SlideShare a Scribd company logo
1 of 15
Cyber Security
A professional approach to protection
What is Cyber? What is Cyber
Security?
Elements of
Cyber Security
Types of Cyber
Threats
Latest Cyber
Threats
End-User
Protection
Cyber
Safety Tips
What is Cyber?
Storing Data
Protecting
Data
Accessing
Data
Processing
Data
Transmitting
Data
Linking Data
What is Cyber Security?
Cyber security refers to the body of technologies,
processes, and practices designed to protect networks,
devices, programs, and data from attack, damage, or
unauthorized access. Cyber security may also be
referred to as information technology security.
Elements of Cyber Security
NETWORK
SECURITY
Practice of securing a
computer network
APPLICATION
SECURITY
Keeping software and
devices free of threats
INFORMATION
SECURITY
Protects the integrity and
privacy of data
OPERATIONAL
SECURITY
Protects and handles
data assets
DISASTER
RECOVERY
Restores operations and
information after the
disaster
CLOUD
SECURITY
Protecting data in a 100%
online environment
Types of Cyber Threats
Cyber-crime
1
Cyber-attack
2
Cyber-terrorism
3
There are three forms of cyber-threats:
Methods used to threaten Cyber Security
PHISHING
Targeting victims
with fake emails
MALWARE
Software created
to disrupt or
damage user’s
computer
MAN-IN-THE-
MIDDLE- ATTACK
Intercepts
communication
between two
individuals to
steal data
SQL INJECTION
Take control and
steal data from a
database
DOS ATTACK
Makes the computer
system inaccessible for
the users
Latest Cyber Threats
DRIDEX MALWARE
Affects the public, government,
infrastructure and business worldwide
SCAM DATING SITES
Affects people emotionally and
personally
EMOTET MALWARE
Steals data and load malware
Dridex Malware
The U.S. Department of Justice
(DOJ) charged the cyber-criminal
group in a global Dridex
malware attack.
6 1
2
4 3
5
This has affected the public,
government, infrastructure, and
businesses worldwide..
Dridex is a financial Trojan with
a range of capabilities.
Affecting victims since 2014, it
infects computers through
phishing emails or existing
malware.
Stealing passwords, banking
details, and personal data, it has
caused massive financial losses
The U.K.’s National Cyber
Security Centre advises to
“ensure devices are patched,
anti-virus is turned on and up to
date and files are backed up”.
Emotet Malware
The Australian Cyber Security Centre
warned national organizations about a
global cyber threat from Emotet
malware
1
2
3
Sophisticated Trojan that can steal data
and load other malware
Thrives on unsophisticated password
Scam Dating Sites
FBI warned U.S. citizens to be aware of
the confidence fraud such as dating
sites, chat rooms, and apps
1
2
3
Perpetrators take advantage of people
seeking new partners, duping victims
into giving away personal data.
The FBI reports that this threat has
affected 114 victims in New Mexico in
2019, with financial losses amounting to
$1.6 million.
Why Cyber Security is important?
Government, Military, corporate world,
financial, and medical organizations, collect,
process, and store unmatched data on
devices.
Data can be sensitive information, like
intellectual property, financial data, or
personal information, and data with negative
consequences.
Organizations transmit sensitive data across
networks and to other devices while doing
business.
Thus, Cyber Security describes the discipline
dedicated to protecting that information and
systems that areused to process or store
them
Detect and remove
malicious code hidden
in Master Boot Record
(MBR) and are designed
to encrypt or wipe data
End-User Protection
End-user protection
or endpoint security
is a crucial aspect of
cyber security
Cyber-security relies on
cryptographic protocols
to encrypt emails, files,
and other critical data
Scans computers for
pieces of malicious
code, quarantines this
code, and then removes
Confine potentially
malicious programs to a
virtual environment
separate from a user's
network
Electronic security
protocols also focus on
real-time malware
detection
Cyber Safety Tips
Do not open email
attachments from
unknown senders
Avoid using
unsecure Wi-Fi
networks in public
places
Use Anti-Virus
software
Update your
software and
operating system
Use strong
passwords
Do not click on links
in emails from
unknown senders
Cybersecurity

More Related Content

What's hot

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)Gaurav Dalvi
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Data Security
Data SecurityData Security
Data SecurityAkNirojan
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 

What's hot (20)

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information security
Information securityInformation security
Information security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Network security
Network securityNetwork security
Network security
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Data Security
Data SecurityData Security
Data Security
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 

Similar to Cybersecurity

Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxhimanshuratnama
 
Computer Security 101 by Montaigne
Computer Security 101 by Montaigne Computer Security 101 by Montaigne
Computer Security 101 by Montaigne MontaigneStudios
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdfAnupmaMunshi
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Information security
Information securityInformation security
Information securityIshaRana14
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxmalik298381
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. Info-Tech
 
Cyber security
Cyber securityCyber security
Cyber securityAkdu095
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxAschalewAyele2
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfCareerera
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 

Similar to Cybersecurity (20)

Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptxCyber Security in detail PPT BY HIMANXU.pptx
Cyber Security in detail PPT BY HIMANXU.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer Security 101 by Montaigne
Computer Security 101 by Montaigne Computer Security 101 by Montaigne
Computer Security 101 by Montaigne
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Information security
Information securityInformation security
Information security
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
CYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptxCYBERSECURITYcoll[1].pptx
CYBERSECURITYcoll[1].pptx
 
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL. CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
CYBERSECURITY AWARENESS AND BEST PRACTICES AT ALL WORKING LEVEL.
 
Cyber security
Cyber securityCyber security
Cyber security
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Chapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptxChapter 5 Selected Topics in computer.pptx
Chapter 5 Selected Topics in computer.pptx
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Seminar ppt.pptx
Seminar ppt.pptxSeminar ppt.pptx
Seminar ppt.pptx
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 

More from Sabiha M

Top-Down Estimation Approach
Top-Down Estimation ApproachTop-Down Estimation Approach
Top-Down Estimation ApproachSabiha M
 
Kernel Computing
Kernel ComputingKernel Computing
Kernel ComputingSabiha M
 
Goal-Setting Theory of Motivation
Goal-Setting Theory of MotivationGoal-Setting Theory of Motivation
Goal-Setting Theory of MotivationSabiha M
 
Decomposition
DecompositionDecomposition
DecompositionSabiha M
 
Advanced SQL
Advanced SQLAdvanced SQL
Advanced SQLSabiha M
 
Job Sequencing with Deadlines
Job Sequencing with DeadlinesJob Sequencing with Deadlines
Job Sequencing with DeadlinesSabiha M
 
LAN, WAN, MAN
LAN, WAN, MANLAN, WAN, MAN
LAN, WAN, MANSabiha M
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation InternetSabiha M
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field CommunicationSabiha M
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud ComputingSabiha M
 
Remote Method Invocation
Remote Method InvocationRemote Method Invocation
Remote Method InvocationSabiha M
 
Apache web server
Apache web serverApache web server
Apache web serverSabiha M
 
Types of parsers
Types of parsersTypes of parsers
Types of parsersSabiha M
 

More from Sabiha M (13)

Top-Down Estimation Approach
Top-Down Estimation ApproachTop-Down Estimation Approach
Top-Down Estimation Approach
 
Kernel Computing
Kernel ComputingKernel Computing
Kernel Computing
 
Goal-Setting Theory of Motivation
Goal-Setting Theory of MotivationGoal-Setting Theory of Motivation
Goal-Setting Theory of Motivation
 
Decomposition
DecompositionDecomposition
Decomposition
 
Advanced SQL
Advanced SQLAdvanced SQL
Advanced SQL
 
Job Sequencing with Deadlines
Job Sequencing with DeadlinesJob Sequencing with Deadlines
Job Sequencing with Deadlines
 
LAN, WAN, MAN
LAN, WAN, MANLAN, WAN, MAN
LAN, WAN, MAN
 
Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation Internet
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
Green Cloud Computing
Green Cloud ComputingGreen Cloud Computing
Green Cloud Computing
 
Remote Method Invocation
Remote Method InvocationRemote Method Invocation
Remote Method Invocation
 
Apache web server
Apache web serverApache web server
Apache web server
 
Types of parsers
Types of parsersTypes of parsers
Types of parsers
 

Recently uploaded

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Recently uploaded (20)

APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

Cybersecurity

  • 1. Cyber Security A professional approach to protection
  • 2. What is Cyber? What is Cyber Security? Elements of Cyber Security Types of Cyber Threats Latest Cyber Threats End-User Protection Cyber Safety Tips
  • 3. What is Cyber? Storing Data Protecting Data Accessing Data Processing Data Transmitting Data Linking Data
  • 4. What is Cyber Security? Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
  • 5. Elements of Cyber Security NETWORK SECURITY Practice of securing a computer network APPLICATION SECURITY Keeping software and devices free of threats INFORMATION SECURITY Protects the integrity and privacy of data OPERATIONAL SECURITY Protects and handles data assets DISASTER RECOVERY Restores operations and information after the disaster CLOUD SECURITY Protecting data in a 100% online environment
  • 6. Types of Cyber Threats Cyber-crime 1 Cyber-attack 2 Cyber-terrorism 3 There are three forms of cyber-threats:
  • 7. Methods used to threaten Cyber Security PHISHING Targeting victims with fake emails MALWARE Software created to disrupt or damage user’s computer MAN-IN-THE- MIDDLE- ATTACK Intercepts communication between two individuals to steal data SQL INJECTION Take control and steal data from a database DOS ATTACK Makes the computer system inaccessible for the users
  • 8. Latest Cyber Threats DRIDEX MALWARE Affects the public, government, infrastructure and business worldwide SCAM DATING SITES Affects people emotionally and personally EMOTET MALWARE Steals data and load malware
  • 9. Dridex Malware The U.S. Department of Justice (DOJ) charged the cyber-criminal group in a global Dridex malware attack. 6 1 2 4 3 5 This has affected the public, government, infrastructure, and businesses worldwide.. Dridex is a financial Trojan with a range of capabilities. Affecting victims since 2014, it infects computers through phishing emails or existing malware. Stealing passwords, banking details, and personal data, it has caused massive financial losses The U.K.’s National Cyber Security Centre advises to “ensure devices are patched, anti-virus is turned on and up to date and files are backed up”.
  • 10. Emotet Malware The Australian Cyber Security Centre warned national organizations about a global cyber threat from Emotet malware 1 2 3 Sophisticated Trojan that can steal data and load other malware Thrives on unsophisticated password
  • 11. Scam Dating Sites FBI warned U.S. citizens to be aware of the confidence fraud such as dating sites, chat rooms, and apps 1 2 3 Perpetrators take advantage of people seeking new partners, duping victims into giving away personal data. The FBI reports that this threat has affected 114 victims in New Mexico in 2019, with financial losses amounting to $1.6 million.
  • 12. Why Cyber Security is important? Government, Military, corporate world, financial, and medical organizations, collect, process, and store unmatched data on devices. Data can be sensitive information, like intellectual property, financial data, or personal information, and data with negative consequences. Organizations transmit sensitive data across networks and to other devices while doing business. Thus, Cyber Security describes the discipline dedicated to protecting that information and systems that areused to process or store them
  • 13. Detect and remove malicious code hidden in Master Boot Record (MBR) and are designed to encrypt or wipe data End-User Protection End-user protection or endpoint security is a crucial aspect of cyber security Cyber-security relies on cryptographic protocols to encrypt emails, files, and other critical data Scans computers for pieces of malicious code, quarantines this code, and then removes Confine potentially malicious programs to a virtual environment separate from a user's network Electronic security protocols also focus on real-time malware detection
  • 14. Cyber Safety Tips Do not open email attachments from unknown senders Avoid using unsecure Wi-Fi networks in public places Use Anti-Virus software Update your software and operating system Use strong passwords Do not click on links in emails from unknown senders