Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cybersecurity PPT Slide Template

8,652 views

Published on

SECURE YOUR SYSTEMS AND DATA AGAINST ONLINE THREATS!

There are various threats in the world wide web, to your data and IT systems.
Cybersecurity deals with these dangers and risks of information and communication technology. It is enormously important for businesses and private citizens to protext sensitive information. All data that falls into the wrong hands, can be used in criminal activities.

To prevent this, an effective cybersecurity is needed:
http://www.presentationload.com/cybersecurity-powerpoint-template.html

Stay One Step Ahead of Hackers, Viruses and Bots

In a world of rapidly evolving technical advancements, cybersecurity must be continuously revised. Our PowerPoint presentation contains charts and graphics that provide an overview of cybersecurity. Visualize details of countless types of cybercrime and use our charts to become familiar with successful security concepts and strategies.

Published in: Internet
  • Be the first to comment

Cybersecurity PPT Slide Template

  1. 1. PREMIUM POWERPOINT SLIDES Cybersecurity
  2. 2. CYBERSECURITY POWERPOINT TEMPLATE
  3. 3. DEFINITION Cybersecurity Cybersecurity secures the connection of physical units (e.g. equipment and control units) to external, virtual space, like the Internet. This includes data generation, transmission, storage and analysis on physical and non-physical interfaces. German Electrical and Electronic Manufacturers’ Association, 2014
  4. 4. NETWORK Cyberspace INDUSTRIAL REVOLUTION SOCIAL NETWORKS DATA STORAGE MARKET PLACE Online BANKING E-government POLICY I II III IV VIV
  5. 5. NETWORK Safety Aspects of Industry 4.0 INDUSTRY 4.0 Know-how & Confidentiality Hedging Production Losses Product Liability Product Monitoring Obligations Privacy by Design IT Security
  6. 6. NETWORK Market Place Today, trade and service industries have to present themselves on the Internet and offer their services. Buyers have to give them sensitive, personal information, which can lead to a data breach. Example: Shops Amazon, Zalando, Alibaba, Lesara, Conleys etc. Travel Expedia, TUI, WEG.de, Travel24 etc.
  7. 7. NETWORK Policy: E-Government Use (in %) of Individuals Across Countries (2015 Survey) 0 10 20 30 40 50 60 70 Interaction with state agencies Accessing information on public websites Downloading official forms Submitting completed forms Spain Great Britain Germany France
  8. 8. THREATS Threats in Cyberspace INFORMATION & ABUSE  Targeted government control and influence of citizens  Propaganda  Consciously communicating false information  State espionage  Data breach  Identity theft  Hackers  Internet crimes, encouraging sedition  Terrorism
  9. 9. THREATS Threat Tree (example: open safe) Install malware Uncover user passwords Divulge confidential information Spam Other actionsPhishing Detect codes by penetrating the system
  10. 10. THREATS Evaluation of Cyber Risks Very Low Low Medium High Very High PROBABILITY OF OCCURRENCE EXTENTOFDAMAGE Unacceptable risk Acceptable risk
  11. 11. FINANCIAL SYSTEMS ENERGY EQUIPMENT AVIATION AUTOMOTIVE INDUSTRY GOVERNMENT LARGE ENTERPRISES CONSUMER DEVICES INDUSTRIAL EQUIPMENT THREATS Vulnerable Systems
  12. 12. ATTACKER BOTNETS CONTROLERS INFECTED TARGET Can attacks all IT systems Can send infected and dangerous (spam) emails Networks consisting of several computers Can send infected and dangerous (spam) emails INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED INFECTED hACKER hACKER THREATS Botnets
  13. 13. NEWS Domino Effect on Security Incidents Dominoeffect on security incidents
  14. 14. NEWS Cyber Threats (2014) 2014: Multiple attacks against Sony crashed the PS network and forced Sony to ban “The Interview“ in cinemas. Cyber attacks on the German Bundestag using Trojan software 19,000 pages of TV5 Monde were attacked Cybercriminals used malware to gain access to credit card information (56 million shoppers) Hackers stole personal data from 40 million consumers (credit card, names, phone numbers, etc.) The cybercrime statistic of the Bundeskriminalamt (German Federal Criminal Office) was a total of 64,426 incidents in 2014 in Germany
  15. 15. SECURITY MEASURES Standards for Internet Security INTERNETSICHERHEIT KONFIGURATION INDIVIDUELLE ANPASSUNGEN GRUNDARCHITEKTUR Secure provisioning of email servers Securing a server Secure use of emails Secure wireless connections Secure deployment of web services Securing PC clients Secure use of web services Secure Internet connection of local networks Secure remote access to local networks Secure Internet telephony
  16. 16. SECURITY The Three Lines of Defence Model Governance Body/ Board/ AuditCommittee Senior Management REGULATOR EXTERNALAUDIT 3. Safety Barrier Internal Audit 1. Safety Barrier Internal Controlling Measures Management Controlling 2. Safety Barrier Security Risk Management Quality Inspection Compliance Finance Controlling
  17. 17. SECURITY Creating an Effective Cybersecurity Program RESPOND CYBER SECURITY SERVICES Physical security proper case responses the ongoing operation
  18. 18. Three recommended actions for more security on the Internet: 1. Ignore untrustworthy offers and emails. 2. Periodically update operating systems and browsers on computers. 3. Install current protection programs with continuous updates. (e.g. antivirus, firewall, intrusion detection systems, honeypots, spam filtering, encryption software, vulnerability scanner, test programs for security software, anti-phishing software, anti-spyware) SECURITY Cybersecurity for Individuals Cyber attacks can have dramatic consequences for individuals. Data can be stolen, operating systems blocked and bank accounts accessed.
  19. 19. CHECKLIST Cybersecurity Questions for a Business Do we treat cybersecurity as a business or IT responsibility? Do our security goals align with business priorities? Have we identified and protected our most valuable processes and information? Does our business culture support a secure cyber environment? Do we focus on security compliance or security capability? Are we certain our third-party partners are securing our most valuable information? Do we regularly evaluate the effectiveness of our security? Do we have a plan for responding to a security breach?
  20. 20. Click here to visit www.PresentationLoad.com DOWNLOAD POWERPOINT SLIDES

×