBUTED DENIAL OF SERVICE
CYBERSTALKING
https://www.kaspersky.com/resource-center/threats/how-to-avoid-cyberstalking
42
HACKING
Types of Hacking
• There are typically four key drivers that lead to bad actors hacking websites or
systems:
o financial gain through the theft of credit card details or by defrauding financial
services,
o corporate espionage,
o to gain notoriety or respect for their hacking talents, and
o state-sponsored hacking that aims to steal business information and national
intelligence.
• On top of that, there are politically motivated hackers—or hacktivists—who aim to raise
public attention by leaking sensitive information, such as Anonymous, LulzSec, and
WikiLeaks.
43
What is the main reason of human trafficking in the Philippines?
- The Philippines is undoubtedly a source country for human trafficking with its
citizens being trafficked in different parts of the world, mainly owing to the
socio-economic conditions prevailing in different parts of the country, including
growing poverty, youth unemployment and gender inequalities, discrimination.
➢ The government increased victim protection efforts. The government lacked a reliable
mechanism to consolidate statistics on the total number of victims identified and assisted.
➢ The government reported identifying 1,802 victims, compared with 1,534 potential victims
identified in the previous reporting period. Of the 1,802 victims identified, traffickers
exploited 535 in sex trafficking, 501 in forced labor, and 766 in unspecified exploitations;
551 were male and 1,251 were female.
➢ The Department of Foreign Affairs (DFA) reported identifying 248 potential Filipino
trafficking victims abroad from July to December 2021, primarily in the Middle East and
Asia, compared to 2,429 in the previous reporting period.
➢ In addition to victims identified by the government, NGOs and an international
organization reported identifying 985 sex trafficking victims (228 men, 742 women, 197
boys, and 545 girls) and six adult female labor trafficking victims during the reporting
period.
https://www.state.gov/reports/2022-trafficking-in-persons-
report/philippines#:~:text=The%20government%20reported%20identifying%201%2C802,male%20and%201%2C251
%20were%20female.
Below, find some tips to protect yourself and your loved ones against human trafficking:
44
4. Beware of advertisements that seem too good to be true
- Traffickers often use catchy language in job advertisements online, promising
high wages for simple work or a chance to become a model. Traffickers will
often be vague about the company’s credentials, details, or your terms of
employment. If it seems too good to be true, it probably is.
5. Flag it, don’t share it!
- Stay vigilant in the online sphere and report suspicious pages or activities to
the authorities.
- Don’t hesitate to unfriend, block or report someone who is harassing you or
talking to you in a way you don’t like. Click on the links to see how to block
accounts on Facebook, Twitter, Instagram, TikTok, and SnapChat.
- Take screenshots of the messages or posts – they might be useful later for an
investigation or law enforcement.
https://www.unodc.org/unodc/en/endht/internet-safety-tips.html
45
TOPIC 10
DATA SECURITY
❖
Data security means protecting digital data, such as those in a database, from
destructive forces and from the unwanted actions of unauthorized users such
as a cyber attack or a data breach.
❖ Data security is the process of safeguarding digital information throughout its
entire life cycle to protect it from corruption, theft, or unauthorized access. It
covers everything—hardware, software, storage devices, and user devices;
access and administrative controls; and organizations' policies and
procedures.
1. Access Controls
- This type of data security measures includes limiting both physical and digital
access to critical systems and data.
2. Authentication
- Similar to access controls, authentication refers specifically to accurately
identifying users before they have access to data. This usually includes things
like passwords, PIN numbers, security tokens, swipe cards, or biometrics.
3. Backups & Recovery
- Good data security means you have a plan to securely access data in the event
of system failure, disaster, data corruption, or breach.
4. Data Erasure
- You’ll want to dispose of data properly and on a regular basis. Data erasure
employs software to completely overwrite data on any storage device and is
more secure than standard data wiping.
5. Data Masking
- By using data masking software, information is hidden by obscuring letters and
numbers with proxy characters. This effectively masks key information even if
an unauthorized party gains access to it. The data changes back to its original
form only when an authorized user receives it.
6. Data Resiliency
46
-
Comprehensive data security means that your systems can endure or recover
from failures. Building resiliency into your hardware and software means that
events like power outages or natural disasters won’t compromise security.
7. Encryption
- A computer algorithm transforms text characters into an unreadable format via
encryption keys. Only authorized users with the proper corresponding keys can
unlock and access the information.
1. Confidentiality. Ensures that data is accessed only by authorized users with the proper
credentials.
2. Integrity. Ensure that all data stored is reliable, accurate, and not subject to unwarranted
changes.
3. Availability. Ensures that data is readily — and safely — accessible and available for
ongoing business needs.
There is no silver bullet that will guarantee 100 percent security of your data. However,
there are several steps, tactics, and best practices that can help minimize the chances of a data
breach, loss, and exposure.
https://www.varonis.com/blog/data-
security#:~:text=There%20are%20three%20core%20elements,Confidentiality%2C%20Integrity%2C%20and%20Avail
ability.
47