SecureTech Solutions

ENGLISH AND DIGITAL THINKING

What is Digital Security?

Digital security is an important IT segment dedicated to blocking the threats that are currently seen in the digital environment. Online interfaces are a concrete and increasingly widespread reality when considering different realities for both businesses and individuals.

About

TYPES OF VIRTUAL THREATS

1

Adware

2

Social Engineering

3

Trojan Horse

Atack

PRINCIPAL CYBER ATTACKS

Adware

Adware is a program that displays advertisements without the user's authorization, making the computer slower and the connection sluggish. They typically take the form of pop-ups, those annoying windows that constantly open while you browse a specific website.

Social Engineering

It is an attack method in which someone uses persuasion, sometimes exploiting the user's naivety or excessive trust, to obtain information that can be used for unauthorized access to restricted environments, password theft, accessing computers, or obtaining confidential information.

Trojan Horse

Named after the story of the wooden horse used to trick the defenders of Troy into bringing stealthy soldiers into the city, a Trojan Horse hides malware within an apparently normal file.

Phishing

Phishing is a method of tricking you into sharing your passwords, credit card numbers, and other sensitive information by presenting itself as a trusted institution through email or a phone call.

Worm

A worm is a standalone, malware-type program that replicates itself with the goal of spreading to other computers. It typically uses a computer network or even USB drives, relying on security vulnerabilities in the target computer to gain access to it.

Backdoor

A type of Trojan horse, Blackdoor enables hackers to access and take control of the infected system, allowing them to modify, delete, or install files; send malicious emails using corporate credentials; perform banking transactions; and carry out other actions that can harm the business.

Defense

HOW TO DEFEND AGAINST THESE ATTACKS?

1. Avoid clicking on unfamiliar links and only log in to trusted websites.

2. Download apps/files only from trusted websites.

3. Verify if the email or SMS is official, if it is indeed from the company. The best way to know is by checking directly on the website.

4. Avoid clicking on advertisements that appear on websites (including untrusted ones). If you are interested in what is being advertised, visit the website directly to learn more.

5. If you receive a document from a friend/family member to install on your computer, ask that person if the document is trustworthy.

6. Follow all the previous tips, and to add to that, in addition to files and programs, do not connect unknown devices to your computer, such as a USB drive found on the street.

F.A.Q

FREQUENTLY ASKED QUESTIONS

To have a secure password, some guidelines are recommended. We have prepared a few items to guide how your password should be.

Long: preferably a phrase with letters, numbers, and symbols.
Complex: should make sense only to you and not be obvious.
Memorable: you should be able to remember it easily.
Impersonal: avoid using birthdays, names, or highly personal information.

Kept secret, never share it.

Different for each service/website.

Updated every 6 or 3 months or immediately after using it in an insecure location.

Also used to unlock phones, tablets, and computers.

Check if the source is familiar to you or access the VirusTotal website and see if your file poses any risks.

The good hacker is called a "Hacker" as they use their tools and knowledge for good purposes. The bad hacker is called a "Cracker" who does the opposite of a hacker, using their knowledge for personal gain and to harm others.

A VPN (Virtual Private Network) is a technology that establishes a secure and encrypted connection between your device and the internet. It creates a virtual tunnel through which all data traffic passes, protecting your personal information and ensuring online privacy.

One of the main things you should avoid while on the street is: try not to use public Wi-Fi and avoid using USB ports in public locations.

Cyber attacks targeting digital banks are prevalent due to the value of financial data they hold, the potential for financial gain, the lack of physical presence making it harder to detect fraud, the use of sophisticated hacking techniques, and potential security vulnerabilities. Both digital banks and users need to prioritize cybersecurity to mitigate these risks.

Team

OUR TEAM

GABRIEL SIERRA

STUDENT

822144973
COMPUTER SCIENCE

GABRIEL CASTRO

STUDENT

822157975
COMPUTER SCIENCE

LEONARDO FREITAS

STUDENT

822135116
COMPUTER SCIENCE

NATHAN GOMES

STUDENT

821224587
COMPUTER SCIENCE

CAIO BONATO

STUDENT

822165248
GAROTO DO RH

LAYSLA RODRIGUES

STUDENT

821216057
COMPUTER SCIENCE

JOSÉ BABILON

STUDENT

822156455
COMPUTER SCIENCE