This is a basic presentation about cybersecurity to share awareness about various security threats and how you can protect yourself from them. In the preview window the formatting is off, but when downloaded it can be viewed with no problems. This is for my Info Security Policy Management class at Governors State University.
2. WHAT IS CYBERSECURITY?
• It is the practice of shielding any networks, systems, servers, etc. from
any form of attack
• This includes threats such as phishing, ransomware, DDoS attacks, etc.
• This field is important because without it could cause devastating
damage to our data and infrastructure
3. TYPES OF THREATS
There are many different types of digital attacks. They include:
Ransomware Phishing DDoS Social Engineering
4. RANSOMWARE
• It is a form of malware that encrypts the victim’s files on their
system
• This means you cannot access or modify them
• In order to get files back, you must pay the attacker
• Otherwise you would risk losing access to your files forever
• Companies and organizations are most at risk
• However anyone can be a target for ransomware
5. PHISHING
• It is when a target or targets get coerced into giving personal
information
• Some of this personal information includes social security
numbers, passwords, etc.
• This can be done over the phone, by email, text message, or
social media
• This information can be used by the attacker to commit identity
theft or other crimes such as stealing funds
6. DDOS ATTACKS
• DDoS is an acronym for Distributed Denial of Service
• It is a malicious attempt to disrupt normal traffic of a server
that is targeted
• This could result in servers being clogged with traffic
• It would slow down speeds or “crash” the server(s) altogether
• This is a costly form of attack, that could cost a
company/organization millions (if not billions) of dollars if not
resolved quickly
7. DDOS ATTACK FROM A HIGH-LEVEL VIEW
Just think of server traffic like highway traffic like the picture shown above. If there is
DDoS attack, the flow of traffic gets greatly reduced or stopped altogether, causing a
traffic jam.
Source: Cloudfare
8. SOCIAL ENGINEERING
• This is when an attacker manipulates a target or targets into giving
up their personal information
• Some of this information includes banking information, social
security numbers, and passwords
• They can even convince a target to install malicious software on their
device
• These attackers can pose as someone they are not to ensure they are
trusted
• They can pose as a boss/coworker, a gov’t official, a charity
representative, etc.
9. WAYS YOU CAN PROTECT AGAINST THESE
THREATS
• Use a strong password with a combination of uppercase and lowercase
letters, numbers, and characters
• Do NOT use the same password for all your accounts
• Use two-step verification for accounts that support them for a better
measure of security
• Always double-check your emails and look for close details (e.g. grammar
and spelling) to make sure it is legitimate
• With a shady call on the phone, ask for their supervisor or their employee ID
number to make sure it is legitimate (if they hang up or refuse that means it
is likely a scam)
• Install antivirus software on your computer to help protect you against
viruses and malware
• Always try and go to reputable websites
10. REFERENCES
• Fruhlinger, J. (2018, December 19). Ransomware explained: How it works and
how to remove it. Retrieved March 28, 2020, from
https://www.csoonline.com/article/3236183/what-is-ransomware-how-it-
works-and-how-to-remove-it.html
• What is a Distributed Denial-of-Service (DDoS) Attack? (2020). Retrieved April
2, 2020, from https://www.cloudflare.com/learning/ddos/what-is-a-ddos-
attack/
• What Is Cybersecurity? (2020, April 2). Retrieved March 24, 2020, from
https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
• What Is Phishing? (2020). Retrieved March 29, 2020, from
https://www.phishing.org/what-is-phishing
• What is Social Engineering? Examples and Prevention Tips. (2020). Retrieved
April 2, 2020, from https://www.webroot.com/us/en/resources/tips-