Cyber security for an organization

757 views

Published on

Cyber security for an organization

Published in: Technology
1 Comment
1 Like
Statistics
Notes
No Downloads
Views
Total views
757
On SlideShare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
58
Comments
1
Likes
1
Embeds 0
No embeds

No notes for slide

Cyber security for an organization

  1. 1. CyberSecurityforanOrganization Presented By Tejas C. Wasule Govt. College of Engineering, Amravati Suraj A. Jaiwal Govt. College of Engineering, Amravati
  2. 2. 1. Introduction to Cyber Security 2. Need of Cyber Security 3. Types of Cyber Security 4. Types of Cyber Attacks And Preventions on it 5. Conclusion 6. References Contents
  3. 3. Introduction to Cyber Security What is CyberSpace? •Worldwide Network of Computers •Open to Public (Internet) What is CyberSecurity? Technologies & Processes to Protect • Computers • Networks • Data from Unauthorized Users • Vulnerabilities
  4. 4. Need of Cyber Security 1. To Protect Sensitive Business & Personal Information 2. Safeguard National Security 3. To Protect Sensitive Data of • Government • Military • Corporation • Financial Institutions • Hospital & ETC
  5. 5. Email Mobile Network Data Website Types of Cyber Security Security 1. Personal Files 2. Payment Information 3. Bank Account Details 4. Customer’s Information
  6. 6. Data Website Email Mobile Network Types of Cyber Security Security 1. To Protect Online Data on Server 2. To Protect Online Operations of an Organization
  7. 7. Data Website Email Mobile Network Security 1. To protect Sensitive Information Sent Via Email Types of Cyber Security
  8. 8. Data Website Email Mobile Network Security Types of Cyber Security 1. Use Security Software on Smartphones 2. Encrypt Data on Mobile Devices 3. Reporting Procedure for Lost Mobile 4. Use Authentication
  9. 9. Data Website Email Mobile Network Security Types of Cyber Security 1. Secure Internal Network & Cloud Services 2. Secure & Encrypt your Organization's Wi-Fi 3. Set Safe Browsing Rule
  10. 10. Cyber Attacks…? 1. What is CyberAttack? Attempt to • Destroy • Expose • Alter • Disable Unauthorized use of an Asset 2. Why CyberAttacks Become Possible? • Vulnerability • Spam • Virus
  11. 11. 1. SQL injection • Code Injection Technique that Exploits a Security Vulnerability in Application • Occurs at the Database layer of Application 2. SQL - Structured Query Language • Used to communicate with the database • ANSI-compliant SQL MITM XSS DOS SQL Injection Phishing Types of Cyber Attacks & Preventions SQL Injection
  12. 12. • admin' -- • admin' # • admin'/* • or 1=1-- • ' or 1=1# • ' or 1=1/* • ') or '1'='1-- • ') or ('1'='1— MITM XSS DOS SQL Injection Phishing Types of Cyber Attacks & Preventions SQL Injection Login Tricks
  13. 13. MITM XSS DOS SQL Injection Phishing Types of Cyber Attacks & Preventions SQL Injection-DEMO
  14. 14. MITM XSS DOS SQL Injection Phishing Types of Cyber Attacks & Preventions SQL Injection Preventions
  15. 15. SQL Injection Phishing MITM XSS DOS Types of Cyber Attacks & Preventions Phishing • Is the act of attempting to acquire information such as Usernames, Passwords, and Credit card • Using Fake Web-Pages identical to the legitimate one.
  16. 16. SQL Injection Phishing MITM XSS DOS Types of Cyber Attacks & Preventions Phishing-DEMO
  17. 17. SQL Injection Phishing MITM XSS DOS Types of Cyber Attacks & Preventions Phishing Preventions 1. Pay attention to the URL of a website. 2. Be suspicious of unsolicited phone calls, visits. 3. Do not provide personal information or information about your organization 4. Do not respond to email solicitations for personal information 5. Don't send sensitive information over the Internet before checking a website's security
  18. 18. SQL Injection Phishing MITM XSS DOS Types of Cyber Attacks & Preventions Man-In-The-Middle Attack The MITM intercepts communications between two systems and is performed when the attacker is in control of a router along normal point of traffic.
  19. 19. SQL Injection Phishing MITM XSS DOS Types of Cyber Attacks & Preventions Cross Site Scripting(XSS) Attack XSS is a security breach that takes advantage of dynamically generated Web pages.
  20. 20. SQL Injection Phishing MITM XSS DOS Types of Cyber Attacks & Preventions Daniel of Service(DOS) Attack It basically means, launching an attack, which will temporarily make the services, offered by the Network unusable by legitimate users.
  21. 21. Conclusion 1. The Goal of Secure Computing •Confidentiality •Integrity •Availability 2.Threats to Security in Computing •Interception •Interruption •Modification •Fabrication3. Controls available to prevent the threats •Encryption & Programing Controls •OS & Network Controls •Administrative Controls •Laws & Ethics
  22. 22. References1. http://en.wikipedia.org/wiki/Cyber_secu rity_standards 2. http://www.ccs.njit.edu/statica 3. http://www.unisys.com
  23. 23. Thank you
  24. 24. Any Que..??

×