SlideShare a Scribd company logo
1 of 12
CYBERSECURITY
• Aditya Ratnaparkhi
• Deep Talati
• Akshat Vaidya
• Shivam Raj
• Aashay Kedar
• Rushi Maniar
• Ritvik Shankar
• Harsh Patel
GROUP 1
Introduction
● What is Cybersecurity?
○ Protecting computers
○ Access authorization
○ Relevance to IS
● History
○ Creeper and Reaper
○ First dedicated antivirus company in 1987
○ Morris worm in 1989
● Why Cybersecurity
○ Personal information at stake
○ Affects companies, governments, individuals
○ Lower risk in Cyber crimes
The CIA Triad
● Confidentiality
○ Preventing unauthorized disclosure of
information
● Integrity
○ Validating that your data is trustworthy
and accurate
● Availability
○ Ensuring data is readily available for
authorized users
Cyber Threats
● DDoS (Distributed Denial of Service)
● Backdoor
● Social Engineering
Cyber Threats
● Malware
● Evil Maid
● Eavesdropping
CIA violations in Real World
• WannaCry Ransomware
o Backdoor – Availability
Encrypted data and hackers demanded for ransom
• Facebook/Google Privacy
o Social Engineering – Confidentiality & Integrity
Facebook let personal information of 87 million users
exposed to British Analytics firm to supposedly
disinform users and affect US presidential elections
• GitHub
o DDos – Availability
Hit with most powerful DDos attack ever recorded of
1.35 terabytes per second. Github having a good
cybersecurity system in place recovered in 10 minutes
• Dark Web
o Social Engineering - Confidentiality & Integrity
Since data is not indexed or encrypted, information
flow is potentially vulnerable throughout the Dark
Web
Preventive measures
● Hackers are persistent
● Key to staying ahead is staying
informed
● Various measures must be taken,
both by Enterprises and Individuals
Enterprise level
● Identify the Threats
● Educate Employees about potential
threats
● Implement Two-Factor
Authentication
● Ensure a Strong Sign-Off Policy
● Insure the Company Against
Cybercrime
Individual level
● Responsibly dispose your electronic
devices
● Maintain backups of your data
● Regularly update your antivirus
system
● Use Two/Multi-Factor Authentication
● Use encryption
● Password Management
● Discern the types WiFi networks
● Report cyber scams to FBI’s Internet
Crime Complaint Center or the
Federal Trade Commission
● 2017 – 8 billion connected devices to the internet
● 2023 – 45 billion IoT devices are expected to go online
● As the IoT continually evolves and grows, the number of cyberattacks increases.
● IoT attacks has increased from about 6,000 to 50,000 in the span of one year (2016 –
2017). Rise of 600%.
● Strategies used for IoT attacks:
-Identity compromise
-Device vulnerability
-Unprotected patches and upgrades
-Man-in-the-middle
Future – Cybersecurity with IoT
Strategies for protecting IoT
•Because IoT is a hyper-connected, and
hyper-distributed collection of resources,
there are many behaviors that need to
be monitored to keep connected IoT
devices in check.
References
● https://www.varonis.com/blog/events-that-changed-cybersecurity/
● https://www.google.com/amp/s/www.techly.com.au/2018/02/14/techly-explains-
fascinating-evolution-cybersecurity/amp/
● https://www.sentinelone.com/blog/history-of-cyber-security/
● https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability-
CIA
● https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/
● https://www.incapsula.com/web-application-security/social-engineering-attack.html
● https://en.m.wikipedia.org/wiki/Evil_maid_attack
● https://www.google.com/amp/s/www.csoonline.com/article/3237324/cyber-
attacks-espionage/what-is-a-cyber-attack-recent-examples-show-disturbing-
trends.amp.html
● https://www.cio.com/article/2432981/risk-management/building-an-enterprise-
security-program-in-ten-simple-steps.html

More Related Content

What's hot

Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awarenessJason Murray
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessInnocent Korie
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organizationTejas Wasule
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays worldSibghatullah Khattak
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Cyber threats
Cyber threatsCyber threats
Cyber threatskelsports
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckSlideTeam
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 

What's hot (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
cyber security
cyber securitycyber security
cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security for an organization
Cyber security for an organizationCyber security for an organization
Cyber security for an organization
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Information security in todays world
Information security in todays worldInformation security in todays world
Information security in todays world
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Cyber threats
Cyber threatsCyber threats
Cyber threats
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Cyber security
Cyber securityCyber security
Cyber security
 

Similar to Cybersecurity - Introduction and Preventive Measures

Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five yearsSABBY GILL
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveIvan Sang
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRIZivaro Inc
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...Graeme Wood
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective amarukanda
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanMubarak Al Hadadi
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxnikshaikh786
 

Similar to Cybersecurity - Introduction and Preventive Measures (20)

Cybercrime trends in last five years
Cybercrime trends in last five yearsCybercrime trends in last five years
Cybercrime trends in last five years
 
Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan PerspectiveCybercrime and Cybersecurity Governance: A Kenyan Perspective
Cybercrime and Cybersecurity Governance: A Kenyan Perspective
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Insider Threat Solution from GTRI
Insider Threat Solution from GTRIInsider Threat Solution from GTRI
Insider Threat Solution from GTRI
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
Cyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and OmanCyber crimes Challenges in Global and Oman
Cyber crimes Challenges in Global and Oman
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 

More from Aditya Ratnaparkhi

Firm Analysis of Progressive Corporation
Firm Analysis of Progressive CorporationFirm Analysis of Progressive Corporation
Firm Analysis of Progressive CorporationAditya Ratnaparkhi
 
Temperature Controlled Fan Project
Temperature Controlled Fan ProjectTemperature Controlled Fan Project
Temperature Controlled Fan ProjectAditya Ratnaparkhi
 
Leveraging Data Analysis for Sales
Leveraging Data Analysis for SalesLeveraging Data Analysis for Sales
Leveraging Data Analysis for SalesAditya Ratnaparkhi
 
Marketing Plan for a New Mobile App-Tripper
Marketing Plan for a New Mobile App-TripperMarketing Plan for a New Mobile App-Tripper
Marketing Plan for a New Mobile App-TripperAditya Ratnaparkhi
 
Boots:Hair-Care Sales Promotion
Boots:Hair-Care Sales PromotionBoots:Hair-Care Sales Promotion
Boots:Hair-Care Sales PromotionAditya Ratnaparkhi
 

More from Aditya Ratnaparkhi (8)

Network Setup in Argentina
Network Setup in ArgentinaNetwork Setup in Argentina
Network Setup in Argentina
 
Firm Analysis of Progressive Corporation
Firm Analysis of Progressive CorporationFirm Analysis of Progressive Corporation
Firm Analysis of Progressive Corporation
 
Job Application Database
Job Application DatabaseJob Application Database
Job Application Database
 
Temperature Controlled Fan Project
Temperature Controlled Fan ProjectTemperature Controlled Fan Project
Temperature Controlled Fan Project
 
Leveraging Data Analysis for Sales
Leveraging Data Analysis for SalesLeveraging Data Analysis for Sales
Leveraging Data Analysis for Sales
 
Marketing Plan for a New Mobile App-Tripper
Marketing Plan for a New Mobile App-TripperMarketing Plan for a New Mobile App-Tripper
Marketing Plan for a New Mobile App-Tripper
 
Boots:Hair-Care Sales Promotion
Boots:Hair-Care Sales PromotionBoots:Hair-Care Sales Promotion
Boots:Hair-Care Sales Promotion
 
Nike Marketing Presentation
Nike Marketing PresentationNike Marketing Presentation
Nike Marketing Presentation
 

Recently uploaded

Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 

Recently uploaded (20)

Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 

Cybersecurity - Introduction and Preventive Measures

  • 1. CYBERSECURITY • Aditya Ratnaparkhi • Deep Talati • Akshat Vaidya • Shivam Raj • Aashay Kedar • Rushi Maniar • Ritvik Shankar • Harsh Patel GROUP 1
  • 2. Introduction ● What is Cybersecurity? ○ Protecting computers ○ Access authorization ○ Relevance to IS ● History ○ Creeper and Reaper ○ First dedicated antivirus company in 1987 ○ Morris worm in 1989 ● Why Cybersecurity ○ Personal information at stake ○ Affects companies, governments, individuals ○ Lower risk in Cyber crimes
  • 3. The CIA Triad ● Confidentiality ○ Preventing unauthorized disclosure of information ● Integrity ○ Validating that your data is trustworthy and accurate ● Availability ○ Ensuring data is readily available for authorized users
  • 4. Cyber Threats ● DDoS (Distributed Denial of Service) ● Backdoor ● Social Engineering
  • 5. Cyber Threats ● Malware ● Evil Maid ● Eavesdropping
  • 6. CIA violations in Real World • WannaCry Ransomware o Backdoor – Availability Encrypted data and hackers demanded for ransom • Facebook/Google Privacy o Social Engineering – Confidentiality & Integrity Facebook let personal information of 87 million users exposed to British Analytics firm to supposedly disinform users and affect US presidential elections • GitHub o DDos – Availability Hit with most powerful DDos attack ever recorded of 1.35 terabytes per second. Github having a good cybersecurity system in place recovered in 10 minutes • Dark Web o Social Engineering - Confidentiality & Integrity Since data is not indexed or encrypted, information flow is potentially vulnerable throughout the Dark Web
  • 7. Preventive measures ● Hackers are persistent ● Key to staying ahead is staying informed ● Various measures must be taken, both by Enterprises and Individuals
  • 8. Enterprise level ● Identify the Threats ● Educate Employees about potential threats ● Implement Two-Factor Authentication ● Ensure a Strong Sign-Off Policy ● Insure the Company Against Cybercrime
  • 9. Individual level ● Responsibly dispose your electronic devices ● Maintain backups of your data ● Regularly update your antivirus system ● Use Two/Multi-Factor Authentication ● Use encryption ● Password Management ● Discern the types WiFi networks ● Report cyber scams to FBI’s Internet Crime Complaint Center or the Federal Trade Commission
  • 10. ● 2017 – 8 billion connected devices to the internet ● 2023 – 45 billion IoT devices are expected to go online ● As the IoT continually evolves and grows, the number of cyberattacks increases. ● IoT attacks has increased from about 6,000 to 50,000 in the span of one year (2016 – 2017). Rise of 600%. ● Strategies used for IoT attacks: -Identity compromise -Device vulnerability -Unprotected patches and upgrades -Man-in-the-middle Future – Cybersecurity with IoT
  • 11. Strategies for protecting IoT •Because IoT is a hyper-connected, and hyper-distributed collection of resources, there are many behaviors that need to be monitored to keep connected IoT devices in check.
  • 12. References ● https://www.varonis.com/blog/events-that-changed-cybersecurity/ ● https://www.google.com/amp/s/www.techly.com.au/2018/02/14/techly-explains- fascinating-evolution-cybersecurity/amp/ ● https://www.sentinelone.com/blog/history-of-cyber-security/ ● https://whatis.techtarget.com/definition/Confidentiality-integrity-and-availability- CIA ● https://www.cloudflare.com/learning/ddos/what-is-a-ddos-attack/ ● https://www.incapsula.com/web-application-security/social-engineering-attack.html ● https://en.m.wikipedia.org/wiki/Evil_maid_attack ● https://www.google.com/amp/s/www.csoonline.com/article/3237324/cyber- attacks-espionage/what-is-a-cyber-attack-recent-examples-show-disturbing- trends.amp.html ● https://www.cio.com/article/2432981/risk-management/building-an-enterprise- security-program-in-ten-simple-steps.html

Editor's Notes

  1. Bank account statements, personal information, credit card numbers, trade secrets, government documents are some examples of sensitive information. Corrupted or manipulated. human error or intentional tampering, banks are more concerned about the integrity of financial records Information can be erased or become inaccessible.