SlideShare une entreprise Scribd logo
1  sur  17
Télécharger pour lire hors ligne
Introduction to Cyber Security
What is
cybersecurity?
Some
Definitions
Cyber security refers to the body of
technologies, processes, and practices
designed to protect networks, devices,
programs, and data from attack, damage, or
unauthorized access. Cyber security may also
be referred to as information technology
security.
Some
Definitions
cybersecurity: “information assurance, includingscientific,technical,
management,or anyother relevant disciplines required to ensure
computer and networksecurity,including,but not limited to,a discipline
related to the followingfunctions:
(A) Secure System and networkadministrationand operations.
(B) Systems security engineering.
(C) Informationassurance systems and product acquisition.
(D) Cryptography.
(E) Threat and vulnerabilityassessment,includingriskmanagement.
(F) Web security.
(G) Operations ofcomputer emergency response teams.
(H) Cybersecuritytraining,education,and management.
(I) Computer forensics.
(J) Defensiveinformation operations.
According to S. 1901 “Cybersecurity Research and
Education Act of 2002”:
One way to
Think about it ❖ availability
❖ Integrity &
❖ secrecy(Confidentiality)
of information systems and networks in the
face of attacks,accidents and failures with the
goal of protecting operations and assets
cybersecurity is about
THE
IMPORTANCE
OF CYBER
SECURITY
Cyber security is important because government, military, corporate,
financial, and medical organizations collect, process, and store
unprecedented amounts of data on computers and other devices. A
significant portion of that data can be sensitive information, whether
that be intellectual property, financial data, personal information, or
other types of data for which unauthorized access or exposure could
have negative consequences. Organizations transmitsensitive data
across networks and to other devices in the course of doing
businesses, and cyber security describes the discipline dedicated to
protecting that information and the systems usedto process or store
it. As the volume and sophisticationof cyber-attacks grow,
companies and organizations, especially those that are tasked with
safeguarding information relating to national security, health, or
financial records, need to take steps to protect their sensitive
business and personnel information. As early as March 2013, the
nation’s top intelligence officials cautioned that cyber-attacks and
digital spying are the top threat to national security, eclipsing even
terrorism.
Why carry out a cyber security
risk assessment?
RISK
ASSESSMENT
The process of identifying, analyzing and evaluating
risk – is the only way to ensure that the cyber
security controls you choose are appropriate to the
risks your organization faces.
Without a risk assessment to inform your cyber
security choices, you could waste time, effort and
resources – there is, after all, little point
implementing measures to defend against events
that are unlikely to occur or won’t have much
material impact on your organization.
Likewise, it's possible that you'll underestimate or
overlook risks that could cause significant damage
to your organization.
This is why so many best-practice frameworks,
standards and laws – including the GDPR (General
Data Protection Regulation) and DPA (Data
Protection Act) 2018 – require them.
Top Five
Cyber Risks
When setting up your new business, you are
likely to rely on a variety of IT, such as smart
devices, PCs and cloud-based systems. You
could be holding customer data, employee
information and possibly detailed product
designs. These are likely to be of interest to
cyber criminals – no matter how small your
business. An awareness and basic
understanding of the threats posed in a cyber-
world will help protect your digital assets,
intellectual property and your business.
1. Ransomware
2. phishing
3. Data Leakage
4. Hacking
5. Insider threat
Cyber Risk : TOP 5
1. Ransomware
This is a form of malware (malicious software) that
attemptsto encrypt (scramble) your data and then
extort a ransom to release an unlock code. Most
ransomware is delivered via malicious emails. Follow
these key steps to protect your company.
• Staff awareness: staff should be wary of unsolicited
emails, particularly those that ask for a prompt
response.
• Malware protection: install and maintain good anti-
virus and malware protection software.
• Software updates: keep your applications up to date.
• Data backups:a series of well managed data backups
will allow you to recover from an unencrypted version
of a file. Make sure you regularly test your backups.
2. Phishing
Phishing is an attemptto gain sensitive information while posing as
a trustworthy contact, for example a bank or online service. Spear
phishing is a highly targeted attemptto gain information from an
individual. Phishing emails maylook completely convincing, often
with faultless wording and genuine logos. There is a form of spear
phishing, where a fake email from a CEO applies pressure on a CFO
into making an urgent payment, this has become known as
Whaling. It is worth considering ways to add additional safeguards
to protect the identity of CEOs and CFOs to prevent impersonation.
Here are a few steps you can use to protect yourself.
• Keep in mind that companies simply do not ask for sensitive
information.
• Be suspicious of unexpected emails.
• Make use of anti-malware software.
• Make sure you have spam filters turned on. Check them regularly
in case they have accidentally trapped an innocent email.
3. Data leakage
While cyber security in the office may seem challenging, it is
essential to understand that security extends well beyond
the office these days. The use of smart phones and tablets
has become widespread. The ubiquitous and cheap nature of
portable storage devices makes them a useful tool for the
backup and transportation of data. Those features mean they
are also a target for data thieves. The following pointers
provide useful first steps to prevent data leaking from your
organization.
• Ensure mobile devices have passcode locks.
• Turn on the tracking by GPS and the option to remotely
wipe the device if it is lost.
• The use of encryption software is highly recommended
when using portable storage devices.
• Keep an eye on your mobile devices and paperwork at all
times. A large proportion of crime is opportunistic, taking
your eye off your briefcase or smart device could result in a
serious loss of data.
4. Hacking
Gaining access to IT systemsfrom outside an
organization still offers rich pickings for criminals.
Traditionally they have attemptedto gain access to bank
account information or credit card databases. However,
intellectual property is another source of value. The use
of social engineering, tricking staff into revealing user
names and passwords, remains a threat.
• The primary methods to protect yourself from hacking
are network firewalls, data access security, procedures
for providing and removing access, and user awareness
and training.
5. Insider
threat
5. Insider threat If your organization employs staff (full time
or as contractors), there is a possibility they could leak data
by mistake or maliciously. The potential damage from a leak
of documents cannot be underestimated. Use these tips to
mitigate the size of any data leak.
• Educate your team to be alert to issues and minimize
careless mistakes.
• Limit how much data staff has access to. The principle of
‘least privilege access’ should apply to all IT systems. Only
provide staff with the minimum access they need to do their
roles.
• Control the use of portable storage devices, such as USB
memory keys, portable hard drives and media players.
• Consider using applications in certain situations to monitor
staff behavior − who copies what.
Please
remember
In all these areas it is key to remember that alongside
technology, well-developed processes, procedures and
staff training go a long way to protecting your valuable
data. For example, if someone leaves your employment,
make sure you remove their access. The reality today is
that you should protect your digital assets with the
same vigilance as you do when locking your office door
at the end of the day.
Thank You!
- anir0y
Email : mail@anir0y.live

Contenu connexe

Tendances

Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesMaxime ALAY-EDDINE
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 

Tendances (20)

Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Introduction to Software Security and Best Practices
Introduction to Software Security and Best PracticesIntroduction to Software Security and Best Practices
Introduction to Software Security and Best Practices
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Network security
Network securityNetwork security
Network security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 

Similaire à 1. introduction to cyber security

Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptxjondon17
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!Caroline Johnson
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAbdullahKanash
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityNcell
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfV2Infotech1
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxV2Infotech1
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptxMBRoman1
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfSecureCurve
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksHokme
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfVarinder K
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breachincmagazineseo
 

Similaire à 1. introduction to cyber security (20)

Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!7 Practices To Safeguard Your Business From Security Breaches!
7 Practices To Safeguard Your Business From Security Breaches!
 
Awareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdfAwareness Security Session 2023 v1.0.pptx.pdf
Awareness Security Session 2023 v1.0.pptx.pdf
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdfHow to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pdf
 
How to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptxHow to Secure Data Privacy in 2024.pptx
How to Secure Data Privacy in 2024.pptx
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdfWhat Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
What Is Digital Asset Security. What Are the Risks Associated With It.docx.pdf
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Securing Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP LeaksSecuring Your Intellectual Property: Preventing Business IP Leaks
Securing Your Intellectual Property: Preventing Business IP Leaks
 
Free Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdfFree Guide-to-cybersecurity-fundamentals.pdf
Free Guide-to-cybersecurity-fundamentals.pdf
 
Ways to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data BreachWays to Safeguard Your Business from a Data Breach
Ways to Safeguard Your Business from a Data Breach
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Dernier

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Dernier (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

1. introduction to cyber security

  • 3. Some Definitions Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
  • 4. Some Definitions cybersecurity: “information assurance, includingscientific,technical, management,or anyother relevant disciplines required to ensure computer and networksecurity,including,but not limited to,a discipline related to the followingfunctions: (A) Secure System and networkadministrationand operations. (B) Systems security engineering. (C) Informationassurance systems and product acquisition. (D) Cryptography. (E) Threat and vulnerabilityassessment,includingriskmanagement. (F) Web security. (G) Operations ofcomputer emergency response teams. (H) Cybersecuritytraining,education,and management. (I) Computer forensics. (J) Defensiveinformation operations. According to S. 1901 “Cybersecurity Research and Education Act of 2002”:
  • 5. One way to Think about it ❖ availability ❖ Integrity & ❖ secrecy(Confidentiality) of information systems and networks in the face of attacks,accidents and failures with the goal of protecting operations and assets cybersecurity is about
  • 6. THE IMPORTANCE OF CYBER SECURITY Cyber security is important because government, military, corporate, financial, and medical organizations collect, process, and store unprecedented amounts of data on computers and other devices. A significant portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences. Organizations transmitsensitive data across networks and to other devices in the course of doing businesses, and cyber security describes the discipline dedicated to protecting that information and the systems usedto process or store it. As the volume and sophisticationof cyber-attacks grow, companies and organizations, especially those that are tasked with safeguarding information relating to national security, health, or financial records, need to take steps to protect their sensitive business and personnel information. As early as March 2013, the nation’s top intelligence officials cautioned that cyber-attacks and digital spying are the top threat to national security, eclipsing even terrorism.
  • 7. Why carry out a cyber security risk assessment?
  • 8. RISK ASSESSMENT The process of identifying, analyzing and evaluating risk – is the only way to ensure that the cyber security controls you choose are appropriate to the risks your organization faces. Without a risk assessment to inform your cyber security choices, you could waste time, effort and resources – there is, after all, little point implementing measures to defend against events that are unlikely to occur or won’t have much material impact on your organization. Likewise, it's possible that you'll underestimate or overlook risks that could cause significant damage to your organization. This is why so many best-practice frameworks, standards and laws – including the GDPR (General Data Protection Regulation) and DPA (Data Protection Act) 2018 – require them.
  • 9. Top Five Cyber Risks When setting up your new business, you are likely to rely on a variety of IT, such as smart devices, PCs and cloud-based systems. You could be holding customer data, employee information and possibly detailed product designs. These are likely to be of interest to cyber criminals – no matter how small your business. An awareness and basic understanding of the threats posed in a cyber- world will help protect your digital assets, intellectual property and your business.
  • 10. 1. Ransomware 2. phishing 3. Data Leakage 4. Hacking 5. Insider threat Cyber Risk : TOP 5
  • 11. 1. Ransomware This is a form of malware (malicious software) that attemptsto encrypt (scramble) your data and then extort a ransom to release an unlock code. Most ransomware is delivered via malicious emails. Follow these key steps to protect your company. • Staff awareness: staff should be wary of unsolicited emails, particularly those that ask for a prompt response. • Malware protection: install and maintain good anti- virus and malware protection software. • Software updates: keep your applications up to date. • Data backups:a series of well managed data backups will allow you to recover from an unencrypted version of a file. Make sure you regularly test your backups.
  • 12. 2. Phishing Phishing is an attemptto gain sensitive information while posing as a trustworthy contact, for example a bank or online service. Spear phishing is a highly targeted attemptto gain information from an individual. Phishing emails maylook completely convincing, often with faultless wording and genuine logos. There is a form of spear phishing, where a fake email from a CEO applies pressure on a CFO into making an urgent payment, this has become known as Whaling. It is worth considering ways to add additional safeguards to protect the identity of CEOs and CFOs to prevent impersonation. Here are a few steps you can use to protect yourself. • Keep in mind that companies simply do not ask for sensitive information. • Be suspicious of unexpected emails. • Make use of anti-malware software. • Make sure you have spam filters turned on. Check them regularly in case they have accidentally trapped an innocent email.
  • 13. 3. Data leakage While cyber security in the office may seem challenging, it is essential to understand that security extends well beyond the office these days. The use of smart phones and tablets has become widespread. The ubiquitous and cheap nature of portable storage devices makes them a useful tool for the backup and transportation of data. Those features mean they are also a target for data thieves. The following pointers provide useful first steps to prevent data leaking from your organization. • Ensure mobile devices have passcode locks. • Turn on the tracking by GPS and the option to remotely wipe the device if it is lost. • The use of encryption software is highly recommended when using portable storage devices. • Keep an eye on your mobile devices and paperwork at all times. A large proportion of crime is opportunistic, taking your eye off your briefcase or smart device could result in a serious loss of data.
  • 14. 4. Hacking Gaining access to IT systemsfrom outside an organization still offers rich pickings for criminals. Traditionally they have attemptedto gain access to bank account information or credit card databases. However, intellectual property is another source of value. The use of social engineering, tricking staff into revealing user names and passwords, remains a threat. • The primary methods to protect yourself from hacking are network firewalls, data access security, procedures for providing and removing access, and user awareness and training.
  • 15. 5. Insider threat 5. Insider threat If your organization employs staff (full time or as contractors), there is a possibility they could leak data by mistake or maliciously. The potential damage from a leak of documents cannot be underestimated. Use these tips to mitigate the size of any data leak. • Educate your team to be alert to issues and minimize careless mistakes. • Limit how much data staff has access to. The principle of ‘least privilege access’ should apply to all IT systems. Only provide staff with the minimum access they need to do their roles. • Control the use of portable storage devices, such as USB memory keys, portable hard drives and media players. • Consider using applications in certain situations to monitor staff behavior − who copies what.
  • 16. Please remember In all these areas it is key to remember that alongside technology, well-developed processes, procedures and staff training go a long way to protecting your valuable data. For example, if someone leaves your employment, make sure you remove their access. The reality today is that you should protect your digital assets with the same vigilance as you do when locking your office door at the end of the day.
  • 17. Thank You! - anir0y Email : mail@anir0y.live