SlideShare a Scribd company logo
1 of 16
Understanding
CyberThreats
 Possibility of or attempt of gaining unauthorized "access to a
device or system or network using a data communication
pathway
The 10 most common Cyber Threats
 Malware
 malicious software
 computer viruses, worms, Trojan horses, dishonest
spyware, and malicious rootkits
 Computer virus
 small piece of software that can spread from one
infected computer to another
 corrupt, steal, or delete data on your computer
 Rogue security software
 pop-up window that advertises a security update or
alert on your computer screen
 Trojan horse
 infect their computers with Trojan horse software
simply by downloading an application they thought
was legitimate but was in fact malicious
 Malicious spyware
 used to describe the Trojan application that was
created by cybercriminals to spy on their victims
 Computer worm
 software program that can copy itself from one
computer to another, without human interaction
 replicate in great volume and with great speed
 Botnet
 Group of computers connected to the Internet that
have been compromised by a hacker using a
computer virus or Trojan horse
 Spam
 security context is primarily used to describe email
spam
 unwanted messages in your email inbox
 clutter your mailbox as well as potentially take up
space on your mail server
 Phishing
 Fraudulent attempts by cybercriminals to obtain private
information
 Often appear in the guise of email messages designed to
appear as though they are from legitimate sources
 Rootkit
 collection of tools that are used to obtain
administrator-level access to a computer or a
network of computers
Who Are the Culprits Behind
Cyberthreats?
 How Do Cyberattacks Affect your Organization?
 When your Organization is robbed digitally … the pool of
suspects is limited to the number of people on the face of the
earth that have a laptop and an Internet connection, because
anybody with an Internet connection potentially can attack any
other computer that's tied to the network.
 So the barrier of entry is relatively low.
 Your organization not only suffer direct financial losses due to
cyberattacks but they also face enormous costs when they are
victimized by large-scale data breaches following these attacks.
 These costs include but are not limited to:
 Investigation and forensic costs
 Customer and partner communications costs
 Public relations costs
 Lost revenue due to a damaged reputation
 Regulatory fines
 Civil claims and legal fees

More Related Content

What's hot

How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 

What's hot (20)

Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
Risks threats and vulnerabilities
Risks threats and vulnerabilitiesRisks threats and vulnerabilities
Risks threats and vulnerabilities
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
IT security
IT securityIT security
IT security
 
cyber security
cyber security cyber security
cyber security
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Physical security
Physical securityPhysical security
Physical security
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 

Viewers also liked

Kelas ii sd bahasa indonesia_ismoyo
Kelas ii sd bahasa indonesia_ismoyoKelas ii sd bahasa indonesia_ismoyo
Kelas ii sd bahasa indonesia_ismoyo
isty-alkhawarizmi
 
kagami_comput2015_8
kagami_comput2015_8kagami_comput2015_8
kagami_comput2015_8
swkagami
 
βιωματική εργασία
βιωματική εργασία βιωματική εργασία
βιωματική εργασία
dimkom
 
Huong dan hoan thien ho so 2014
Huong dan hoan thien ho so 2014Huong dan hoan thien ho so 2014
Huong dan hoan thien ho so 2014
hahahehe88
 
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...
rorbic
 
Cách Trị Viêm Khớp Gối
Cách Trị Viêm Khớp GốiCách Trị Viêm Khớp Gối
Cách Trị Viêm Khớp Gối
kristopher829
 

Viewers also liked (19)

ВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕ
ВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕ
ВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕ
 
Быстрый старт.последняя
Быстрый старт.последняяБыстрый старт.последняя
Быстрый старт.последняя
 
Attestato delle competenze. Olivia Ramonda
Attestato delle competenze.  Olivia RamondaAttestato delle competenze.  Olivia Ramonda
Attestato delle competenze. Olivia Ramonda
 
CARTA DE RECOMENDACION ALEJANDRO DIAZ LEON EN
CARTA DE RECOMENDACION ALEJANDRO DIAZ LEON ENCARTA DE RECOMENDACION ALEJANDRO DIAZ LEON EN
CARTA DE RECOMENDACION ALEJANDRO DIAZ LEON EN
 
недобросовестное поведение сторон в MKA и распределение расходов
недобросовестное поведение сторон в MKA и распределение расходовнедобросовестное поведение сторон в MKA и распределение расходов
недобросовестное поведение сторон в MKA и распределение расходов
 
tik multimedia Yessi Trifani
tik multimedia Yessi Trifanitik multimedia Yessi Trifani
tik multimedia Yessi Trifani
 
GMBA concept 2015
GMBA concept 2015GMBA concept 2015
GMBA concept 2015
 
Cowen 2015 Tech Conference (05-15)
Cowen 2015 Tech Conference (05-15) Cowen 2015 Tech Conference (05-15)
Cowen 2015 Tech Conference (05-15)
 
1
11
1
 
Jodoh Rajawali_Kho Ping Hoo
Jodoh Rajawali_Kho Ping HooJodoh Rajawali_Kho Ping Hoo
Jodoh Rajawali_Kho Ping Hoo
 
Kelas ii sd bahasa indonesia_ismoyo
Kelas ii sd bahasa indonesia_ismoyoKelas ii sd bahasa indonesia_ismoyo
Kelas ii sd bahasa indonesia_ismoyo
 
UpdatedResume
UpdatedResumeUpdatedResume
UpdatedResume
 
Ptdee fituici
Ptdee fituiciPtdee fituici
Ptdee fituici
 
kagami_comput2015_8
kagami_comput2015_8kagami_comput2015_8
kagami_comput2015_8
 
βιωματική εργασία
βιωματική εργασία βιωματική εργασία
βιωματική εργασία
 
Huong dan hoan thien ho so 2014
Huong dan hoan thien ho so 2014Huong dan hoan thien ho so 2014
Huong dan hoan thien ho so 2014
 
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...
 
Cách Trị Viêm Khớp Gối
Cách Trị Viêm Khớp GốiCách Trị Viêm Khớp Gối
Cách Trị Viêm Khớp Gối
 
AROTZGI SL
AROTZGI SLAROTZGI SL
AROTZGI SL
 

Similar to 1 understanding cyber threats

Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
JatinRajput67
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Anoop Mishra
 

Similar to 1 understanding cyber threats (20)

Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptx
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 

More from mohamad Hamizi

More from mohamad Hamizi (7)

8 login passwords
8   login passwords 8   login passwords
8 login passwords
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
6 protecting your computer
6   protecting your computer 6   protecting your computer
6 protecting your computer
 
5 instant messaging and email
5   instant messaging and email 5   instant messaging and email
5 instant messaging and email
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices
 
3 ensuring physical and data security
3   ensuring physical and data security 3   ensuring physical and data security
3 ensuring physical and data security
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 

Recently uploaded

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdfUGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
UGC NET Paper 1 Unit 7 DATA INTERPRETATION.pdf
 
Play hard learn harder: The Serious Business of Play
Play hard learn harder:  The Serious Business of PlayPlay hard learn harder:  The Serious Business of Play
Play hard learn harder: The Serious Business of Play
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
VAMOS CUIDAR DO NOSSO PLANETA! .
VAMOS CUIDAR DO NOSSO PLANETA!                    .VAMOS CUIDAR DO NOSSO PLANETA!                    .
VAMOS CUIDAR DO NOSSO PLANETA! .
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Economic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food AdditivesEconomic Importance Of Fungi In Food Additives
Economic Importance Of Fungi In Food Additives
 
Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111Details on CBSE Compartment Exam.pptx1111
Details on CBSE Compartment Exam.pptx1111
 

1 understanding cyber threats

  • 2.  Possibility of or attempt of gaining unauthorized "access to a device or system or network using a data communication pathway
  • 3. The 10 most common Cyber Threats  Malware  malicious software  computer viruses, worms, Trojan horses, dishonest spyware, and malicious rootkits
  • 4.  Computer virus  small piece of software that can spread from one infected computer to another  corrupt, steal, or delete data on your computer
  • 5.  Rogue security software  pop-up window that advertises a security update or alert on your computer screen
  • 6.  Trojan horse  infect their computers with Trojan horse software simply by downloading an application they thought was legitimate but was in fact malicious
  • 7.  Malicious spyware  used to describe the Trojan application that was created by cybercriminals to spy on their victims
  • 8.  Computer worm  software program that can copy itself from one computer to another, without human interaction  replicate in great volume and with great speed
  • 9.  Botnet  Group of computers connected to the Internet that have been compromised by a hacker using a computer virus or Trojan horse
  • 10.  Spam  security context is primarily used to describe email spam  unwanted messages in your email inbox  clutter your mailbox as well as potentially take up space on your mail server
  • 11.  Phishing  Fraudulent attempts by cybercriminals to obtain private information  Often appear in the guise of email messages designed to appear as though they are from legitimate sources
  • 12.  Rootkit  collection of tools that are used to obtain administrator-level access to a computer or a network of computers
  • 13. Who Are the Culprits Behind Cyberthreats?
  • 14.
  • 15.  How Do Cyberattacks Affect your Organization?  When your Organization is robbed digitally … the pool of suspects is limited to the number of people on the face of the earth that have a laptop and an Internet connection, because anybody with an Internet connection potentially can attack any other computer that's tied to the network.  So the barrier of entry is relatively low.
  • 16.  Your organization not only suffer direct financial losses due to cyberattacks but they also face enormous costs when they are victimized by large-scale data breaches following these attacks.  These costs include but are not limited to:  Investigation and forensic costs  Customer and partner communications costs  Public relations costs  Lost revenue due to a damaged reputation  Regulatory fines  Civil claims and legal fees