This document provides an introduction to cyber security and network security strategies. It defines cyber security as establishing rules and measures to protect against internet attacks, prevent data breaches and unauthorized access. Cyber security focuses on detection, recovery and response while network security protects transit data through encryption and other measures. Common cyber security threats discussed include hacking, malware, denial of service attacks, SQL injection, and brute force. Solutions mentioned are firewalls, intrusion detection systems, web application firewalls, email security, network access control, security information and event management, and vulnerability analysis. Popular vendors are also listed.
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Cyber security[1118]
1. INTRODUCTION TO CYBER
SECURITY &
FUNDAMENTALS OF IDPS
TECHNOLOGY
ANJANA PJ
CYBER SECURITY ADMINISTRATOR
WIPRO TECHNOLOGIES , KOCHI
INTRODUCTION TO CYBER
SECURITY
ANJANA P J
CYBER SECURITY ADMINISTRATOR
WIPRO TECHNOLOGIES
KOCHI
2. WHAT IS CYBER SECURITY?
• objective is to establish rules and measure to use against
attacks over the Internet.
• To prevent data breaches
• To prevent any unauthorized access/ usage.
3. Cyber security protection revolves around detection, recovery, and
response. Network security focuses on preventing access to IT
infrastructure through data encryption, password security, and other security
measures.
Cyber security aims to protect all digital data, while
network security seeks to protect transit data only.
Network security includes viruses and worms while
cyber security is more involved in phishing and pre-
texting.
CYBER v/s NETWORK SECURITY
6. HACKING
Activities that seek to compromise digital
devices
motivated by financial gain, protest,
information gathering (spying), and even
just for the “fun” of the challenge.
Hackers are usually skilled computer
programmers with knowledge of computer
security.
7.
8. • Malware is a collective term of viruses, worms, Trojans, etc.
• Hackers intentionally build Malware to cause damage to
computers and networks.
• Malware is usually distributed by email as a link or file,
requiring the recipient to click on the link or open the file to
execute it.
TYPES:
1.RANSOMWARE
2.SPYWARE
3.ADWARE
4.VIRUS/WORMS
MALWARE
10. COMPARISON
Parameter Of Comparison DoS DDoS
Definition
DoS stands for Denial of Service
attack. It is used to crash a
website by transferring a load of
access requests from a
computer.
DDoS stands for Distributed
Denial of Service attack. It is also
used to crash a website and
make it unavailable to the users.
Facilitated By
DoS attack is facilitated by using
a single system.
DDoS attack is facilitated by using
a multiple systems.
Severity
DoS attack is considered less
severe.
DDoS attack is a very severe
attack.
Speed of Attack
The speed of a DoS attack is
slow.
The DDoS attack has a quick
speed.
Detection
A DoS attack can be easily
detected by identifying
the IP address of the attacking
computer.
A DDoS attack is difficult to
detect as many computers attack
the site at the same time.
11. Some attackers use applications and scripts as brute force tools.
BRUTE FORCE
Brute force is a simple attack method and has a high success
rate.
Involves ‘guessing’ username and passwords to
gain unauthorized access to a system.
12. SQL INJECTION ATTACK
SQL injection is a common attack vector that allows users with malicious SQL code to access
hidden information by manipulating the backend of databases.
A successful SQL injection can result in deletion of entire databases, unauthorized use of sensitive
data, and unintended granting of administrative rights to a database.
13. How to prevent ?
Password safety
Destroy all traces of your
personal info on hardware
you plan on selling.
Do not use open Wi-Fi on
your router
Update your OS and other software
frequently, if not automatically
14. OVERVIEW OF SOME SOLUTIONS
FIREWALL
INTRUSION
DETECTION
/PREVENTION
SYSTEM
WEB APPLICATION
FIREWALL
PROXY
EMAIL SECURITY
NETWORK ACCESS
CONTROL
SIEM
VULNERABILITY
ANALYSIS &
PREVENTION
16. Workforce revealed that the percentage of women in cybersecurity is
roughly 24%.
In India around 11% of the sector’s workforce
Let’s bring out more women leaders !
HAPPY WOMEN’S DAY