SlideShare a Scribd company logo
QN. 01
Review cyber-security and its cost
to the world economy.
PART 1. INTRODUCTION
 Cyber security Is the body of technologies,
processes, and practices designed to protect
networks, computers, programs and data from
attack, damage or unauthorized access.
SECURITY FUNDAMENTALS.
Confidentiality
 Is about preventing the disclosure of data to
unauthorized parties.
Its Standard measures to establish confidentiality
include:
 Data encryption
 Two-factor authentication
 Biometric verification
 Security tokens
Integrity:
 Refers to protecting information from being
modified by unauthorized parties. Standard
measures to guarantee integrity include:
Cryptographic checksums, Using file permissions
Uninterrupted power supplies, Data backups
Availability
 Is making sure that authorized parties are able to
access the information when needed.
 Standard measures to guarantee availability
include:
 Backing up data to external drives
 Implementing firewalls
 Having backup power supplies
 Data redundancy
Why is cyber security
important?
 This is due to Cyber-attacks which can be
extremely expensive for businesses to endure.
 Cyber-attacks can be classified into the following
categories:
 Web-based attacks
 System-based attacks
 Web-based attacks
1. Injection attacks
 It is the attack in which some data will be
injected into a web application to manipulate the
application and fetch the required information.
 Example- SQL Injection, code Injection, log
Injection, XML Injection etc
Web-based attacks cont….
2. Phishing
 Phishing is a type of attack which attempts to
steal sensitive information like user login
credentials and credit card number. It occurs
when an attacker is masquerading as a
trustworthy entity in electronic communication
Web-based attacks cont.….
3. Denial of Service.
 It is an attack which meant to make a server or
network resource unavailable to the users. It
accomplishes this by flooding the target with
traffic or sending information that triggers a
crash.
 It uses the single system and single internet
connection to attack a server
Web-based attacks cont….
4. Man in the middle attacks.
 It is a type of attack that allows an attacker to
intercepts the connection between client and
server and acts as a bridge between them. Due to
this, an attacker will be able to read, insert and
modify the data in the intercepted connection.
System-based attacks
1. Virus
 It is a type of malicious software program that
spread throughout the computer files without the
knowledge of a user.
System-based attacks
cont…
2. Worm.
 It is a type of malware whose primary function is
to replicate itself to spread to uninfected
computers.
 It works same as the computer virus. Worms
often originate from email attachments that
appear to be from trusted senders.
System-based attacks
cont…
3. Trojan horse.
 It is a malicious program that occurs unexpected
changes to computer setting and unusual activity,
even when the computer should be idle.
 It misleads the user of its true intent.
 It appears to be a normal application but when
opened/executed some malicious code will run in the
background.
System-based attacks
cont…
4. Backdoors.
 It is a method that bypasses the normal
authentication process.
 A developer may create a backdoor so that an
application or operating system can be accessed
for troubleshooting or other purposes.
System-based attacks
cont…
5. Bots
 A bot (short for "robot") is an automated process
that interacts with other network services.
 Some bots program run automatically, while
others only execute commands when they receive
specific input.
 Common examples of bots program are the
crawler, chatroom bots, and malicious bots.
PART 2. The above mentioned cyber-
security attacks cost the world economy
as follows.
1.Size of company
 The more employees you have the more opportunities for a cyber-attack to
occur (more computers, workstations, and devices are vulnerable to attacks).
 Larger organizations tend to require more in their cyber security spending than
smaller businesses.
 Example, Large enterprises like Microsoft spend $1 billion to drive
cybersecurity initiatives
 The financial industry spends 10% of its information Technology (IT) budget
average on cybersecurity.
 Cyber-crime cost businesses in the United States more than $3.5 billion in
internet-related cyber crimes and damages according to a 2019 FBI report.
Cyber security cost factors Cont.…
2. Type of data
Businesses that collect more sensitive data will need additional security
layers to ensure they are compliant with industry-standard legal
compliance.
 More money will be required to protect data that comes under
compliance
 For example, you need a bigger budget if your data falls under Health
Insurance Portability and Accountability act (HIPAA) or Businesses in
commerce, Payment Card Industry (PCI) to ensure privacy and
prevent breaches
 General business may need to allocate 0.2% to 0.9% of its annual
revenues to drive cybersecurity initiatives.
Cyber security cost factors Cont.…
3. Products and Services
 The more protection you have in the form of products and services,
the higher the cost. Example Firewalls range in prices between $400
and $6,000.
 Businesses that choose both cyber security products and services
should expect to pay more than if they just select products. For
example, a bank may need 24/7 monitoring to identify and track
threats.
 Example , The volume of cyber security services you use, like
antivirus, will determine your cost. According to Kaspersky, such a
setup can cost a business $54,300 on average per year. In addition,
companies also need to pay one-time costs of around $3,000.
 Using cloud-based security solutions can incur $33,500 annually on
cybersecurity
Cyber security cost factors Cont.…
4. Self-Install vs. Professional Install
 Cyber security companies can sell security products to set up
yourselves, or to contact a security vendor to help install the product
(usually for additional setup fees).
 A dedicated chief information security officer (CISO) can increase
prices/cost
 An average firewall configuration costs between $450 and $2,500.
 Expected cost for a vulnerability assessment: $1,500 – $6,000 for a
network with 1-3 servers and $5,000 – $10,000 for a network with 5-8
servers.
Cyber security cost factors Cont.…
5. Professional Audits
 Organizations can periodically conduct third-party audits to ensure they are
updated with the latest security and compliance standards.
 this involve hire personnel or rely on cybersecurity provider for added costs.
 Audit reveal that, the latest forecast is for global ransomware damage costs
to reach $20 billion by 2021 .
QN. 02
Explain Cyber security index, ranking of African
Countries and position of Tanzania.
THE CYBER SECURITY INDEX
 Is a sentiment-based measure of the risk to the corporate, industrial, and
governmental information infrastructure from a spectrum of cybersecurity
threats.
 To raise awareness of the importance and different dimensions of the issues
has classified African’s Member States into three categories:-
i. Leading stage: refers to the 6 countries (i.e., GCI score in the 50th percentile
and higher) that demonstrate high commitment.
ii. Maturing stage: refers to the 11 countries (i.e., GCI score between the 20th
and 49th percentile) that have developed complex commitments, and engage
in cybersecurity programs and initiatives.
iii. Initiating stage: refers to the 27 countries (i.e., GCI score less than the 20th
percentile) that have started to make commitments in cybersecurity.
TANZANIA POSITION IN
CYBERSECURITY INDEX
 Cyber security has improved dramatically in Tanzania
over the last three years apparently due to a conducive
legal and regulatory framework, according to the 2018
Global Cyber Security Index. Tanzania is now one of the
11 leading African countries; ranking 5th in the maturing
stage; up from being 12th in 2017.
 The table below show the Global Cyber Security
Index for Africa states ;-
To wind up , Better accounting for cybersecurity
will be essential for the digital world into which we
are moving to ensure return of technological
investment
THE END

More Related Content

What's hot

Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
Tapan Khilar
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
Simon Salter
 
cyber security
cyber securitycyber security
cyber security
BasineniUdaykumar
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
Anshuman Tripathi
 
cyber crime
cyber crimecyber crime
cyber crime
Mosuud jilani lipon
 
Cyber attack
Cyber attackCyber attack
Cyber attack
Manjushree Mashal
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
Shreeraj Nair
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Avinash
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
loverakk187
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
Accenture
 
Cyber crime
Cyber crimeCyber crime
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
Rajat Jain
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
Shishupal Nagar
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
Tam Nguyen
 

What's hot (20)

Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
cyber security
cyber securitycyber security
cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cybercrime and security
Cybercrime and securityCybercrime and security
Cybercrime and security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Cybersecurity Issues and Challenges
Cybersecurity Issues and ChallengesCybersecurity Issues and Challenges
Cybersecurity Issues and Challenges
 

Similar to ASSIGNMENT CYBER SECURITY ppt.pptx

Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
Haley Johnson
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
ReadWrite
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
Fibonalabs
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
RakeshPatel583282
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
MahalakshmiShetty3
 
C018131821
C018131821C018131821
C018131821
IOSR Journals
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
arnoldmeredith47041
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
IRJET Journal
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
Jennifer Letterman
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
Sitamarhi Institute of Technology
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
Careerera
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
fathwaitewalter
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Illumeo
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 

Similar to ASSIGNMENT CYBER SECURITY ppt.pptx (20)

Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Cyber.pptx
Cyber.pptxCyber.pptx
Cyber.pptx
 
C018131821
C018131821C018131821
C018131821
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...Basic Home Computer Network And Computer Network Security...
Basic Home Computer Network And Computer Network Security...
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
Top Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdfTop Cyber Security Interview Questions and Answers 2022.pdf
Top Cyber Security Interview Questions and Answers 2022.pdf
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 

Recently uploaded

manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 

Recently uploaded (19)

manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 

ASSIGNMENT CYBER SECURITY ppt.pptx

  • 1. QN. 01 Review cyber-security and its cost to the world economy.
  • 2. PART 1. INTRODUCTION  Cyber security Is the body of technologies, processes, and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access.
  • 3. SECURITY FUNDAMENTALS. Confidentiality  Is about preventing the disclosure of data to unauthorized parties. Its Standard measures to establish confidentiality include:  Data encryption  Two-factor authentication  Biometric verification  Security tokens
  • 4. Integrity:  Refers to protecting information from being modified by unauthorized parties. Standard measures to guarantee integrity include: Cryptographic checksums, Using file permissions Uninterrupted power supplies, Data backups
  • 5. Availability  Is making sure that authorized parties are able to access the information when needed.  Standard measures to guarantee availability include:  Backing up data to external drives  Implementing firewalls  Having backup power supplies  Data redundancy
  • 6. Why is cyber security important?  This is due to Cyber-attacks which can be extremely expensive for businesses to endure.  Cyber-attacks can be classified into the following categories:  Web-based attacks  System-based attacks
  • 7.  Web-based attacks 1. Injection attacks  It is the attack in which some data will be injected into a web application to manipulate the application and fetch the required information.  Example- SQL Injection, code Injection, log Injection, XML Injection etc
  • 8. Web-based attacks cont…. 2. Phishing  Phishing is a type of attack which attempts to steal sensitive information like user login credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic communication
  • 9. Web-based attacks cont.…. 3. Denial of Service.  It is an attack which meant to make a server or network resource unavailable to the users. It accomplishes this by flooding the target with traffic or sending information that triggers a crash.  It uses the single system and single internet connection to attack a server
  • 10. Web-based attacks cont…. 4. Man in the middle attacks.  It is a type of attack that allows an attacker to intercepts the connection between client and server and acts as a bridge between them. Due to this, an attacker will be able to read, insert and modify the data in the intercepted connection.
  • 11. System-based attacks 1. Virus  It is a type of malicious software program that spread throughout the computer files without the knowledge of a user.
  • 12. System-based attacks cont… 2. Worm.  It is a type of malware whose primary function is to replicate itself to spread to uninfected computers.  It works same as the computer virus. Worms often originate from email attachments that appear to be from trusted senders.
  • 13. System-based attacks cont… 3. Trojan horse.  It is a malicious program that occurs unexpected changes to computer setting and unusual activity, even when the computer should be idle.  It misleads the user of its true intent.  It appears to be a normal application but when opened/executed some malicious code will run in the background.
  • 14. System-based attacks cont… 4. Backdoors.  It is a method that bypasses the normal authentication process.  A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes.
  • 15. System-based attacks cont… 5. Bots  A bot (short for "robot") is an automated process that interacts with other network services.  Some bots program run automatically, while others only execute commands when they receive specific input.  Common examples of bots program are the crawler, chatroom bots, and malicious bots.
  • 16. PART 2. The above mentioned cyber- security attacks cost the world economy as follows. 1.Size of company  The more employees you have the more opportunities for a cyber-attack to occur (more computers, workstations, and devices are vulnerable to attacks).  Larger organizations tend to require more in their cyber security spending than smaller businesses.  Example, Large enterprises like Microsoft spend $1 billion to drive cybersecurity initiatives  The financial industry spends 10% of its information Technology (IT) budget average on cybersecurity.  Cyber-crime cost businesses in the United States more than $3.5 billion in internet-related cyber crimes and damages according to a 2019 FBI report.
  • 17. Cyber security cost factors Cont.… 2. Type of data Businesses that collect more sensitive data will need additional security layers to ensure they are compliant with industry-standard legal compliance.  More money will be required to protect data that comes under compliance  For example, you need a bigger budget if your data falls under Health Insurance Portability and Accountability act (HIPAA) or Businesses in commerce, Payment Card Industry (PCI) to ensure privacy and prevent breaches  General business may need to allocate 0.2% to 0.9% of its annual revenues to drive cybersecurity initiatives.
  • 18. Cyber security cost factors Cont.… 3. Products and Services  The more protection you have in the form of products and services, the higher the cost. Example Firewalls range in prices between $400 and $6,000.  Businesses that choose both cyber security products and services should expect to pay more than if they just select products. For example, a bank may need 24/7 monitoring to identify and track threats.  Example , The volume of cyber security services you use, like antivirus, will determine your cost. According to Kaspersky, such a setup can cost a business $54,300 on average per year. In addition, companies also need to pay one-time costs of around $3,000.  Using cloud-based security solutions can incur $33,500 annually on cybersecurity
  • 19. Cyber security cost factors Cont.… 4. Self-Install vs. Professional Install  Cyber security companies can sell security products to set up yourselves, or to contact a security vendor to help install the product (usually for additional setup fees).  A dedicated chief information security officer (CISO) can increase prices/cost  An average firewall configuration costs between $450 and $2,500.  Expected cost for a vulnerability assessment: $1,500 – $6,000 for a network with 1-3 servers and $5,000 – $10,000 for a network with 5-8 servers.
  • 20. Cyber security cost factors Cont.… 5. Professional Audits  Organizations can periodically conduct third-party audits to ensure they are updated with the latest security and compliance standards.  this involve hire personnel or rely on cybersecurity provider for added costs.  Audit reveal that, the latest forecast is for global ransomware damage costs to reach $20 billion by 2021 .
  • 21. QN. 02 Explain Cyber security index, ranking of African Countries and position of Tanzania.
  • 22. THE CYBER SECURITY INDEX  Is a sentiment-based measure of the risk to the corporate, industrial, and governmental information infrastructure from a spectrum of cybersecurity threats.  To raise awareness of the importance and different dimensions of the issues has classified African’s Member States into three categories:- i. Leading stage: refers to the 6 countries (i.e., GCI score in the 50th percentile and higher) that demonstrate high commitment. ii. Maturing stage: refers to the 11 countries (i.e., GCI score between the 20th and 49th percentile) that have developed complex commitments, and engage in cybersecurity programs and initiatives. iii. Initiating stage: refers to the 27 countries (i.e., GCI score less than the 20th percentile) that have started to make commitments in cybersecurity.
  • 23. TANZANIA POSITION IN CYBERSECURITY INDEX  Cyber security has improved dramatically in Tanzania over the last three years apparently due to a conducive legal and regulatory framework, according to the 2018 Global Cyber Security Index. Tanzania is now one of the 11 leading African countries; ranking 5th in the maturing stage; up from being 12th in 2017.  The table below show the Global Cyber Security Index for Africa states ;-
  • 24.
  • 25. To wind up , Better accounting for cybersecurity will be essential for the digital world into which we are moving to ensure return of technological investment THE END