SECURE YOUR SYSTEMS AND DATA AGAINST ONLINE THREATS!
There are various threats in the world wide web, to your data and IT systems.
Cybersecurity deals with these dangers and risks of information and communication technology. It is enormously important for businesses and private citizens to protext sensitive information. All data that falls into the wrong hands, can be used in criminal activities.
To prevent this, an effective cybersecurity is needed:
http://www.presentationload.com/cybersecurity-powerpoint-template.html
Stay One Step Ahead of Hackers, Viruses and Bots
In a world of rapidly evolving technical advancements, cybersecurity must be continuously revised. Our PowerPoint presentation contains charts and graphics that provide an overview of cybersecurity. Visualize details of countless types of cybercrime and use our charts to become familiar with successful security concepts and strategies.
3. DEFINITION
Cybersecurity
Cybersecurity secures the connection of physical units (e.g.
equipment and control units) to external, virtual space, like the
Internet. This includes data generation, transmission, storage and
analysis on physical and non-physical interfaces.
German Electrical and Electronic Manufacturers’ Association, 2014
5. NETWORK
Safety Aspects of Industry 4.0
INDUSTRY
4.0
Know-how &
Confidentiality
Hedging
Production
Losses
Product
Liability
Product
Monitoring
Obligations
Privacy by
Design
IT Security
6. NETWORK
Market Place
Today, trade and service
industries have to present
themselves on the Internet
and offer their services.
Buyers have to give them
sensitive, personal
information, which can lead
to a data breach.
Example:
Shops
Amazon, Zalando, Alibaba,
Lesara, Conleys etc.
Travel
Expedia, TUI, WEG.de,
Travel24 etc.
7. NETWORK
Policy: E-Government Use (in %) of Individuals Across Countries (2015 Survey)
0 10 20 30 40 50 60 70
Interaction with state agencies
Accessing information on public websites
Downloading official forms
Submitting completed forms
Spain
Great Britain
Germany
France
8. THREATS
Threats in Cyberspace
INFORMATION & ABUSE
Targeted government
control and influence of
citizens
Propaganda
Consciously communicating
false information
State espionage
Data breach
Identity theft
Hackers
Internet crimes,
encouraging sedition
Terrorism
9. THREATS
Threat Tree (example: open safe)
Install
malware
Uncover
user
passwords
Divulge
confidential
information
Spam
Other
actionsPhishing
Detect codes by
penetrating the
system
10. THREATS
Evaluation of Cyber Risks
Very
Low
Low
Medium
High
Very
High
PROBABILITY OF OCCURRENCE
EXTENTOFDAMAGE
Unacceptable risk
Acceptable risk
11. FINANCIAL SYSTEMS ENERGY EQUIPMENT AVIATION AUTOMOTIVE INDUSTRY
GOVERNMENT LARGE ENTERPRISES CONSUMER DEVICES INDUSTRIAL EQUIPMENT
THREATS
Vulnerable Systems
12. ATTACKER BOTNETS
CONTROLERS
INFECTED TARGET
Can attacks all IT systems
Can send infected and
dangerous (spam) emails
Networks consisting of
several computers
Can send infected and
dangerous (spam) emails
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
INFECTED
hACKER
hACKER
THREATS
Botnets
14. NEWS
Cyber Threats (2014)
2014: Multiple attacks against
Sony crashed the PS network
and forced Sony to ban “The
Interview“ in cinemas.
Cyber attacks on the
German Bundestag using
Trojan software
19,000 pages of TV5 Monde
were attacked
Cybercriminals used malware
to gain access to credit card
information (56 million
shoppers)
Hackers stole personal data
from 40 million consumers
(credit card, names, phone
numbers, etc.)
The cybercrime statistic of the Bundeskriminalamt (German Federal Criminal Office) was a total of 64,426 incidents in 2014 in Germany
15. SECURITY MEASURES
Standards for
Internet Security
INTERNETSICHERHEIT
KONFIGURATION
INDIVIDUELLE
ANPASSUNGEN
GRUNDARCHITEKTUR
Secure provisioning of
email servers
Securing a server
Secure use of emails
Secure wireless
connections
Secure deployment of web
services
Securing PC clients
Secure use of web services
Secure Internet connection
of local networks
Secure remote access
to local networks
Secure Internet
telephony
16. SECURITY
The Three Lines of Defence Model
Governance Body/ Board/ AuditCommittee
Senior Management
REGULATOR
EXTERNALAUDIT
3. Safety Barrier
Internal Audit
1. Safety Barrier
Internal
Controlling
Measures
Management
Controlling
2. Safety Barrier
Security
Risk Management
Quality
Inspection
Compliance
Finance Controlling
17. SECURITY
Creating an Effective Cybersecurity Program
RESPOND
CYBER
SECURITY
SERVICES
Physical security
proper case
responses
the ongoing
operation
18. Three recommended actions for more security on the Internet:
1. Ignore untrustworthy offers and emails.
2. Periodically update operating systems and browsers on computers.
3. Install current protection programs with continuous updates.
(e.g. antivirus, firewall, intrusion detection systems, honeypots, spam
filtering, encryption software, vulnerability scanner, test programs for
security software, anti-phishing software, anti-spyware)
SECURITY
Cybersecurity for Individuals
Cyber attacks can have dramatic consequences for individuals.
Data can be stolen, operating systems blocked and bank accounts
accessed.
19. CHECKLIST
Cybersecurity Questions for a Business
Do we treat cybersecurity as a business or IT responsibility?
Do our security goals align with business priorities?
Have we identified and protected our most valuable processes and information?
Does our business culture support a secure cyber environment?
Do we focus on security compliance or security capability?
Are we certain our third-party partners are securing our most valuable information?
Do we regularly evaluate the effectiveness of our security?
Do we have a plan for responding to a security breach?
20. Click here to visit www.PresentationLoad.com
DOWNLOAD POWERPOINT SLIDES