Cyber Operators Course (Op) – Module 4

Harmful software and procedures to counter – Endpoint protection

To deal with more advanced attacks, endpoint protection software was developed to look for unusual behaviour. Anti-virus software simply looks for signatures, endpoint protection looks for more general rogue behaviour. It is therefore far more effective. However, skilled hackers can still evade it.

Look for evidence of an endpoint protection package on the desktop.  There are many available on the Market.  The below brands you may recognise.


Cyber Operators Course (Op) – Module 2

Accidental `Self-Hack` – Blue Screen of Death

Without realising it, you might be causing cyber damage every day yourself, even before any external threats are involved.

It is extremely important to make sure that a computer system is turned on and off correctly. Without doing so can lead to major computer issues such as ‘the blue screen of death’, hardware failures, software malfunctions… So when you have finished using your computer, it is important that you shut it down properly. The Operating System often has several files open and is often doing several things all at the same time, you can’t simply unplug the computer. Doing so could result in serious damage to your file system. Before you turn off your computer, you must issue one of the Operating System shutdown commands. This ensures that all running programs are stopped in an orderly fashion, all data has been successfully written to the disks, and all open files have been properly closed.

(Take a few minutes now to review this image. What information can gather from this?)