SlideShare a Scribd company logo
1 of 22
INTRODUCTION
Cybersecurity refers to a set of techniques used to
protect the integrity of networks, programs and data
from attack, damage or unauthorized access.
Three main aspects we are trying to control,
namely:
Unauthorized Access
Unauthorized Deletion
Unauthorized Modification
The CIA triad- is also commonly referred to as the
three pillars of security and most of the security
policies of an organization are built on these three
principles.
1. Confidentiality- the protection of personal
information.
2.Integrity- refers to methods of ensuring that data is
real, accurate and safeguarded from unauthorized
user modification.
3.Availability- refers to the ability of a user to
access information or resources in a specified
location and in the correct format.
HISTORY
Cybersecurity began in the 1970s when researcher Bob Thomas created
a computer programme called Creeper that could move across
ARPANET’s network.
1970- a number of security measures were developed, including
encryption algorithms, firewalls, and access control systems. The
development of the internet in the 1990s led to the creation of new
security protocols, such as the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS), which are used to secure online
communications and transactions.
early 2000's- a number of high-profile cyberattacks, such as the Code
Red and Nimda worms, highlighted the growing threat of cybercrime.
HISTORY
Cybersecurity has been developed and advanced by a range of
individuals and organizations over time. It is difficult to attribute the
development of cybersecurity to any one person or group, as it has
evolved as a response to the changing threat landscape and the growth of
computer networks.
OTHER CONTRIBUTORS:
-Whitfield Diffie
-Martin Hellman
-Robert moris
HISTORY
Where did cybersecurity begin?
Cyber magazine takes a look at the history of cybersecurity from inception
to the present day.
Cybersecurity is becoming increasingly significant due to the increased
reliance on computer systems, the Internet and wireless network standards
such as Bluetooth and Wi-Fi, and due to the growth of smart devices and
the various devices that constitute the ‘Internet of things’.
1970s: ARAPNET and the Creeper
Cybersecurity began in the 1970s when researcher Bob Thomas created a computer
programme called Creeper that could move across ARPANET’s network, leaving a
breadcrumb trail wherever it went. Ray Tomlinson, the inventor of email, wrote the
programme Reaper, which chased and deleted Creeper.
HISTORY
1980s: Birth of the commercial antivirus
1987 was the birth year of commercial antivirus although there were competing
claims for the innovator of the first antivirus product. Andreas Lüning and Kai Figge
released their first antivirus product for the Atari ST – which also saw the release of
Ultimate Virus Killer in 1987. Three Czechoslovakians created the first version of
the NOD antivirus in the same year and in the US, John McAfee founded McAfee
and released VirusScan.
1990s: The world goes online
With the internet becoming available to the public, more people began putting their
personal information online. Organised crime entities saw this as a potential source
of revenue and started to steal data from people and governments via the web. By the
middle of the 1990s, network security threats had increased exponentially and
firewalls and antivirus programmes had to be produced on a mass basis to protect the
public.
HISTORY
2000s: Threats diversify and multiply
In the early 2000s crime organisations started to heavily fund
professional cyberattacks and governments began to clamp down on the
criminality of hacking, giving much more serious sentences to those
culpable. Information security continued to advance as the internet grew
as well but, unfortunately, so did viruses.
2021: The next generation
The cybersecurity industry is continuing to grow at the speed of light.
The global cybersecurity market size is forecast to grow to $345.4bn by
2026 according to Statista. Ransomware is one of the most common
threats to any organisation's data security and is forecast to continue to
increase.
DEFINITION
Cyber security is the application of
technologies, processes, and controls to
protect systems, networks, programs, devices
and data from cyber attacks.
5 types of cyber security:
1. Critical infrastructure cyber security
2. Network security
3. Cloud security
4. IoT (Internet of Things) security
5. Application security
DEFINITION
1. Critical infrastructure cyber security
-Critical infrastructure organisations are often more vulnerable to attack
than others because SCADA (supervisory control and data acquisition)
systems often rely on older software.
2. Network security
-Network security involves addressing vulnerabilities affecting your
operating systems and network architecture, including servers and hosts,
firewalls and wireless access points, and network protocols.
3. Cloud security
-Cloud security is concerned with securing data, applications, and
infrastructure in the Cloud.
DEFINITION
4. IoT (Internet of Things) security
-IoT security involves securing smart devices and networks
connected to the IoT. IoT devices include things that connect
to the Internet without human intervention, such as smart fire
alarms, lights, thermostats, and other appliances.
5. Application security
-Application security involves addressing vulnerabilities
resulting from insecure development processes in designing,
coding, and publishing software or a website.
EXAMPLES: LATEST TRENDS
Examples of Network Security includes:
• Antivirus and Antispyware programs,
• Firewall that block unauthorized
access to a network and
• VPNs (Virtual Private Networks) used
for secure
EXAMPLES: LATEST TRENDS
Latest Trends:
1. Rise of Automotive Hacking
2. Potential of Artificial Intelligence (AI)
3. Mobile is the New Target
4. Cloud is Also Potentially Vulnerable
5. Data Breaches: Prime target
6. IoT with 5G Network: The New Era of
Technology and Risks
7. Automation and Integration
8. Targeted Ransomware
9. State-Sponsored Cyber Warfare
NEWS RELATED ARTICLES
◆ Kimsuky Updates its Tactics to
Target South Korean Experts
Threat Actors (March 24, 2023)
Cyware Alerts - Hacker News
◆ Black Magic APT Targets Ukraine
with CommonMagic and
PowerMagic Breaches and
Incidents (March 24, 2023)
Cyware Alerts - Hacker News
NEWS RELATED ARTICLES
◆ Hacktivists Increasingly Claim to
Target and Impact OT
◆ NETWORK SECURITYCisco
Patches High-Severity
Vulnerabilities in IOS Software
◆ Hackers inject credit card
stealers into payment processing
modules
ADVANTAGES
1. Protects sensitive personal information
-Cyber Security can prevent such attacks in the
first place as it is a proactive approach.
2. Protect private and Business data
-Cyber Security is a complete security package
that can protect businesses and organisations
from various threats.
3. Improves productivity
-An effective Cyber Security strategy can give
an early warning on when to expect attacks and
give suggestions on how to respond.
ADVANTAGES
4. Provides a business continuity plan
-Cyber Security uses Artificial Intelligence (AI)
and machine learning to create a business
continuity plan.
5. Improve the overall security of an organisation
-Cyber Security is a one-stop solution for all
security issues for businesses and
organisations.
DISADVANTAGES
1. Regular Update
-Businesses need to regularly update their
software, hardware, and security strategy to be
one step ahead of the attackers.
2. Needs Continuous learning
-The threats are new and never-ending, and so
is the learning process to keep up with the
threats.
3. Complex to Setup
-Setting up security architectures and tools like
a firewall can be complicated and could take a
long time.
DISADVANTAGES
4. Slower Systems
-Over time, Systems tend to become sluggish as running
these security applications takes up a lot of resources.
5. Constant Monitoring
-An effective Cyber Security strategy involves continuous
monitoring of new threats.
6. Talent Shortage
-Cyber Security is vast, and there's a significant talent
shortage in this field.
7. Expensive
-Implementing Cyber Security can be very expensive as it
is an ongoing process that requires consistent learning and
spending.
SUMMARY
Over the years, the term Cyber Security has gained much
importance and become a common part of each one’s life who is associated
with a computer or a smartphone device. When people submit their data
online, it becomes vulnerable to cyber-attacks or cyber-crimes.
Moreover, cyber-attacks can happen over an external facing DNS
server or an internal firewall, which in turn effects the data and
infrastructure within the enterprise that inherently causes significant
damage to the business of the associated organization.
Cyber Security offers security, from unauthorized access or
exploitation, through online services to the massive data, associated
appliances and network that is used for communication.
CONCLUSION
In conclusion, information is a critical part of any
organization and investing on the right service provider keeps your
business in safe hands in the ever-expanding IoT (Internet of Things)
world.
A scalable and customized cyber security-driven business
model includes disaster-recovery capabilities and secures data and the
underlying infrastructure of the organization, thus building a safe
barrier for the information even before it is attacked and saving the
organization from a loss of billions of dollars that could result from
the security threat.
REFERENCES:
https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.edureka.co/blog/what-is-
cybersecurity/amp/&ved=2ahUKEwiB4q-ugfL9AhWhR2wGHa5UB-
IQFnoECC4QAQ&usg=AOvVaw2yLUdOD9SfH9hRhZjwGftQ
https://cybermagazine.com/cyber-security/history-cybersecurity
https://www.theknowledgeacademy.com/blog/advantages-and-disadvantages-of-cybersecurity/
https://www.knowledgehut.com/blog/security/cyber-security-trends
https://images.app.goo.gl/NHZWwbcFrrUVACNL7
https://images.app.goo.gl/m8sbTYQHH6HLEosLA
https://www.google.com/imgres?imgurl=https%3A%2F%2Fexecutiveacademy.at%2Ffileadmin_synced_asset
s%2F_processed_%2Fc%2Fc%2Fcsm_filler-news-cyber-security-best-practices-
verordnung1_32070b9668.jpg&tbnid=xfXUl0zmLStxrM&vet=1&imgrefurl=https%3A%2F%2Fexecutiveaca
demy.at%2Fen%2Fnews%2Fdetail%2Fcybersecurity-from-best-practice-to-
regulation&docid=UJ06Rniw2aHKyM&w=1200&h=632&hl=en-US&source=sh%2Fx%2Fim

More Related Content

What's hot

Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in SocietyRubal Sagwal
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone securityManish Gupta
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in IndiaYogesh Lolge
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primerHector Dominguez
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 

What's hot (20)

Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Smartphone security
Smartphone  securitySmartphone  security
Smartphone security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)Introduction to Internet of Things (IoT)
Introduction to Internet of Things (IoT)
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Surveillance technologies a primer
Surveillance technologies  a primerSurveillance technologies  a primer
Surveillance technologies a primer
 
Cyber security
Cyber security Cyber security
Cyber security
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 

Similar to Cyber Security

Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxNigussMehari4
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docxssuser719d6b
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 

Similar to Cyber Security (20)

Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
C018131821
C018131821C018131821
C018131821
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Forensics
ForensicsForensics
Forensics
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 

Cyber Security

  • 1.
  • 2. INTRODUCTION Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access. Three main aspects we are trying to control, namely: Unauthorized Access Unauthorized Deletion Unauthorized Modification
  • 3. The CIA triad- is also commonly referred to as the three pillars of security and most of the security policies of an organization are built on these three principles. 1. Confidentiality- the protection of personal information. 2.Integrity- refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification. 3.Availability- refers to the ability of a user to access information or resources in a specified location and in the correct format.
  • 4. HISTORY Cybersecurity began in the 1970s when researcher Bob Thomas created a computer programme called Creeper that could move across ARPANET’s network. 1970- a number of security measures were developed, including encryption algorithms, firewalls, and access control systems. The development of the internet in the 1990s led to the creation of new security protocols, such as the Secure Sockets Layer (SSL) and Transport Layer Security (TLS), which are used to secure online communications and transactions. early 2000's- a number of high-profile cyberattacks, such as the Code Red and Nimda worms, highlighted the growing threat of cybercrime.
  • 5. HISTORY Cybersecurity has been developed and advanced by a range of individuals and organizations over time. It is difficult to attribute the development of cybersecurity to any one person or group, as it has evolved as a response to the changing threat landscape and the growth of computer networks. OTHER CONTRIBUTORS: -Whitfield Diffie -Martin Hellman -Robert moris
  • 6. HISTORY Where did cybersecurity begin? Cyber magazine takes a look at the history of cybersecurity from inception to the present day. Cybersecurity is becoming increasingly significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices and the various devices that constitute the ‘Internet of things’. 1970s: ARAPNET and the Creeper Cybersecurity began in the 1970s when researcher Bob Thomas created a computer programme called Creeper that could move across ARPANET’s network, leaving a breadcrumb trail wherever it went. Ray Tomlinson, the inventor of email, wrote the programme Reaper, which chased and deleted Creeper.
  • 7. HISTORY 1980s: Birth of the commercial antivirus 1987 was the birth year of commercial antivirus although there were competing claims for the innovator of the first antivirus product. Andreas Lüning and Kai Figge released their first antivirus product for the Atari ST – which also saw the release of Ultimate Virus Killer in 1987. Three Czechoslovakians created the first version of the NOD antivirus in the same year and in the US, John McAfee founded McAfee and released VirusScan. 1990s: The world goes online With the internet becoming available to the public, more people began putting their personal information online. Organised crime entities saw this as a potential source of revenue and started to steal data from people and governments via the web. By the middle of the 1990s, network security threats had increased exponentially and firewalls and antivirus programmes had to be produced on a mass basis to protect the public.
  • 8. HISTORY 2000s: Threats diversify and multiply In the early 2000s crime organisations started to heavily fund professional cyberattacks and governments began to clamp down on the criminality of hacking, giving much more serious sentences to those culpable. Information security continued to advance as the internet grew as well but, unfortunately, so did viruses. 2021: The next generation The cybersecurity industry is continuing to grow at the speed of light. The global cybersecurity market size is forecast to grow to $345.4bn by 2026 according to Statista. Ransomware is one of the most common threats to any organisation's data security and is forecast to continue to increase.
  • 9. DEFINITION Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks. 5 types of cyber security: 1. Critical infrastructure cyber security 2. Network security 3. Cloud security 4. IoT (Internet of Things) security 5. Application security
  • 10. DEFINITION 1. Critical infrastructure cyber security -Critical infrastructure organisations are often more vulnerable to attack than others because SCADA (supervisory control and data acquisition) systems often rely on older software. 2. Network security -Network security involves addressing vulnerabilities affecting your operating systems and network architecture, including servers and hosts, firewalls and wireless access points, and network protocols. 3. Cloud security -Cloud security is concerned with securing data, applications, and infrastructure in the Cloud.
  • 11. DEFINITION 4. IoT (Internet of Things) security -IoT security involves securing smart devices and networks connected to the IoT. IoT devices include things that connect to the Internet without human intervention, such as smart fire alarms, lights, thermostats, and other appliances. 5. Application security -Application security involves addressing vulnerabilities resulting from insecure development processes in designing, coding, and publishing software or a website.
  • 12. EXAMPLES: LATEST TRENDS Examples of Network Security includes: • Antivirus and Antispyware programs, • Firewall that block unauthorized access to a network and • VPNs (Virtual Private Networks) used for secure
  • 13. EXAMPLES: LATEST TRENDS Latest Trends: 1. Rise of Automotive Hacking 2. Potential of Artificial Intelligence (AI) 3. Mobile is the New Target 4. Cloud is Also Potentially Vulnerable 5. Data Breaches: Prime target 6. IoT with 5G Network: The New Era of Technology and Risks 7. Automation and Integration 8. Targeted Ransomware 9. State-Sponsored Cyber Warfare
  • 14. NEWS RELATED ARTICLES ◆ Kimsuky Updates its Tactics to Target South Korean Experts Threat Actors (March 24, 2023) Cyware Alerts - Hacker News ◆ Black Magic APT Targets Ukraine with CommonMagic and PowerMagic Breaches and Incidents (March 24, 2023) Cyware Alerts - Hacker News
  • 15. NEWS RELATED ARTICLES ◆ Hacktivists Increasingly Claim to Target and Impact OT ◆ NETWORK SECURITYCisco Patches High-Severity Vulnerabilities in IOS Software ◆ Hackers inject credit card stealers into payment processing modules
  • 16. ADVANTAGES 1. Protects sensitive personal information -Cyber Security can prevent such attacks in the first place as it is a proactive approach. 2. Protect private and Business data -Cyber Security is a complete security package that can protect businesses and organisations from various threats. 3. Improves productivity -An effective Cyber Security strategy can give an early warning on when to expect attacks and give suggestions on how to respond.
  • 17. ADVANTAGES 4. Provides a business continuity plan -Cyber Security uses Artificial Intelligence (AI) and machine learning to create a business continuity plan. 5. Improve the overall security of an organisation -Cyber Security is a one-stop solution for all security issues for businesses and organisations.
  • 18. DISADVANTAGES 1. Regular Update -Businesses need to regularly update their software, hardware, and security strategy to be one step ahead of the attackers. 2. Needs Continuous learning -The threats are new and never-ending, and so is the learning process to keep up with the threats. 3. Complex to Setup -Setting up security architectures and tools like a firewall can be complicated and could take a long time.
  • 19. DISADVANTAGES 4. Slower Systems -Over time, Systems tend to become sluggish as running these security applications takes up a lot of resources. 5. Constant Monitoring -An effective Cyber Security strategy involves continuous monitoring of new threats. 6. Talent Shortage -Cyber Security is vast, and there's a significant talent shortage in this field. 7. Expensive -Implementing Cyber Security can be very expensive as it is an ongoing process that requires consistent learning and spending.
  • 20. SUMMARY Over the years, the term Cyber Security has gained much importance and become a common part of each one’s life who is associated with a computer or a smartphone device. When people submit their data online, it becomes vulnerable to cyber-attacks or cyber-crimes. Moreover, cyber-attacks can happen over an external facing DNS server or an internal firewall, which in turn effects the data and infrastructure within the enterprise that inherently causes significant damage to the business of the associated organization. Cyber Security offers security, from unauthorized access or exploitation, through online services to the massive data, associated appliances and network that is used for communication.
  • 21. CONCLUSION In conclusion, information is a critical part of any organization and investing on the right service provider keeps your business in safe hands in the ever-expanding IoT (Internet of Things) world. A scalable and customized cyber security-driven business model includes disaster-recovery capabilities and secures data and the underlying infrastructure of the organization, thus building a safe barrier for the information even before it is attacked and saving the organization from a loss of billions of dollars that could result from the security threat.
  • 22. REFERENCES: https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.edureka.co/blog/what-is- cybersecurity/amp/&ved=2ahUKEwiB4q-ugfL9AhWhR2wGHa5UB- IQFnoECC4QAQ&usg=AOvVaw2yLUdOD9SfH9hRhZjwGftQ https://cybermagazine.com/cyber-security/history-cybersecurity https://www.theknowledgeacademy.com/blog/advantages-and-disadvantages-of-cybersecurity/ https://www.knowledgehut.com/blog/security/cyber-security-trends https://images.app.goo.gl/NHZWwbcFrrUVACNL7 https://images.app.goo.gl/m8sbTYQHH6HLEosLA https://www.google.com/imgres?imgurl=https%3A%2F%2Fexecutiveacademy.at%2Ffileadmin_synced_asset s%2F_processed_%2Fc%2Fc%2Fcsm_filler-news-cyber-security-best-practices- verordnung1_32070b9668.jpg&tbnid=xfXUl0zmLStxrM&vet=1&imgrefurl=https%3A%2F%2Fexecutiveaca demy.at%2Fen%2Fnews%2Fdetail%2Fcybersecurity-from-best-practice-to- regulation&docid=UJ06Rniw2aHKyM&w=1200&h=632&hl=en-US&source=sh%2Fx%2Fim