Cyber_Security_unit_4
Cyber_Security_unit_4
Antivirus Software
Purpose: Detects, prevents, and removes malwares such as viruses, worms, and trojans
from your computer.
Firewalls
Purpose: Monitors and controls incoming and outgoing network traffic based on security
rules.
Vulnerability Scanners
Purpose: Identifies security weaknesses and potential vulnerabilities in systems and
software.
Endpoint Protection
Purpose: Secures individual devices (laptops, desktops, mobile devices) from threats and
unauthorized access.
Encryption Tools
Purpose: Converts data into a secure format (cipher text) that can only be accessed by
authorized users.
Key Features: Data encryption and decryption, secure key management, and compliance
support.
Password Management
Why It Matters: Strong passwords prevent unauthorized access to your accounts and
prevent hackers to guess password easily like brute force (trying possible passwords)
approach.
Best Practices: Create long passwords (at least 12 characters) with a mix of letters,
numbers, and symbols. Use a different password for each account and consider using a
password manager.
Best Practices: Adjust privacy settings on social media, avoid sharing sensitive details
online, and use caution when posting information.
How to Avoid: Verify the source of emails asking for personal information, look out for
grammatical errors or suspicious links, and contact the sender through official channels if in
doubt.
How to Do It: Use websites with 'HTTPS' in the URL, avoid clicking on pop-up ads, and
refrain from downloading files from untrusted sources.
How to Stay Safe: Use a VPN (Virtual Private Network) when using public Wi-Fi and avoid
accessing sensitive accounts unless absolutely necessary.
Safe Online Behavior
Why It Matters: Good habits help mitigate cyber risks.
Best Practices: Be cautious about what you share online, avoid engaging with suspicious
content, and maintain awareness of common cyber threats.
Which type of security tool is typically used to encrypt sensitive data, and why
is encryption important?
Encryption Tools are used to convert sensitive data into a secure format, ensuring that only
authorized users can access it. Encryption is crucial for maintaining data confidentiality,
especially during transmission or storage.