3. Detecting and Mitigating threats and attacks means:
Threat detection is the practice of analyzing the entirety of a security ecosystem
to identify any malicious activity that could compromise the network. If a threat is
detected, then mitigation efforts must be enacted to properly neutralize the
threat before it can exploit any present vulnerabilities.
3
4. THREATS:
A cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt
digital life in general.
TYPES OF THREATS
Ransomware
Phishing
Data Leakage
Insider Threat
4
5. RANSOMWARE:
Ransomware is a malicious software that infects your
computer and display messages demanding a fee to be
paid in order for your system to work again.
This class of malware is a moneymaking scheme that
can be installed through links in a e-mail messages.
PHISHING:
Phishing is the fraudulent attempt to obtain sensitive information or data,
such as usernames, passwords and credit card details,
by disguising oneself as a trustworthy entity in an
electronic communication.
5
6. DATA LEAKAGE:
Data leakage threats usually occur via the web and email,
but can also occur via mobile data storage devices such
as optical media, USB keys, and laptops.
INSIDER THREAT:
An insider threat is a security risk that originates from within the targeted organization.
It typically involves a current or former employee or
business associate who has access to sensitive information
or privileged accounts within the network of an organization,
and who misuses this access
6
7. ATTACKS:
A cyber attack can maliciously disable computers, steal data, or use a breached computer
as a launch point for other attacks.
TYPES OF ATTACKS
Password Attack
Malware Attack
7
8. PASSWORD ATTACK:
A password attack is exactly what it sounds like: a third party trying to gain access to your
systems by cracking a user's password.
HOW DO HACKERS KNOW YOUR PASSWORD ?
Your passwords are stored in secure systems by using some
special algorithms known as "hashing."
Hackers try to access these passwords using different techniques,
the most popular one is called a "Dictionary attack,“
where the computer tries over and over again.
8
9. MALWARE:
Malware is intrusive software that is designed to damage and destroy computers and computer
systems. Malware is a contraction for “malicious software.”
TYPES OF MALWARE
VIRUSES
BOTS&BOTNETS
How does Malware Occurs?
Malware infection occurs when malware, or malicious
software,infiltrates your computer.stealing private information
or spying on a computer without the consent of the user.
9
10. DETECTING THEREATS AND ATTACKS:
WHAT IS THREAT DETECTION ?
Threat detection is the process by which you find threats on your network, your systems
or your applications. The idea is to detect threats before they are exploited as attacks.
HOW TO DETECT THREATS?
DETECTION TECHONOLOGIES
Intrusion detection systems
Network firewalls
Honeypots
10
11. Intrusion detection
systems: An appliance or service that monitors network traffic for malicious activity.
Pros: Good for detecting threats introduced via the network itself.
Cons: Limited in scope and will not detect endpoint or cloud threats. Requires an
intrusion prevention system (IPS) to block threats.
NETWORK FIREWALLS:
A physical or virtual appliance that monitors traffic for malicious activity or access and
takes appropriate action.
Pros: Good for detecting and blocking threats via the network itself.
Cons: Limited in scope and will not detect endpoint or cloud threats.
11
12. HONEYPOTS:
A network-attached system set up as a decoy to expose threats against an
organization.
Pros: Advanced visibility of threats against applications or resources.
Cons: Limited in scope the specific honeypots that are deployed. If
discovered by an attacker, honeypots can be circumvented.
MITIGATING CYBER THREATS:
Keep Software Up-to-Date
Install Anti-Virus Protection Software
Back Up Critical Data
Implement Multi-Factor Authentication
12