This slide is a small introduction for cyber security.
What is cyber security?
Why do we need cyber security?
What are the benefits of cybersecurity?
Types of cyber security threats
How to prevent the breaches?
Some real attacks
2. What is cyber security?
• In simple words cyber security can be termed as a
technology which protects the networks and computer
systems from theft or disclosure or damage to their
hardware or software or electronic data. The
cybersecurity is a bundle of methods, processes and
technologies to support the safe, confidentiality, integrity
and availability of computer systems networks and data.
3. Why do we need cyber
security?
• The internet has become the integral part of today’s
generation of people; from communicating through instant
messages and emails to banking, travelling, studying and
shopping, internet has touched every aspect of life. With the
growing use of the internet by people, protecting important
information has become a necessity. A computer that is not
having appropriate security controls can be infected with
malicious logic and thus any type of information can be
accessed in moments. Number of infected Web Pages and
malicious websites can be seen every day that infects the
computer and allow hackers to gain illegal access to other
computer systems.
4. What are the benefits of
cybersecurity?
The benefits of implementing and maintaining cybersecurity
practices include:
Business protection against cyberattacks and data
breaches.
Protection for data and networks.
Prevention of unauthorized user access.
Improved recovery time after a breach.
Protection for end users and endpoint devices.
Regulatory compliance.
Business continuity.
5. Types of cyber security threats
• Malware
• Ransomware
• Social engineering
• Insider threats
• DDos attack
• Man in the middle attack
6. How to prevent the breaches?
• Conduct cyber security training and awareness
• Perform risk assessments
• Ensure vulnerability management and software patch
management/updates
• Use the principle of least privilege
• Enforce secure password storage and policies
• Implement a robust business continuity and incidence response (BC-IR)
plan
• Perform periodic security reviews
• Backup data
• Use encryption for data at rest and in transit
• Design software and networks with security in mind
• Implement strong input validation and industry standards in secure
coding
7. Some real attacks
• Attacks on India’s CoWIN app
• SolarWinds Attack
• LinkedIn Phishing Scam
• Cyber-attack on Air India
8. Scope…
1. New Technologies and Devices
The reasons for the rise in cyberattacks—and the focus on protecting
against them—is multifold, Noubir says. One factor is the increase in new
technologies and new devices. By 2027, Business Insider predicts that more
than 41 billion Internet of Things (IoT) devices will be online and connected.
The IoT industry has become a prime target for cybercriminals and has sent
device makers scrambling to protect their smart plugs, wearable fitness
devices, and baby monitors from attacks.
2. Increasing Ransomware Attacks
Monetization is another key factor contributing to the rise in cyber attacks. In
the past, Noubir says, it was difficult for cybercriminals to profit from attacks,
but that has since changed. Now, cybercriminals have increasingly turned to
ransomware attacks, or those in which attackers gain access to and encrypt
a victim’s data and demand a ransom. “Cryptocurrencies and the emergence
of ransomware have made it easier for someone to commit a crime and get
away with it because they can get paid in untraceable ways,” he says.
“There’s also [the anonymous communication software] Tor, which makes it
easier to anonymize threats.”
9. 3. Attacks on Cloud Services
Embracing this technology comes with many benefits such as
reduced operational costs and increased efficiency. Although opting
for such systems can be highly beneficial to organizations, they have
also become the target of cyberthreats. If these systems are not
properly configured or maintained, attackers are more likely to be able
to exploit vulnerabilities in the systems’ security and gain access to
sensitive information. This is particularly important, seeing that many
of today’s organizations rely on cloud services as employees work
remotely.
4. Outdated and Inefficient Systems
Finally, Noubir notes that businesses increase the risk of an attack or
breach by connecting legacy systems. When IT implements
patchwork solutions to resolve operational issues, security
vulnerabilities can be created inadvertently.
As cyberattacks are becoming increasingly sophisticated alongside
rapidly changing technologies, these outdated and inefficient systems
become easy targets.
10. CONCLUSION
• How the cybersecurity challenge will evolve as technologies and threats
evolve, and how this may alter workforce capability and capacity
requirements.
• How advances—such as better-quality, more-secure software; more
productive cybersecurity tools; better training of the workers that operate
and manage IT systems; or more robust law enforcement—might change
the number of workers needed in certain roles and change the skills
needed for others.
• How much responsibility for cybersecurity might shift from organizations at
large to more specialist information technology (IT) or cybersecurity firms,
which may reduce the number or change the mix of cybersecurity workers
needed by organizations.