SlideShare une entreprise Scribd logo
1  sur  13
DETECTING AND MITIGATING CYBER THREATS AND ATTACKS
NAME: N Dhruva Theja
Roll No:321710301040
SUMMER INTERNSHIP
1
CONTENTS:
I. INTRODUCTION
II. THREATS
III. TYPES OF THREATS
IV. ATTACKS
V. TYPES OF ATTACKS
VI. DETCTION TECHONOLOGIES
VII. MITIGATING THREATS AND ATTACKS
2
Detecting and Mitigating threats and attacks means:
 Threat detection is the practice of analyzing the entirety of a security ecosystem
to identify any malicious activity that could compromise the network. If a threat is
detected, then mitigation efforts must be enacted to properly neutralize the
threat before it can exploit any present vulnerabilities.
3
THREATS:
 A cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt
digital life in general.
 TYPES OF THREATS
 Ransomware
 Phishing
 Data Leakage
 Insider Threat
4
RANSOMWARE:
 Ransomware is a malicious software that infects your
computer and display messages demanding a fee to be
paid in order for your system to work again.
 This class of malware is a moneymaking scheme that
can be installed through links in a e-mail messages.
PHISHING:
Phishing is the fraudulent attempt to obtain sensitive information or data,
such as usernames, passwords and credit card details,
by disguising oneself as a trustworthy entity in an
electronic communication.
5
DATA LEAKAGE:
 Data leakage threats usually occur via the web and email,
but can also occur via mobile data storage devices such
as optical media, USB keys, and laptops.
INSIDER THREAT:
An insider threat is a security risk that originates from within the targeted organization.
It typically involves a current or former employee or
business associate who has access to sensitive information
or privileged accounts within the network of an organization,
and who misuses this access
6
ATTACKS:
 A cyber attack can maliciously disable computers, steal data, or use a breached computer
as a launch point for other attacks.
 TYPES OF ATTACKS
 Password Attack
 Malware Attack
7
PASSWORD ATTACK:
 A password attack is exactly what it sounds like: a third party trying to gain access to your
systems by cracking a user's password.
 HOW DO HACKERS KNOW YOUR PASSWORD ?
 Your passwords are stored in secure systems by using some
 special algorithms known as "hashing."
 Hackers try to access these passwords using different techniques,
the most popular one is called a "Dictionary attack,“
where the computer tries over and over again.
8
MALWARE:
 Malware is intrusive software that is designed to damage and destroy computers and computer
systems. Malware is a contraction for “malicious software.”
 TYPES OF MALWARE
 VIRUSES
 BOTS&BOTNETS
How does Malware Occurs?
 Malware infection occurs when malware, or malicious
software,infiltrates your computer.stealing private information
or spying on a computer without the consent of the user.
9
DETECTING THEREATS AND ATTACKS:
 WHAT IS THREAT DETECTION ?
 Threat detection is the process by which you find threats on your network, your systems
or your applications. The idea is to detect threats before they are exploited as attacks.
 HOW TO DETECT THREATS?
 DETECTION TECHONOLOGIES
Intrusion detection systems
 Network firewalls
 Honeypots
10
Intrusion detection
systems: An appliance or service that monitors network traffic for malicious activity.
 Pros: Good for detecting threats introduced via the network itself.
 Cons: Limited in scope and will not detect endpoint or cloud threats. Requires an
intrusion prevention system (IPS) to block threats.
 NETWORK FIREWALLS:
 A physical or virtual appliance that monitors traffic for malicious activity or access and
takes appropriate action.
 Pros: Good for detecting and blocking threats via the network itself.
 Cons: Limited in scope and will not detect endpoint or cloud threats.
11
HONEYPOTS:
 A network-attached system set up as a decoy to expose threats against an
organization.
 Pros: Advanced visibility of threats against applications or resources.
 Cons: Limited in scope the specific honeypots that are deployed. If
discovered by an attacker, honeypots can be circumvented.
MITIGATING CYBER THREATS:
 Keep Software Up-to-Date
Install Anti-Virus Protection Software
Back Up Critical Data
Implement Multi-Factor Authentication
12
THANK
YOU!!
13

Contenu connexe

Tendances

What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?AariyaRathi
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Securitypadmeshagrekar
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomwareOsirium Limited
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?EC-Council
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Break the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent ThreatsBreak the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent ThreatsInspirisys Solutions Limited
 

Tendances (19)

What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Portfolio 7
Portfolio 7Portfolio 7
Portfolio 7
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Computer security
Computer securityComputer security
Computer security
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomware
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Windows network security
Windows network securityWindows network security
Windows network security
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
Spyware
SpywareSpyware
Spyware
 
Malware
MalwareMalware
Malware
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Break the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent ThreatsBreak the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent Threats
 
Online safety
Online safety Online safety
Online safety
 

Similaire à Detecting and mitigating cyber threats and attacks1

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Debabrata Singh
 

Similaire à Detecting and mitigating cyber threats and attacks1 (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Malware
MalwareMalware
Malware
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber security
Cyber security Cyber security
Cyber security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Computer security
Computer securityComputer security
Computer security
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 

Dernier

Protection of Children in context of IHL and Counter Terrorism
Protection of Children in context of IHL and  Counter TerrorismProtection of Children in context of IHL and  Counter Terrorism
Protection of Children in context of IHL and Counter TerrorismNilendra Kumar
 
Ch. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfCh. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfJamalYaseenJameelOde
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一A SSS
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一2s3dgmej
 
AICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteAICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteshivubhavv
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfaae4149584
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 
美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作ss846v0c
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证nhjeo1gg
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证diploma001
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一z xss
 
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一diploma 1
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...RegineManuel2
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
MIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewMIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewSheldon Byron
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Riya Pathan
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书saphesg8
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptShafqatShakeel1
 

Dernier (20)

Protection of Children in context of IHL and Counter Terrorism
Protection of Children in context of IHL and  Counter TerrorismProtection of Children in context of IHL and  Counter Terrorism
Protection of Children in context of IHL and Counter Terrorism
 
Ch. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdfCh. 9- __Skin, hair and nail Assessment (1).pdf
Ch. 9- __Skin, hair and nail Assessment (1).pdf
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
 
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
定制(NYIT毕业证书)美国纽约理工学院毕业证成绩单原版一比一
 
AICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr peteAICTE PPT slide of Engineering college kr pete
AICTE PPT slide of Engineering college kr pete
 
ME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdfME 205- Chapter 6 - Pure Bending of Beams.pdf
ME 205- Chapter 6 - Pure Bending of Beams.pdf
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 
美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作美国SU学位证,雪城大学毕业证书1:1制作
美国SU学位证,雪城大学毕业证书1:1制作
 
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
原版快速办理MQU毕业证麦考瑞大学毕业证成绩单留信学历认证
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
 
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
办理(Salford毕业证书)索尔福德大学毕业证成绩单原版一比一
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
MIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx reviewMIdterm Review International Trade.pptx review
MIdterm Review International Trade.pptx review
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.ppt
 

Detecting and mitigating cyber threats and attacks1

  • 1. DETECTING AND MITIGATING CYBER THREATS AND ATTACKS NAME: N Dhruva Theja Roll No:321710301040 SUMMER INTERNSHIP 1
  • 2. CONTENTS: I. INTRODUCTION II. THREATS III. TYPES OF THREATS IV. ATTACKS V. TYPES OF ATTACKS VI. DETCTION TECHONOLOGIES VII. MITIGATING THREATS AND ATTACKS 2
  • 3. Detecting and Mitigating threats and attacks means:  Threat detection is the practice of analyzing the entirety of a security ecosystem to identify any malicious activity that could compromise the network. If a threat is detected, then mitigation efforts must be enacted to properly neutralize the threat before it can exploit any present vulnerabilities. 3
  • 4. THREATS:  A cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general.  TYPES OF THREATS  Ransomware  Phishing  Data Leakage  Insider Threat 4
  • 5. RANSOMWARE:  Ransomware is a malicious software that infects your computer and display messages demanding a fee to be paid in order for your system to work again.  This class of malware is a moneymaking scheme that can be installed through links in a e-mail messages. PHISHING: Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. 5
  • 6. DATA LEAKAGE:  Data leakage threats usually occur via the web and email, but can also occur via mobile data storage devices such as optical media, USB keys, and laptops. INSIDER THREAT: An insider threat is a security risk that originates from within the targeted organization. It typically involves a current or former employee or business associate who has access to sensitive information or privileged accounts within the network of an organization, and who misuses this access 6
  • 7. ATTACKS:  A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.  TYPES OF ATTACKS  Password Attack  Malware Attack 7
  • 8. PASSWORD ATTACK:  A password attack is exactly what it sounds like: a third party trying to gain access to your systems by cracking a user's password.  HOW DO HACKERS KNOW YOUR PASSWORD ?  Your passwords are stored in secure systems by using some  special algorithms known as "hashing."  Hackers try to access these passwords using different techniques, the most popular one is called a "Dictionary attack,“ where the computer tries over and over again. 8
  • 9. MALWARE:  Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.”  TYPES OF MALWARE  VIRUSES  BOTS&BOTNETS How does Malware Occurs?  Malware infection occurs when malware, or malicious software,infiltrates your computer.stealing private information or spying on a computer without the consent of the user. 9
  • 10. DETECTING THEREATS AND ATTACKS:  WHAT IS THREAT DETECTION ?  Threat detection is the process by which you find threats on your network, your systems or your applications. The idea is to detect threats before they are exploited as attacks.  HOW TO DETECT THREATS?  DETECTION TECHONOLOGIES Intrusion detection systems  Network firewalls  Honeypots 10
  • 11. Intrusion detection systems: An appliance or service that monitors network traffic for malicious activity.  Pros: Good for detecting threats introduced via the network itself.  Cons: Limited in scope and will not detect endpoint or cloud threats. Requires an intrusion prevention system (IPS) to block threats.  NETWORK FIREWALLS:  A physical or virtual appliance that monitors traffic for malicious activity or access and takes appropriate action.  Pros: Good for detecting and blocking threats via the network itself.  Cons: Limited in scope and will not detect endpoint or cloud threats. 11
  • 12. HONEYPOTS:  A network-attached system set up as a decoy to expose threats against an organization.  Pros: Advanced visibility of threats against applications or resources.  Cons: Limited in scope the specific honeypots that are deployed. If discovered by an attacker, honeypots can be circumvented. MITIGATING CYBER THREATS:  Keep Software Up-to-Date Install Anti-Virus Protection Software Back Up Critical Data Implement Multi-Factor Authentication 12