SlideShare a Scribd company logo
1 of 16
INTRODUCTION TO CYBER
SECURITY &
FUNDAMENTALS OF IDPS
TECHNOLOGY
ANJANA PJ
CYBER SECURITY ADMINISTRATOR
WIPRO TECHNOLOGIES , KOCHI
INTRODUCTION TO CYBER
SECURITY
ANJANA P J
CYBER SECURITY ADMINISTRATOR
WIPRO TECHNOLOGIES
KOCHI
WHAT IS CYBER SECURITY?
• objective is to establish rules and measure to use against
attacks over the Internet.
• To prevent data breaches
• To prevent any unauthorized access/ usage.
Cyber security protection revolves around detection, recovery, and
response. Network security focuses on preventing access to IT
infrastructure through data encryption, password security, and other security
measures.
Cyber security aims to protect all digital data, while
network security seeks to protect transit data only.
Network security includes viruses and worms while
cyber security is more involved in phishing and pre-
texting.
CYBER v/s NETWORK SECURITY
CYBER SECURITY - STRATEGIES
HACKING
MALWARE
DOS & DDOS
SQL INJECTION
BRUTE FORCE
HACKING
Activities that seek to compromise digital
devices
motivated by financial gain, protest,
information gathering (spying), and even
just for the “fun” of the challenge.
Hackers are usually skilled computer
programmers with knowledge of computer
security.
• Malware is a collective term of viruses, worms, Trojans, etc.
• Hackers intentionally build Malware to cause damage to
computers and networks.
• Malware is usually distributed by email as a link or file,
requiring the recipient to click on the link or open the file to
execute it.
TYPES:
1.RANSOMWARE
2.SPYWARE
3.ADWARE
4.VIRUS/WORMS
MALWARE
DOS/DDOS ATTACKS
COMPARISON
Parameter Of Comparison DoS DDoS
Definition
DoS stands for Denial of Service
attack. It is used to crash a
website by transferring a load of
access requests from a
computer.
DDoS stands for Distributed
Denial of Service attack. It is also
used to crash a website and
make it unavailable to the users.
Facilitated By
DoS attack is facilitated by using
a single system.
DDoS attack is facilitated by using
a multiple systems.
Severity
DoS attack is considered less
severe.
DDoS attack is a very severe
attack.
Speed of Attack
The speed of a DoS attack is
slow.
The DDoS attack has a quick
speed.
Detection
A DoS attack can be easily
detected by identifying
the IP address of the attacking
computer.
A DDoS attack is difficult to
detect as many computers attack
the site at the same time.
Some attackers use applications and scripts as brute force tools.
BRUTE FORCE
Brute force is a simple attack method and has a high success
rate.
Involves ‘guessing’ username and passwords to
gain unauthorized access to a system.
SQL INJECTION ATTACK
SQL injection is a common attack vector that allows users with malicious SQL code to access
hidden information by manipulating the backend of databases.
A successful SQL injection can result in deletion of entire databases, unauthorized use of sensitive
data, and unintended granting of administrative rights to a database.
How to prevent ?
Password safety
Destroy all traces of your
personal info on hardware
you plan on selling.
Do not use open Wi-Fi on
your router
Update your OS and other software
frequently, if not automatically
OVERVIEW OF SOME SOLUTIONS
FIREWALL
INTRUSION
DETECTION
/PREVENTION
SYSTEM
WEB APPLICATION
FIREWALL
PROXY
EMAIL SECURITY
NETWORK ACCESS
CONTROL
SIEM
VULNERABILITY
ANALYSIS &
PREVENTION
COMMON VENDORS
• CISCO
• PALO ALTO
• CHECKPOINT
• RADWARE
• IMPERVA
• FIREEYE
• FORTINET
Workforce revealed that the percentage of women in cybersecurity is
roughly 24%.
In India around 11% of the sector’s workforce
Let’s bring out more women leaders !
HAPPY WOMEN’S DAY

More Related Content

What's hot

Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information securityRashad Aliyev
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityGareth Davies
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaTheko Moima
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Happiest Minds Technologies
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamMohammed Adam
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber securityVishal Singh
 
Web Security Training : Tonex Training
Web Security Training : Tonex TrainingWeb Security Training : Tonex Training
Web Security Training : Tonex TrainingBryan Len
 
Cyber security snowe vazeer
Cyber security snowe vazeerCyber security snowe vazeer
Cyber security snowe vazeersnowe123
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Mohammed Adam
 

What's hot (19)

Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime
 
Web security
Web securityWeb security
Web security
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Web security by khubaib
Web security by khubaibWeb security by khubaib
Web security by khubaib
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
Web Security Training : Tonex Training
Web Security Training : Tonex TrainingWeb Security Training : Tonex Training
Web Security Training : Tonex Training
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security snowe vazeer
Cyber security snowe vazeerCyber security snowe vazeer
Cyber security snowe vazeer
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 

Similar to Cyber security[1118]

CYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxCYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxMOHAMMEDASHIK71
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyHaider Ali Malik
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptxKhappiyo
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber securityzaarahary
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Security Threats & Cyber Crimes
Security Threats & Cyber CrimesSecurity Threats & Cyber Crimes
Security Threats & Cyber CrimesKushan Dananjaya
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024Michael Noel
 

Similar to Cyber security[1118] (20)

CYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxCYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptx
 
cyber security
cyber securitycyber security
cyber security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
cyber security
cyber security cyber security
cyber security
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
Web security
Web securityWeb security
Web security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Threats & Cyber Crimes
Security Threats & Cyber CrimesSecurity Threats & Cyber Crimes
Security Threats & Cyber Crimes
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
ppt pdf ajay.pdf
ppt pdf ajay.pdfppt pdf ajay.pdf
ppt pdf ajay.pdf
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 

Cyber security[1118]

  • 1. INTRODUCTION TO CYBER SECURITY & FUNDAMENTALS OF IDPS TECHNOLOGY ANJANA PJ CYBER SECURITY ADMINISTRATOR WIPRO TECHNOLOGIES , KOCHI INTRODUCTION TO CYBER SECURITY ANJANA P J CYBER SECURITY ADMINISTRATOR WIPRO TECHNOLOGIES KOCHI
  • 2. WHAT IS CYBER SECURITY? • objective is to establish rules and measure to use against attacks over the Internet. • To prevent data breaches • To prevent any unauthorized access/ usage.
  • 3. Cyber security protection revolves around detection, recovery, and response. Network security focuses on preventing access to IT infrastructure through data encryption, password security, and other security measures. Cyber security aims to protect all digital data, while network security seeks to protect transit data only. Network security includes viruses and worms while cyber security is more involved in phishing and pre- texting. CYBER v/s NETWORK SECURITY
  • 4. CYBER SECURITY - STRATEGIES
  • 5. HACKING MALWARE DOS & DDOS SQL INJECTION BRUTE FORCE
  • 6. HACKING Activities that seek to compromise digital devices motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge. Hackers are usually skilled computer programmers with knowledge of computer security.
  • 7.
  • 8. • Malware is a collective term of viruses, worms, Trojans, etc. • Hackers intentionally build Malware to cause damage to computers and networks. • Malware is usually distributed by email as a link or file, requiring the recipient to click on the link or open the file to execute it. TYPES: 1.RANSOMWARE 2.SPYWARE 3.ADWARE 4.VIRUS/WORMS MALWARE
  • 10. COMPARISON Parameter Of Comparison DoS DDoS Definition DoS stands for Denial of Service attack. It is used to crash a website by transferring a load of access requests from a computer. DDoS stands for Distributed Denial of Service attack. It is also used to crash a website and make it unavailable to the users. Facilitated By DoS attack is facilitated by using a single system. DDoS attack is facilitated by using a multiple systems. Severity DoS attack is considered less severe. DDoS attack is a very severe attack. Speed of Attack The speed of a DoS attack is slow. The DDoS attack has a quick speed. Detection A DoS attack can be easily detected by identifying the IP address of the attacking computer. A DDoS attack is difficult to detect as many computers attack the site at the same time.
  • 11. Some attackers use applications and scripts as brute force tools. BRUTE FORCE Brute force is a simple attack method and has a high success rate. Involves ‘guessing’ username and passwords to gain unauthorized access to a system.
  • 12. SQL INJECTION ATTACK SQL injection is a common attack vector that allows users with malicious SQL code to access hidden information by manipulating the backend of databases. A successful SQL injection can result in deletion of entire databases, unauthorized use of sensitive data, and unintended granting of administrative rights to a database.
  • 13. How to prevent ? Password safety Destroy all traces of your personal info on hardware you plan on selling. Do not use open Wi-Fi on your router Update your OS and other software frequently, if not automatically
  • 14. OVERVIEW OF SOME SOLUTIONS FIREWALL INTRUSION DETECTION /PREVENTION SYSTEM WEB APPLICATION FIREWALL PROXY EMAIL SECURITY NETWORK ACCESS CONTROL SIEM VULNERABILITY ANALYSIS & PREVENTION
  • 15. COMMON VENDORS • CISCO • PALO ALTO • CHECKPOINT • RADWARE • IMPERVA • FIREEYE • FORTINET
  • 16. Workforce revealed that the percentage of women in cybersecurity is roughly 24%. In India around 11% of the sector’s workforce Let’s bring out more women leaders ! HAPPY WOMEN’S DAY