SlideShare une entreprise Scribd logo
1  sur  11
A PPT on Cyber Security
Presented by:
Priyanka Singh
Sem 5
Roll no. 530
Introduction
 Since the 1970s, computer usage starts to grow and reaches every aspect
commercially and personally.
 Despite their handiness, computers are also prone to several threats.
 IBM and other early computer companies have already provided security software
products since the seventies.
 As the computer and digital media development, the threats also get developed.
 To counteract them, people nowadays are creating protection called Cyber Security.
• The term Cyber Security refers to a protection system for
computers and networks from theft, damage, disruption, illegal
changing, or information disclosure taken from the electronic data,
software, or hardware.
• The definition might seem simple, but in reality, the
varied and enhanced technologies like smartphones,
websites, televisions, Internet of Things (IoT) require a
complicated cyber security system.
Cyber Security’s elements
 Based on the function and media, cyber security system covers these types of security:
 Data security:
In every single network, hardware, and software, there must be data provided by the
owners, clients, or even the third party. Data security protects by giving limited access only to
the authorized ones to prevent any data theft.
 Application security:
This type of security should be developed from the design stage of the program. Continuous
updates of the apps should include the security system, so new threats could be detected
early.
 Mobile security:
Mobiles including tablets and cell phones are also prone to threats that could come from
wire/devices like USB and wireless like Bluetooth and the internet.
 Network security:
By connecting people, networks have a bigger possibility of getting intrusion and attacks.
The admin/host is also a part of the security system.
(Continued)
 Endpoint security:
Users and entry points (users’ devices) are most likely to get malicious threats from a virus
such as Malware. The form of security could be anti-virus software, but the best one is the
education for users to carefully plug in USBs, responding to suspicious links and more.
 Cloud security:
Cloud is a digital data storage that enables users to store and download data. Although the
storage companies also run their cyber security system, the users also need to be careful in
managing their cloud account there have been many data thefts due to reckless Cloud account
usage.
 Database and Infrastructure security:
Not only the digital software but the hardware could also be stolen. The security system
should cover digitally and physically.
 Business continuity and disaster recovery:
Unexpected incidents might cause data loss. The owners should design a system to recover
the loss or at least to back up the data. Another way is designing Business Continuity which is a
plan to run the business with some missing resources/data.
Why is Cyber Security important?
 As mentioned before, cyber threats could bring any damages to the data,
hardware/software, and reputation. Further problems such as data abuse and data
leaking are likely to happen. On the contrary, all types of data including intellectual
property, non-public personal information (NPI), and non-public corporate
information are sensitive information that must be protected.
 There have been creative ways of stealing sensitive information and simple
protections like anti-virus app is not enough to prevent the threats. Hence
governments in several countries participate in making regulations related to cyber
security. An example is General Data Protection Regulation (GDPR) in European Union.
Many other countries are also taking legal stances regarding cyber matters.
 Unfortunately, some cases of data leaking also come from the governmental body.
Hence, the stakeholders and individuals need to be wise in managing the data.
Especially the institutions, the cyber security system must be designed carefully to
prevent any threats including data leaking intentionally or unintentionally.
Cyber Threats
• Digital threats are categorized into three
types that are cybercrime, cyber-attack, and
cyber-terrorism. Cybercrime is organized by a
person or a group targeting financial profit or
disruption. Cyber-attack is mostly driven by
political motives and cyber terrorism is
mostly done in massive act to cause certain
fear. To make those threats happen,
cybercriminals usually use these methods.
Some of these threats are given in the next
slide.
Cyber Threats Methods
 Phishing: the most frequent threat might be phishing. It is an illegal act to steal one’s private data
by sending them a link that redirects to fake sites or forms requiring users’ personal information.
 Malware: acronym of Malicious Software, Malware enables attackers or hackers to have access to
the installed device.
 SQL Injection: it stands for Structured Query Language. Just like its name, SQL is a code injected
into an entry field that exploits the security vulnerability.
 Backdoor: similar to the name, the backdoor is a technique to access a program by passing the
‘main’ normal authentication. It is usually inserted by program developers or hackers, and it is hard
to detect.
 Denial-of-service attack: this attack employs ‘denial’ by the system by submitting the wrong
password or overloading a network/machine’s capabilities to make the service unavailable. Another
example is zombie computers.
 Direct-access attack: contrary to a denial-of-service attack, the direct-access attack is done by
installing keyloggers, worms, a wireless mic, or covert listening devices to make operating system
modifications for direct access to the original one.
 Spoofing: it is a masquerade act that comes from data falsification. Examples include biometric
spoofing, IP address spoofing, and email spoofing.
Tips on building your Cyber Security
After knowing all possible threats, now is the best time to build
your cyber security system. To start, here are a few tips that you
can follow.
 Avoid any suspicious emails, chats, texts, or links from unknown senders. Especially if
they ask you to input your particular data.
 Regularly update pins or passwords with unique and strong ones. This could block access
to the hackers that are currently logging into your account.
 Never use public and unsecured Wi-Fi. People could break into your device using a
wireless connection.
 Have a secure backup.
 Use cyber security technologies such as Identity and Access Management (IAM), Security
information and event management (SIEM), and data security platform.
 Educate and check the staff to minimize the insider threat.
 Try Third-Party Risk Management (TRPM).
 Employ IT professionals that could detect any possible threats or protect from any
hackers’ attacks.
(Continued)
 Choose cyber security strategy at least choose some software
protection like anti-virus or others.
 Use multi-factor authentication as it is harder to get broken down.
 Do not recklessly log in to various devices.
 Prepare for the worst by making secondary plans in case there is
data/resource loss.
Thank You!

Contenu connexe

Tendances

Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 

Tendances (20)

Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
Information security
Information securityInformation security
Information security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Similaire à Cyber Security PPT.pptx

43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 

Similaire à Cyber Security PPT.pptx (20)

Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk Advisory
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 

Dernier

Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
ranjankumarbehera14
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
Health
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
ahmedjiabur940
 
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit RiyadhCytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Abortion pills in Riyadh +966572737505 get cytotec
 
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
wsppdmt
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schs
cnajjemba
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
vexqp
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Bertram Ludäscher
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
vexqp
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
q6pzkpark
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
nirzagarg
 

Dernier (20)

Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit RiyadhCytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
Cytotec in Jeddah+966572737505) get unwanted pregnancy kit Riyadh
 
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
一比一原版(UCD毕业证书)加州大学戴维斯分校毕业证成绩单原件一模一样
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
PLE-statistics document for primary schs
PLE-statistics document for primary schsPLE-statistics document for primary schs
PLE-statistics document for primary schs
 
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
怎样办理伦敦大学毕业证(UoL毕业证书)成绩单学校原版复制
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
 
Data Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdfData Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdf
 
Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........
 
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
怎样办理纽约州立大学宾汉姆顿分校毕业证(SUNY-Bin毕业证书)成绩单学校原版复制
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
 
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Surabaya ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
 
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Satna [ 7014168258 ] Call Me For Genuine Models We ...
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubai
 
Aspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - AlmoraAspirational Block Program Block Syaldey District - Almora
Aspirational Block Program Block Syaldey District - Almora
 

Cyber Security PPT.pptx

  • 1. A PPT on Cyber Security Presented by: Priyanka Singh Sem 5 Roll no. 530
  • 2. Introduction  Since the 1970s, computer usage starts to grow and reaches every aspect commercially and personally.  Despite their handiness, computers are also prone to several threats.  IBM and other early computer companies have already provided security software products since the seventies.  As the computer and digital media development, the threats also get developed.  To counteract them, people nowadays are creating protection called Cyber Security.
  • 3. • The term Cyber Security refers to a protection system for computers and networks from theft, damage, disruption, illegal changing, or information disclosure taken from the electronic data, software, or hardware. • The definition might seem simple, but in reality, the varied and enhanced technologies like smartphones, websites, televisions, Internet of Things (IoT) require a complicated cyber security system.
  • 4. Cyber Security’s elements  Based on the function and media, cyber security system covers these types of security:  Data security: In every single network, hardware, and software, there must be data provided by the owners, clients, or even the third party. Data security protects by giving limited access only to the authorized ones to prevent any data theft.  Application security: This type of security should be developed from the design stage of the program. Continuous updates of the apps should include the security system, so new threats could be detected early.  Mobile security: Mobiles including tablets and cell phones are also prone to threats that could come from wire/devices like USB and wireless like Bluetooth and the internet.  Network security: By connecting people, networks have a bigger possibility of getting intrusion and attacks. The admin/host is also a part of the security system.
  • 5. (Continued)  Endpoint security: Users and entry points (users’ devices) are most likely to get malicious threats from a virus such as Malware. The form of security could be anti-virus software, but the best one is the education for users to carefully plug in USBs, responding to suspicious links and more.  Cloud security: Cloud is a digital data storage that enables users to store and download data. Although the storage companies also run their cyber security system, the users also need to be careful in managing their cloud account there have been many data thefts due to reckless Cloud account usage.  Database and Infrastructure security: Not only the digital software but the hardware could also be stolen. The security system should cover digitally and physically.  Business continuity and disaster recovery: Unexpected incidents might cause data loss. The owners should design a system to recover the loss or at least to back up the data. Another way is designing Business Continuity which is a plan to run the business with some missing resources/data.
  • 6. Why is Cyber Security important?  As mentioned before, cyber threats could bring any damages to the data, hardware/software, and reputation. Further problems such as data abuse and data leaking are likely to happen. On the contrary, all types of data including intellectual property, non-public personal information (NPI), and non-public corporate information are sensitive information that must be protected.  There have been creative ways of stealing sensitive information and simple protections like anti-virus app is not enough to prevent the threats. Hence governments in several countries participate in making regulations related to cyber security. An example is General Data Protection Regulation (GDPR) in European Union. Many other countries are also taking legal stances regarding cyber matters.  Unfortunately, some cases of data leaking also come from the governmental body. Hence, the stakeholders and individuals need to be wise in managing the data. Especially the institutions, the cyber security system must be designed carefully to prevent any threats including data leaking intentionally or unintentionally.
  • 7. Cyber Threats • Digital threats are categorized into three types that are cybercrime, cyber-attack, and cyber-terrorism. Cybercrime is organized by a person or a group targeting financial profit or disruption. Cyber-attack is mostly driven by political motives and cyber terrorism is mostly done in massive act to cause certain fear. To make those threats happen, cybercriminals usually use these methods. Some of these threats are given in the next slide.
  • 8. Cyber Threats Methods  Phishing: the most frequent threat might be phishing. It is an illegal act to steal one’s private data by sending them a link that redirects to fake sites or forms requiring users’ personal information.  Malware: acronym of Malicious Software, Malware enables attackers or hackers to have access to the installed device.  SQL Injection: it stands for Structured Query Language. Just like its name, SQL is a code injected into an entry field that exploits the security vulnerability.  Backdoor: similar to the name, the backdoor is a technique to access a program by passing the ‘main’ normal authentication. It is usually inserted by program developers or hackers, and it is hard to detect.  Denial-of-service attack: this attack employs ‘denial’ by the system by submitting the wrong password or overloading a network/machine’s capabilities to make the service unavailable. Another example is zombie computers.  Direct-access attack: contrary to a denial-of-service attack, the direct-access attack is done by installing keyloggers, worms, a wireless mic, or covert listening devices to make operating system modifications for direct access to the original one.  Spoofing: it is a masquerade act that comes from data falsification. Examples include biometric spoofing, IP address spoofing, and email spoofing.
  • 9. Tips on building your Cyber Security After knowing all possible threats, now is the best time to build your cyber security system. To start, here are a few tips that you can follow.  Avoid any suspicious emails, chats, texts, or links from unknown senders. Especially if they ask you to input your particular data.  Regularly update pins or passwords with unique and strong ones. This could block access to the hackers that are currently logging into your account.  Never use public and unsecured Wi-Fi. People could break into your device using a wireless connection.  Have a secure backup.  Use cyber security technologies such as Identity and Access Management (IAM), Security information and event management (SIEM), and data security platform.  Educate and check the staff to minimize the insider threat.  Try Third-Party Risk Management (TRPM).  Employ IT professionals that could detect any possible threats or protect from any hackers’ attacks.
  • 10. (Continued)  Choose cyber security strategy at least choose some software protection like anti-virus or others.  Use multi-factor authentication as it is harder to get broken down.  Do not recklessly log in to various devices.  Prepare for the worst by making secondary plans in case there is data/resource loss.