SlideShare a Scribd company logo
1 of 20
PREMIUM POWERPOINT SLIDES
Cybersecurity
CYBERSECURITY
POWERPOINT TEMPLATE
DEFINITION
Cybersecurity
Cybersecurity secures the connection of physical units (e.g.
equipment and control units) to external, virtual space, like the
Internet. This includes data generation, transmission, storage and
analysis on physical and non-physical interfaces.
German Electrical and Electronic Manufacturers’ Association, 2014
NETWORK
Cyberspace
INDUSTRIAL
REVOLUTION
SOCIAL
NETWORKS
DATA
STORAGE
MARKET
PLACE
Online
BANKING
E-government
POLICY
I II III IV VIV
NETWORK
Safety Aspects of Industry 4.0
INDUSTRY
4.0
Know-how &
Confidentiality
Hedging
Production
Losses
Product
Liability
Product
Monitoring
Obligations
Privacy by
Design
IT Security
NETWORK
Market Place
Today, trade and service
industries have to present
themselves on the Internet
and offer their services.
Buyers have to give them
sensitive, personal
information, which can lead
to a data breach.
Example:
Shops
Amazon, Zalando, Alibaba,
Lesara, Conleys etc.
Travel
Expedia, TUI, WEG.de,
Travel24 etc.
NETWORK
Policy: E-Government Use (in %) of Individuals Across Countries (2015 Survey)
0 10 20 30 40 50 60 70
Interaction with state agencies
Accessing information on public websites
Downloading official forms
Submitting completed forms
Spain
Great Britain
Germany
France
THREATS
Threats in Cyberspace
INFORMATION & ABUSE
 Targeted government
control and influence of
citizens
 Propaganda
 Consciously communicating
false information
 State espionage
 Data breach
 Identity theft
 Hackers
 Internet crimes,
encouraging sedition
 Terrorism
THREATS
Threat Tree (example: open safe)
Install
malware
Uncover
user
passwords
Divulge
confidential
information
Spam
Other
actionsPhishing
Detect codes by
penetrating the
system
THREATS
Evaluation of Cyber Risks
Very
Low
Low
Medium
High
Very
High
PROBABILITY OF OCCURRENCE
EXTENTOFDAMAGE
Unacceptable risk
Acceptable risk
FINANCIAL SYSTEMS ENERGY EQUIPMENT AVIATION AUTOMOTIVE INDUSTRY
GOVERNMENT LARGE ENTERPRISES CONSUMER DEVICES INDUSTRIAL EQUIPMENT
THREATS
Vulnerable Systems
ATTACKER BOTNETS
CONTROLERS
INFECTED TARGET
Can attacks all IT systems
Can send infected and
dangerous (spam) emails
Networks consisting of
several computers
Can send infected and
dangerous (spam) emails
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
hACKER
hACKER
THREATS
Botnets
NEWS
Domino Effect on Security Incidents
Dominoeffect on security incidents
NEWS
Cyber Threats (2014)
2014: Multiple attacks against
Sony crashed the PS network
and forced Sony to ban “The
Interview“ in cinemas.
Cyber attacks on the
German Bundestag using
Trojan software
19,000 pages of TV5 Monde
were attacked
Cybercriminals used malware
to gain access to credit card
information (56 million
shoppers)
Hackers stole personal data
from 40 million consumers
(credit card, names, phone
numbers, etc.)
The cybercrime statistic of the Bundeskriminalamt (German Federal Criminal Office) was a total of 64,426 incidents in 2014 in Germany
SECURITY MEASURES
Standards for
Internet Security
INTERNETSICHERHEIT
KONFIGURATION
INDIVIDUELLE
ANPASSUNGEN
GRUNDARCHITEKTUR
Secure provisioning of
email servers
Securing a server
Secure use of emails
Secure wireless
connections
Secure deployment of web
services
Securing PC clients
Secure use of web services
Secure Internet connection
of local networks
Secure remote access
to local networks
Secure Internet
telephony
SECURITY
The Three Lines of Defence Model
Governance Body/ Board/ AuditCommittee
Senior Management
REGULATOR
EXTERNALAUDIT
3. Safety Barrier
Internal Audit
1. Safety Barrier
Internal
Controlling
Measures
Management
Controlling
2. Safety Barrier
Security
Risk Management
Quality
Inspection
Compliance
Finance Controlling
SECURITY
Creating an Effective Cybersecurity Program
RESPOND
CYBER
SECURITY
SERVICES
Physical security
proper case
responses
the ongoing
operation
Three recommended actions for more security on the Internet:
1. Ignore untrustworthy offers and emails.
2. Periodically update operating systems and browsers on computers.
3. Install current protection programs with continuous updates.
(e.g. antivirus, firewall, intrusion detection systems, honeypots, spam
filtering, encryption software, vulnerability scanner, test programs for
security software, anti-phishing software, anti-spyware)
SECURITY
Cybersecurity for Individuals
Cyber attacks can have dramatic consequences for individuals.
Data can be stolen, operating systems blocked and bank accounts
accessed.
CHECKLIST
Cybersecurity Questions for a Business
Do we treat cybersecurity as a business or IT responsibility?
Do our security goals align with business priorities?
Have we identified and protected our most valuable processes and information?
Does our business culture support a secure cyber environment?
Do we focus on security compliance or security capability?
Are we certain our third-party partners are securing our most valuable information?
Do we regularly evaluate the effectiveness of our security?
Do we have a plan for responding to a security breach?
Click here to visit www.PresentationLoad.com
DOWNLOAD POWERPOINT SLIDES

More Related Content

Viewers also liked

Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking   Chapter 5 - Physical Information Gathering - Eric VanderburgEthical hacking   Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking Chapter 5 - Physical Information Gathering - Eric VanderburgEric Vanderburg
 
The Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data CenterThe Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data CenterJuniper Networks
 
Design Camp 2009 Tango
Design Camp 2009 TangoDesign Camp 2009 Tango
Design Camp 2009 Tangombutz
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionJuniper Networks
 
Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic Juniper Networks
 
Cisco Icon Library
Cisco Icon LibraryCisco Icon Library
Cisco Icon Libraryfmarches
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanDr David Probert
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingJuniper Networks
 

Viewers also liked (13)

Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking   Chapter 5 - Physical Information Gathering - Eric VanderburgEthical hacking   Chapter 5 - Physical Information Gathering - Eric Vanderburg
Ethical hacking Chapter 5 - Physical Information Gathering - Eric Vanderburg
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Piggybacking
PiggybackingPiggybacking
Piggybacking
 
The Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data CenterThe Case for Disaggregation of Compute in the Data Center
The Case for Disaggregation of Compute in the Data Center
 
Design Camp 2009 Tango
Design Camp 2009 TangoDesign Camp 2009 Tango
Design Camp 2009 Tango
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic Juniper Networks: Converged SuperCore Infographic
Juniper Networks: Converged SuperCore Infographic
 
Packet icons 2 2-06
Packet icons 2 2-06Packet icons 2 2-06
Packet icons 2 2-06
 
Cisco Icon Library
Cisco Icon LibraryCisco Icon Library
Cisco Icon Library
 
National Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action PlanNational Cybersecurity - Roadmap and Action Plan
National Cybersecurity - Roadmap and Action Plan
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
2011 cisco icons 6_8_11
2011 cisco icons 6_8_112011 cisco icons 6_8_11
2011 cisco icons 6_8_11
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 

More from PresentationLoad

PowerPoint-Vorlage "Weltkarte"
PowerPoint-Vorlage "Weltkarte"PowerPoint-Vorlage "Weltkarte"
PowerPoint-Vorlage "Weltkarte"PresentationLoad
 
💬 PowerPoint-Vorlage "Führungsstile und Führungsmodelle" zum Download
💬 PowerPoint-Vorlage "Führungsstile und Führungsmodelle" zum Download💬 PowerPoint-Vorlage "Führungsstile und Führungsmodelle" zum Download
💬 PowerPoint-Vorlage "Führungsstile und Führungsmodelle" zum DownloadPresentationLoad
 
💬 Kostenlose Powerpoint-Vorlage Corona-Virus (Covid 19) zum Download
💬 Kostenlose Powerpoint-Vorlage Corona-Virus (Covid 19) zum Download💬 Kostenlose Powerpoint-Vorlage Corona-Virus (Covid 19) zum Download
💬 Kostenlose Powerpoint-Vorlage Corona-Virus (Covid 19) zum DownloadPresentationLoad
 
💬 Free Powerpoint Template Coronavirus (Covid-19) for Download
💬 Free Powerpoint Template Coronavirus (Covid-19) for Download💬 Free Powerpoint Template Coronavirus (Covid-19) for Download
💬 Free Powerpoint Template Coronavirus (Covid-19) for DownloadPresentationLoad
 
💬 Remote Work. Rethink Presentations. - Strategien, Chancen und Maßnahmen für...
💬 Remote Work. Rethink Presentations. - Strategien, Chancen und Maßnahmen für...💬 Remote Work. Rethink Presentations. - Strategien, Chancen und Maßnahmen für...
💬 Remote Work. Rethink Presentations. - Strategien, Chancen und Maßnahmen für...PresentationLoad
 
💬 Remote Work / Home Office - PowerPoint-Präsentation, PPT-Vorlage - Business...
💬 Remote Work / Home Office - PowerPoint-Präsentation, PPT-Vorlage - Business...💬 Remote Work / Home Office - PowerPoint-Präsentation, PPT-Vorlage - Business...
💬 Remote Work / Home Office - PowerPoint-Präsentation, PPT-Vorlage - Business...PresentationLoad
 
💬 Remote work home office powerpoint presentation template
💬 Remote work home office powerpoint presentation template💬 Remote work home office powerpoint presentation template
💬 Remote work home office powerpoint presentation templatePresentationLoad
 
Behavior-Based Safety PPT Slide Template
Behavior-Based Safety PPT Slide TemplateBehavior-Based Safety PPT Slide Template
Behavior-Based Safety PPT Slide TemplatePresentationLoad
 
Quality Function Deployment PPT Slide Template
Quality Function Deployment PPT Slide TemplateQuality Function Deployment PPT Slide Template
Quality Function Deployment PPT Slide TemplatePresentationLoad
 
5 Tipps für ein erfolgreiches Präsentationsende
5 Tipps für ein erfolgreiches Präsentationsende5 Tipps für ein erfolgreiches Präsentationsende
5 Tipps für ein erfolgreiches PräsentationsendePresentationLoad
 
5 Tips For A Successful Ending To Your Presentation - Slideshow
5 Tips For A Successful Ending To Your Presentation - Slideshow5 Tips For A Successful Ending To Your Presentation - Slideshow
5 Tips For A Successful Ending To Your Presentation - SlideshowPresentationLoad
 
Marketing Controlling PPT Slide Template
Marketing Controlling PPT Slide TemplateMarketing Controlling PPT Slide Template
Marketing Controlling PPT Slide TemplatePresentationLoad
 
Customer Journey Experience Map
Customer Journey Experience MapCustomer Journey Experience Map
Customer Journey Experience MapPresentationLoad
 

More from PresentationLoad (20)

PowerPoint-Vorlage "Weltkarte"
PowerPoint-Vorlage "Weltkarte"PowerPoint-Vorlage "Weltkarte"
PowerPoint-Vorlage "Weltkarte"
 
💬 PowerPoint-Vorlage "Führungsstile und Führungsmodelle" zum Download
💬 PowerPoint-Vorlage "Führungsstile und Führungsmodelle" zum Download💬 PowerPoint-Vorlage "Führungsstile und Führungsmodelle" zum Download
💬 PowerPoint-Vorlage "Führungsstile und Führungsmodelle" zum Download
 
💬 Kostenlose Powerpoint-Vorlage Corona-Virus (Covid 19) zum Download
💬 Kostenlose Powerpoint-Vorlage Corona-Virus (Covid 19) zum Download💬 Kostenlose Powerpoint-Vorlage Corona-Virus (Covid 19) zum Download
💬 Kostenlose Powerpoint-Vorlage Corona-Virus (Covid 19) zum Download
 
💬 Free Powerpoint Template Coronavirus (Covid-19) for Download
💬 Free Powerpoint Template Coronavirus (Covid-19) for Download💬 Free Powerpoint Template Coronavirus (Covid-19) for Download
💬 Free Powerpoint Template Coronavirus (Covid-19) for Download
 
💬 Remote Work. Rethink Presentations. - Strategien, Chancen und Maßnahmen für...
💬 Remote Work. Rethink Presentations. - Strategien, Chancen und Maßnahmen für...💬 Remote Work. Rethink Presentations. - Strategien, Chancen und Maßnahmen für...
💬 Remote Work. Rethink Presentations. - Strategien, Chancen und Maßnahmen für...
 
💬 Remote Work / Home Office - PowerPoint-Präsentation, PPT-Vorlage - Business...
💬 Remote Work / Home Office - PowerPoint-Präsentation, PPT-Vorlage - Business...💬 Remote Work / Home Office - PowerPoint-Präsentation, PPT-Vorlage - Business...
💬 Remote Work / Home Office - PowerPoint-Präsentation, PPT-Vorlage - Business...
 
💬 Remote work home office powerpoint presentation template
💬 Remote work home office powerpoint presentation template💬 Remote work home office powerpoint presentation template
💬 Remote work home office powerpoint presentation template
 
Behavior-Based Safety PPT Slide Template
Behavior-Based Safety PPT Slide TemplateBehavior-Based Safety PPT Slide Template
Behavior-Based Safety PPT Slide Template
 
Quality Function Deployment PPT Slide Template
Quality Function Deployment PPT Slide TemplateQuality Function Deployment PPT Slide Template
Quality Function Deployment PPT Slide Template
 
5 Tipps für ein erfolgreiches Präsentationsende
5 Tipps für ein erfolgreiches Präsentationsende5 Tipps für ein erfolgreiches Präsentationsende
5 Tipps für ein erfolgreiches Präsentationsende
 
5 Tips For A Successful Ending To Your Presentation - Slideshow
5 Tips For A Successful Ending To Your Presentation - Slideshow5 Tips For A Successful Ending To Your Presentation - Slideshow
5 Tips For A Successful Ending To Your Presentation - Slideshow
 
Marketing Controlling PPT Slide Template
Marketing Controlling PPT Slide TemplateMarketing Controlling PPT Slide Template
Marketing Controlling PPT Slide Template
 
Customer & Buyer Personas
Customer & Buyer PersonasCustomer & Buyer Personas
Customer & Buyer Personas
 
Triz
Triz Triz
Triz
 
Data Warehouse
Data WarehouseData Warehouse
Data Warehouse
 
Big Data
Big DataBig Data
Big Data
 
Customer Journey Experience Map
Customer Journey Experience MapCustomer Journey Experience Map
Customer Journey Experience Map
 
Flat design-diagrams
Flat design-diagramsFlat design-diagrams
Flat design-diagrams
 
Puzzle toolbox 2D
Puzzle toolbox 2DPuzzle toolbox 2D
Puzzle toolbox 2D
 
Design-Thinking
Design-ThinkingDesign-Thinking
Design-Thinking
 

Recently uploaded

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 

Recently uploaded (20)

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 

Cybersecurity PPT Slide Template

  • 3. DEFINITION Cybersecurity Cybersecurity secures the connection of physical units (e.g. equipment and control units) to external, virtual space, like the Internet. This includes data generation, transmission, storage and analysis on physical and non-physical interfaces. German Electrical and Electronic Manufacturers’ Association, 2014
  • 5. NETWORK Safety Aspects of Industry 4.0 INDUSTRY 4.0 Know-how & Confidentiality Hedging Production Losses Product Liability Product Monitoring Obligations Privacy by Design IT Security
  • 6. NETWORK Market Place Today, trade and service industries have to present themselves on the Internet and offer their services. Buyers have to give them sensitive, personal information, which can lead to a data breach. Example: Shops Amazon, Zalando, Alibaba, Lesara, Conleys etc. Travel Expedia, TUI, WEG.de, Travel24 etc.
  • 7. NETWORK Policy: E-Government Use (in %) of Individuals Across Countries (2015 Survey) 0 10 20 30 40 50 60 70 Interaction with state agencies Accessing information on public websites Downloading official forms Submitting completed forms Spain Great Britain Germany France
  • 8. THREATS Threats in Cyberspace INFORMATION & ABUSE  Targeted government control and influence of citizens  Propaganda  Consciously communicating false information  State espionage  Data breach  Identity theft  Hackers  Internet crimes, encouraging sedition  Terrorism
  • 9. THREATS Threat Tree (example: open safe) Install malware Uncover user passwords Divulge confidential information Spam Other actionsPhishing Detect codes by penetrating the system
  • 10. THREATS Evaluation of Cyber Risks Very Low Low Medium High Very High PROBABILITY OF OCCURRENCE EXTENTOFDAMAGE Unacceptable risk Acceptable risk
  • 11. FINANCIAL SYSTEMS ENERGY EQUIPMENT AVIATION AUTOMOTIVE INDUSTRY GOVERNMENT LARGE ENTERPRISES CONSUMER DEVICES INDUSTRIAL EQUIPMENT THREATS Vulnerable Systems
  • 12. ATTACKER BOTNETS CONTROLERS INFECTED TARGET Can attacks all IT systems Can send infected and dangerous (spam) emails Networks consisting of several computers Can send infected and dangerous (spam) emails INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED hACKER hACKER THREATS Botnets
  • 13. NEWS Domino Effect on Security Incidents Dominoeffect on security incidents
  • 14. NEWS Cyber Threats (2014) 2014: Multiple attacks against Sony crashed the PS network and forced Sony to ban “The Interview“ in cinemas. Cyber attacks on the German Bundestag using Trojan software 19,000 pages of TV5 Monde were attacked Cybercriminals used malware to gain access to credit card information (56 million shoppers) Hackers stole personal data from 40 million consumers (credit card, names, phone numbers, etc.) The cybercrime statistic of the Bundeskriminalamt (German Federal Criminal Office) was a total of 64,426 incidents in 2014 in Germany
  • 15. SECURITY MEASURES Standards for Internet Security INTERNETSICHERHEIT KONFIGURATION INDIVIDUELLE ANPASSUNGEN GRUNDARCHITEKTUR Secure provisioning of email servers Securing a server Secure use of emails Secure wireless connections Secure deployment of web services Securing PC clients Secure use of web services Secure Internet connection of local networks Secure remote access to local networks Secure Internet telephony
  • 16. SECURITY The Three Lines of Defence Model Governance Body/ Board/ AuditCommittee Senior Management REGULATOR EXTERNALAUDIT 3. Safety Barrier Internal Audit 1. Safety Barrier Internal Controlling Measures Management Controlling 2. Safety Barrier Security Risk Management Quality Inspection Compliance Finance Controlling
  • 17. SECURITY Creating an Effective Cybersecurity Program RESPOND CYBER SECURITY SERVICES Physical security proper case responses the ongoing operation
  • 18. Three recommended actions for more security on the Internet: 1. Ignore untrustworthy offers and emails. 2. Periodically update operating systems and browsers on computers. 3. Install current protection programs with continuous updates. (e.g. antivirus, firewall, intrusion detection systems, honeypots, spam filtering, encryption software, vulnerability scanner, test programs for security software, anti-phishing software, anti-spyware) SECURITY Cybersecurity for Individuals Cyber attacks can have dramatic consequences for individuals. Data can be stolen, operating systems blocked and bank accounts accessed.
  • 19. CHECKLIST Cybersecurity Questions for a Business Do we treat cybersecurity as a business or IT responsibility? Do our security goals align with business priorities? Have we identified and protected our most valuable processes and information? Does our business culture support a secure cyber environment? Do we focus on security compliance or security capability? Are we certain our third-party partners are securing our most valuable information? Do we regularly evaluate the effectiveness of our security? Do we have a plan for responding to a security breach?
  • 20. Click here to visit www.PresentationLoad.com DOWNLOAD POWERPOINT SLIDES