1. We’re all going to have to change how we think about data
--- Elizabeth Denham
-By PARAB MISHRA
2. 2 2
Why are we talking about Cybersecurity ?
Computers of a US Department of Defense division are
installed with a ‘backdoor’ on its servers
Yahoo!, Amazon, Buy.com, CNN.com, eBay, E*Trade,
ZDNet websites hit with massive DoS attack
‘WannaCry’ ransomware attack, which encrypts data and
demands ransom in the Bitcoin
Facebook’s (about) 540 million records were published
on Amazon's cloud computing service
3. 3 3
What is going on now-a-days?
Internet is highly, globally connected
Viruses/worms are in abundance on Internet and continuously
scanning for vulnerable hosts
4. 4 4
• Cybersecurity is the protection of systems, networks, applications and
programs from cyber attacks.
• These Cyber-attacks tend to access, change or even destroy sensitive
information to the extent of extorting money from users or causally interrupt a
normal business process.
In a very simple manner –
Cybersecurity = security of
5. 5 5
Who Breaches into security ?
• Non-malicious hackers who
attempt to break into a
company’s or organization’s
systems at their request.
• Hackers without any affiliation to a
company that attempts to break into
a company’s network but risks the
law by doing so.
• Malicious hackers who break
into computer systems and
networks without authorization
who uses his
Hackers who are
driven by a cause like
political agendas or
7. 7 7
How to ensure your security ?
Be careful when going to any website by clicking on the link included in E-mail or SMS.
Enter Your Sensitive Data (like Login credentials, Bank details, Personal details etc.
) in Secure Websites Only.
Immediately respond to any unusual activity.
SNIFFING / SPOOFING
Always use ‘https’ website URL instead of ‘http’.
Always see padlock sign in URL bar of browsing while visiting any website.
Connect to trusted networks (Wi-Fi)
Encrypt all data traffic that you send on network.
8. 8 8
Use good Anti-malware (Antivirus software)
Do not install application from untrusted publisher.
Download software from official website.
Configure a strong firewall.
Use Ad-blocker while surfing the web.
Never miss any update of your Operating System
and Antivirus software.
TYPES OF MALWARE
9. 9 9
Make alpha-numeric-symbolic password phrase.
Do not keep same passwords.
8-character string password can be hacked in less than 2.5 hours.
It is impossible to crack 25-character string password.
Man In The Middle & Denial Of Service ATTACK
This can be prevented by using a strong firewall.
By using IPS & IDS.
By increasing your bandwidth size.
10. 10 10
_ _ _ _ _ _ _ _ _ _ _
/ / / / / / / / / / /
( P | A | R | A | B ) ( M | I | S | H | R | A )
_/ _/ _/ _/ _/ _/ _/ _/ _/ _/ _/