SlideShare a Scribd company logo
1 of 27
TOPIC:- CYBER
SECURITY
AWARENESS
COMMON CYBER THREATS
• Ransomware. This is a form of malware (malicious software) that attempts to
encrypt (scramble) your data and then extort a ransom to release an unlock
code. ...
• Phishing
• Trojan horse
• sql injections
• Hacking
• Public Wi-Fi
• malware…(spyware,viruses and worms are including)
2
RANSOMWARE CYBER THREAT
⮚ Normally loaded onto a computer via a
download/attachment/link from an email or website.
⮚ Will either lock the screen or encrypt your data.
⮚ Once Ransomware is uploaded on your
computer/tablet/phone it is very difficult to remove
without removing all of the data
⮚ Wannacry attack 2017 - One of the biggest cyber
attacks to occur.
⮚ Is said to have hit 300,000 computers in 150
countries.
⮚ Companies affected include; NHS, Renault, FedEx,
Spanish telecoms and gas companies, German railway 3
 Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to data or a computer system,
usually by encrypting it, until the victim pays a ransom fee to the attacker.
HOW TO TACKLE RANSOMEWARE
⮚Back up- Keep a backed up copy of your data. Ensure its not
permanently connected to the network.
⮚ Patch- Keep your software up to date. Wannacry was successful
as those affected computers hadn’t updated. The update
contained a fix for the problem.
⮚ Attachments- Don’t click on links from emails/SMS as this could
easily be from an untrusted source and contain malware like
Ransomware 4
PHISHING
✔Is the attempt to obtain
sensitive information by
deception.
✔ They will be after your
login credentials,
payment card details or
to upload malware to
your computer
✔ The email will normally
impersonate a genuine
company or person.
5
PHISHING TYPE
⮚ Email phishing. ...
⮚ HTTPS phishing. ...
⮚ Spear phishing. ...
⮚ Whaling/CEO fraud. ...
⮚ Vishing. ...
⮚ Smishing. ...
⮚ Angler phishing. ...
⮚ Pharming.
⮚ POP-UP PHISHING
⮚ CLONE PHISHING
⮚ EVIL TWIN
⮚ WATERING HOLE PHISHING
6
HOW TO TACKLE PHISHING ATTACK
❑ Don’t click any links on an email unless you can guarantee who its from.
❑ Use a trusted method of contacting the company via a phone number, app or
website.
❑ Mark the email as spam and contact the organisation.
❑ Disconnect your device from the internet and any network it is linked to. ..
❑ Perform a complete scan of your system using your anti-virus software. ...
❑ Change your details.
7
TROJAN HORSE
➢ Trojan is designed to damage, disrupt, steal, or in general inflict some other
harmful action on your data or network.
8
❏ A Trojan horse is a type of malware that downloads onto a computer
disguised as a legitimate program. A Trojan horse is so-called due to its
delivery method, which typically sees an attacker use social engineering to
hide malicious code within legitimate software.
❏ a Trojan horse might be used to infect a personal computer: The victim
receives an official-looking email with an attachment. The attachment
contains malicious code that is executed as soon as the victim clicks on the
attachment.
c
9
How Trojans impact mobile devices
➢ Trojans aren’t problems for only laptop and desktop computers. They can
also impact your mobile devices, including cell phones and tablets.
➢ In general, a Trojan comes attached to what looks like a legitimate program.
In reality, it is a fake version of the app, loaded up with malware.
Cybercriminals will usually place them on unofficial and pirate app markets
for unsuspecting users to download.
➢ In addition, these apps can also steal information from your device, and
generate revenue by sending premium SMS texts.
➢ One form of Trojan malware has targeted Android devices specifically. Caled
Switcher Trojan, it infects users’ devices to attack the routers on their
wireless networks. The result? Cybercriminals could redirect traffic on the
Wi-Fi-connected devices and use it to commit various crimes.
10
How do Trojans work ?
➢Here’s a Trojan malware example to show how it works.
➢ You might think you’ve received an email from someone you know and
click on what looks like a legitimate attachment. But you’ve been
fooled. The email is from a cybercriminal, and the file you clicked on —
and downloaded and opened — has gone on to install malware on your
device.
➢ When you execute the program, the malware can spread to other files
and damage your computer.
11
Common types of Trojan malware, from A to Z.
➔Backdoor Trojan
➔Downloader Trojan
➔Fake AV Trojan
➔Game-thief Trojan
➔Infostealer Trojan
➔Mailfinder Trojan
12
➔Ransom Trojan
➔Remote Access Trojan
➔Rootkit Trojan
➔SMS Trojan
➔Trojan banker
➔Trojan IM
How to help protect against Trojans
★ Never download or install software from a source you don’t trust completely
★ Never open an attachment or run a program sent to you in an email from
someone you don’t know.
★ Keep all software on your computer up to date with the latest patches
★ Make sure a Trojan antivirus is installed and running on your computer
★ Back up your files regularly. If a Trojan infects your computer, this will help
you to restore your data.
13
What is SQL Injection?
❖ SQL injection is one of the most common web attack mechanisms utilized by attackers to
steal sensitive data from organizations. While SQL Injection can affect any data-driven
application that uses a SQL database, it is most often used to attack web sites.
❖ SQL Injection is a code injection technique that hackers can use to insert malicious SQL
statements into input fields for execution by the underlying SQL database. This technique
is made possible because of improper coding of vulnerable web applications.
14
SQL INJECTION
SQL INJECTION :- Structured Query Language
★ SQL Injection (SQLi) is a type of an injection attack
that makes it possible to execute malicious SQL
statements. These statements control a database
server behind a web application. ... They can also use
SQL Injection to add, modify, and delete records in the
database.
15
How to Prevent SQL Injections
❖ The most basic SQL injections can be prevented by filtering input. However, it will not stop
more complex attacks.
❖ To prevent maximum SQL injection damage, it is recommended to separate your sensitive
data and store it in multiple databases.
❖ Customize your error messages so they don't give away any information about the
structure of your database to a potential intruder.
16
HACKING TYPE
⮚ Financial (theft, fraud, blackmail)
⮚ Political /state (state level/ military)
⮚ Fame/ kudos (fun/ status)
⮚ Hacktivism (cause)
⮚ Pen testers (legal hacking)
⮚ Police
⮚ Insider
⮚ Business
17
WHAT IS HACKING ?
• A commonly used hacking definition is the act of
compromising digital devices and networks
through unauthorized access to an account or
computer system. Hacking is not always a
malicious act, but it is most commonly associated
with illegal activity and data theft by cyber
criminals.
• Hacking refers to the misuse of devices like
computers, smartphones, tablets, and networks
to cause damage to or corrupt systems, gather
information on users, steal data and documents,
or disrupt data-related activity.
18
PUBLIC WI-FI
⮚ May not be trustworthy. They
could share your information
to other companies who
operate in countries without
any data protection.
⮚ You may not know who is
watching you whilst you’re
online.
19
RISKS WHEN WE USE PUBLIIC WIFI
• Theft of Personal Information. One of the most serious and common threats concerns theft of personal
information. ...
• Cyber Attacks on Businesses. ...
• Man-In-The-Middle Attacks. ...
• Unencrypted Connections. ...
• Packet Sniffing / Eavesdropping. ...
• Malware Distribution. ...
• Session Hijacking.
20
TYPE OF CYBER CRIME.
→ EMAIL AND INTERNET FRAUD.
→ IDENTITY FRAUD (WHERE PERSONAL INFORMATION IS STOLEN AND USED ).
→ THEFT OF FINANCIAL OR CARD PAYMENT DATA.
→ RENSOMWARE ATTACKS.
21
ADVICE FOR COMPUTER SECURITY
• Keep software up-to-date. ...
• Avoid Phishing scams - beware of suspicious emails and phone calls. ...
• Practice good password management. ...
• Be careful what you click. ...
• Never leave devices unattended.
• Enable and Configure a Firewall
• Cyber insurance
• Staff awareness
• Data encryption
• Prepare Plan
22
PASSWORD ADVICE
1. MAKE YOUR PASSWORD LONG. ...
2. MAKE YOUR PASSWORD A NONSENSE PHRASE. ..
3. INCLUDE NUMBERS, SYMBOLS, AND UPPERCASE AND LOWERCASE LETTERS. ...
4. AVOID USING OBVIOUS PERSONAL INFORMATION. ...
5. DO NOT REUSE PASSWORDS. ...
6. START USING A PASSWORD MANAGER. ...
7. KEEP YOUR PASSWORD UNDER WRAPS.
8. CHANGE YOUR PASSWORDS REGULARLY.
9. If you follow this advice your passwords security will be significantly
increased against a brute force attack
23
CYBERCRIME REPORTING PORTAL
❖ The Cybercrime reporting portal is an initiative of the Ministry of
Home Affairs, Government of India under National Mission for
the safety of women to facilitate victims/complainants to report
cybercrime complaints online.
❖https://cybercrime.gov.in/
24
ACTION FRAUD
• Action Fraud is the UK's national reporting centre for fraud and cyber
crime where you should report fraud if you have been scammed,
defrauded or experienced ...
• Can be reported 24/7 via the website.
• https://www.actionfraud.police.uk/
25
NATIONAL CYBER SECURITY CENTRE (NCSC)
❑ The National Cyber Security Centre (NCSC) provides cyber security guidance and support helping to
make the UK the safest place to live and work online.
❑ National Cyber Security Centre - NCSC.GOV.UK
❑ https://www.ncsc.gov.uk
26
Thank you
27

More Related Content

Similar to CYBER SECURITY AWARENESS.pptx [Read-Only].pptx

SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfssusera0b94b
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)AFROZULLA KHAN Z
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBCapyn
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media SecurityHem Pokhrel
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptxUmaraZahidLecturer
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdfMohanPandey31
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxMustafa Amiri
 

Similar to CYBER SECURITY AWARENESS.pptx [Read-Only].pptx (20)

Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
SAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdfSAMPLE ATTACKS PRESENTATION.pdf
SAMPLE ATTACKS PRESENTATION.pdf
 
CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)CYBER CRIME AWARENESS (Thematic Presentation)
CYBER CRIME AWARENESS (Thematic Presentation)
 
csa2014 IBC
csa2014 IBCcsa2014 IBC
csa2014 IBC
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer virus
Computer virusComputer virus
Computer virus
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Cyber Crime and Social Media Security
Cyber Crime and Social Media SecurityCyber Crime and Social Media Security
Cyber Crime and Social Media Security
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity awareness session.pptx
Cybersecurity awareness session.pptxCybersecurity awareness session.pptx
Cybersecurity awareness session.pptx
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Cyber Crime & Security.pdf
Cyber Crime & Security.pdfCyber Crime & Security.pdf
Cyber Crime & Security.pdf
 
Computer security
Computer securityComputer security
Computer security
 
Cybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptxCybersecurity Awareness Training for Employees.pptx
Cybersecurity Awareness Training for Employees.pptx
 

Recently uploaded

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 

Recently uploaded (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 

CYBER SECURITY AWARENESS.pptx [Read-Only].pptx

  • 2. COMMON CYBER THREATS • Ransomware. This is a form of malware (malicious software) that attempts to encrypt (scramble) your data and then extort a ransom to release an unlock code. ... • Phishing • Trojan horse • sql injections • Hacking • Public Wi-Fi • malware…(spyware,viruses and worms are including) 2
  • 3. RANSOMWARE CYBER THREAT ⮚ Normally loaded onto a computer via a download/attachment/link from an email or website. ⮚ Will either lock the screen or encrypt your data. ⮚ Once Ransomware is uploaded on your computer/tablet/phone it is very difficult to remove without removing all of the data ⮚ Wannacry attack 2017 - One of the biggest cyber attacks to occur. ⮚ Is said to have hit 300,000 computers in 150 countries. ⮚ Companies affected include; NHS, Renault, FedEx, Spanish telecoms and gas companies, German railway 3  Ransomware is a type of malicious software (malware) that threatens to publish or blocks access to data or a computer system, usually by encrypting it, until the victim pays a ransom fee to the attacker.
  • 4. HOW TO TACKLE RANSOMEWARE ⮚Back up- Keep a backed up copy of your data. Ensure its not permanently connected to the network. ⮚ Patch- Keep your software up to date. Wannacry was successful as those affected computers hadn’t updated. The update contained a fix for the problem. ⮚ Attachments- Don’t click on links from emails/SMS as this could easily be from an untrusted source and contain malware like Ransomware 4
  • 5. PHISHING ✔Is the attempt to obtain sensitive information by deception. ✔ They will be after your login credentials, payment card details or to upload malware to your computer ✔ The email will normally impersonate a genuine company or person. 5
  • 6. PHISHING TYPE ⮚ Email phishing. ... ⮚ HTTPS phishing. ... ⮚ Spear phishing. ... ⮚ Whaling/CEO fraud. ... ⮚ Vishing. ... ⮚ Smishing. ... ⮚ Angler phishing. ... ⮚ Pharming. ⮚ POP-UP PHISHING ⮚ CLONE PHISHING ⮚ EVIL TWIN ⮚ WATERING HOLE PHISHING 6
  • 7. HOW TO TACKLE PHISHING ATTACK ❑ Don’t click any links on an email unless you can guarantee who its from. ❑ Use a trusted method of contacting the company via a phone number, app or website. ❑ Mark the email as spam and contact the organisation. ❑ Disconnect your device from the internet and any network it is linked to. .. ❑ Perform a complete scan of your system using your anti-virus software. ... ❑ Change your details. 7
  • 8. TROJAN HORSE ➢ Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. 8 ❏ A Trojan horse is a type of malware that downloads onto a computer disguised as a legitimate program. A Trojan horse is so-called due to its delivery method, which typically sees an attacker use social engineering to hide malicious code within legitimate software. ❏ a Trojan horse might be used to infect a personal computer: The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment.
  • 9. c 9
  • 10. How Trojans impact mobile devices ➢ Trojans aren’t problems for only laptop and desktop computers. They can also impact your mobile devices, including cell phones and tablets. ➢ In general, a Trojan comes attached to what looks like a legitimate program. In reality, it is a fake version of the app, loaded up with malware. Cybercriminals will usually place them on unofficial and pirate app markets for unsuspecting users to download. ➢ In addition, these apps can also steal information from your device, and generate revenue by sending premium SMS texts. ➢ One form of Trojan malware has targeted Android devices specifically. Caled Switcher Trojan, it infects users’ devices to attack the routers on their wireless networks. The result? Cybercriminals could redirect traffic on the Wi-Fi-connected devices and use it to commit various crimes. 10
  • 11. How do Trojans work ? ➢Here’s a Trojan malware example to show how it works. ➢ You might think you’ve received an email from someone you know and click on what looks like a legitimate attachment. But you’ve been fooled. The email is from a cybercriminal, and the file you clicked on — and downloaded and opened — has gone on to install malware on your device. ➢ When you execute the program, the malware can spread to other files and damage your computer. 11
  • 12. Common types of Trojan malware, from A to Z. ➔Backdoor Trojan ➔Downloader Trojan ➔Fake AV Trojan ➔Game-thief Trojan ➔Infostealer Trojan ➔Mailfinder Trojan 12 ➔Ransom Trojan ➔Remote Access Trojan ➔Rootkit Trojan ➔SMS Trojan ➔Trojan banker ➔Trojan IM
  • 13. How to help protect against Trojans ★ Never download or install software from a source you don’t trust completely ★ Never open an attachment or run a program sent to you in an email from someone you don’t know. ★ Keep all software on your computer up to date with the latest patches ★ Make sure a Trojan antivirus is installed and running on your computer ★ Back up your files regularly. If a Trojan infects your computer, this will help you to restore your data. 13
  • 14. What is SQL Injection? ❖ SQL injection is one of the most common web attack mechanisms utilized by attackers to steal sensitive data from organizations. While SQL Injection can affect any data-driven application that uses a SQL database, it is most often used to attack web sites. ❖ SQL Injection is a code injection technique that hackers can use to insert malicious SQL statements into input fields for execution by the underlying SQL database. This technique is made possible because of improper coding of vulnerable web applications. 14
  • 15. SQL INJECTION SQL INJECTION :- Structured Query Language ★ SQL Injection (SQLi) is a type of an injection attack that makes it possible to execute malicious SQL statements. These statements control a database server behind a web application. ... They can also use SQL Injection to add, modify, and delete records in the database. 15
  • 16. How to Prevent SQL Injections ❖ The most basic SQL injections can be prevented by filtering input. However, it will not stop more complex attacks. ❖ To prevent maximum SQL injection damage, it is recommended to separate your sensitive data and store it in multiple databases. ❖ Customize your error messages so they don't give away any information about the structure of your database to a potential intruder. 16
  • 17. HACKING TYPE ⮚ Financial (theft, fraud, blackmail) ⮚ Political /state (state level/ military) ⮚ Fame/ kudos (fun/ status) ⮚ Hacktivism (cause) ⮚ Pen testers (legal hacking) ⮚ Police ⮚ Insider ⮚ Business 17
  • 18. WHAT IS HACKING ? • A commonly used hacking definition is the act of compromising digital devices and networks through unauthorized access to an account or computer system. Hacking is not always a malicious act, but it is most commonly associated with illegal activity and data theft by cyber criminals. • Hacking refers to the misuse of devices like computers, smartphones, tablets, and networks to cause damage to or corrupt systems, gather information on users, steal data and documents, or disrupt data-related activity. 18
  • 19. PUBLIC WI-FI ⮚ May not be trustworthy. They could share your information to other companies who operate in countries without any data protection. ⮚ You may not know who is watching you whilst you’re online. 19
  • 20. RISKS WHEN WE USE PUBLIIC WIFI • Theft of Personal Information. One of the most serious and common threats concerns theft of personal information. ... • Cyber Attacks on Businesses. ... • Man-In-The-Middle Attacks. ... • Unencrypted Connections. ... • Packet Sniffing / Eavesdropping. ... • Malware Distribution. ... • Session Hijacking. 20
  • 21. TYPE OF CYBER CRIME. → EMAIL AND INTERNET FRAUD. → IDENTITY FRAUD (WHERE PERSONAL INFORMATION IS STOLEN AND USED ). → THEFT OF FINANCIAL OR CARD PAYMENT DATA. → RENSOMWARE ATTACKS. 21
  • 22. ADVICE FOR COMPUTER SECURITY • Keep software up-to-date. ... • Avoid Phishing scams - beware of suspicious emails and phone calls. ... • Practice good password management. ... • Be careful what you click. ... • Never leave devices unattended. • Enable and Configure a Firewall • Cyber insurance • Staff awareness • Data encryption • Prepare Plan 22
  • 23. PASSWORD ADVICE 1. MAKE YOUR PASSWORD LONG. ... 2. MAKE YOUR PASSWORD A NONSENSE PHRASE. .. 3. INCLUDE NUMBERS, SYMBOLS, AND UPPERCASE AND LOWERCASE LETTERS. ... 4. AVOID USING OBVIOUS PERSONAL INFORMATION. ... 5. DO NOT REUSE PASSWORDS. ... 6. START USING A PASSWORD MANAGER. ... 7. KEEP YOUR PASSWORD UNDER WRAPS. 8. CHANGE YOUR PASSWORDS REGULARLY. 9. If you follow this advice your passwords security will be significantly increased against a brute force attack 23
  • 24. CYBERCRIME REPORTING PORTAL ❖ The Cybercrime reporting portal is an initiative of the Ministry of Home Affairs, Government of India under National Mission for the safety of women to facilitate victims/complainants to report cybercrime complaints online. ❖https://cybercrime.gov.in/ 24
  • 25. ACTION FRAUD • Action Fraud is the UK's national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced ... • Can be reported 24/7 via the website. • https://www.actionfraud.police.uk/ 25
  • 26. NATIONAL CYBER SECURITY CENTRE (NCSC) ❑ The National Cyber Security Centre (NCSC) provides cyber security guidance and support helping to make the UK the safest place to live and work online. ❑ National Cyber Security Centre - NCSC.GOV.UK ❑ https://www.ncsc.gov.uk 26