SlideShare a Scribd company logo
Cyber Security :
Build your Career to Secure
the Future!
Boni yeamin
SOC Analyst
CARE Bangladesh
PRESENTED BY
CYBER Threats
and Statistics
GLOBAL
Recall: Cyber Attacks and Incidents (Global)
WANNACRY
Ransom ware (2017)
NotPetya
Ransom ware (2016)
Github DDOS attack
(2018)
US University Breach
(2018).
UBER Data Breach
(2016)
Equifax Data Breach
(2017)
2018 Data Breach
(2018)
1.76 billion records were
leaked in January 2019
alone
2019 Data Breach
(2019)
Toyota's Second Data
Breach Affects Millions Of
Drivers
Recall: Cyber Attacks and Incidents (Global): 2019
Career in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptx
The United States and the Middle East spend the most on
post-data breach response. Costs in the U.S. were $1.56
million and $1.43 million in the Middle East
The global cost of
cybercrime exceeded
almost $2 trillion in
2019
69.55%unique
users are in the
highest risk of local virus
infection.
80% users are the
victim of spam attack
The global average cost of a data breach
is $3.6 million — and it keeps increasing
every year.
FACTS
DID YOU KNOW?
76% of Cyber Attacks are Financially Motivated!!
Verizon’s 2018 Breach Investigations Report also found that 76 percent of cyber attacks are
motivated by money; most of these attacks (73 percent) are perpetrated by people outside
of the organization, with the majority being carried out by organized criminal groups and 12
percent being carried out by nation-state or state-affiliated actors.
Career in Cyber Security - City University.pptx
The total cost of a
successful Cyber attack is
over $5 million, or $301 per
employee!
The average cost of a
Malware attack on a
company is $2.4 Million!!.
-Accenture
Bangladesh is 2ndin the
level of infection among all
the countries.
-Kaspersky Security Bulletin
(2015)
69.55%unique
users are in the
highest risk of local virus
infection in Bangladesh.
80% users are the
victim of spam attack
-Trend Micro Global
Spam Map
In a recent test of two hours that was run
in Bangladesh Computer Council, total
number of infected IP in Bangladesh was
34552. IP’s of renowned companies
like Grameen Phone, Bangla
link and 3 were also found in that list.
FACTS: BANGLADESH
Career in Cyber Security - City University.pptx
Career in Cyber Security - City University.pptx
2
0
1
6
BANGLADESH BANK Cyber Heist 101m
Bangladesh ranked
6th worst
Cyber Secure country
19.7%
Computers are
Infected with
Malware
only 38 % of existing Banks
are fully-equipped to
combat Cyber Attacks
35.91% Mobile
Handsets are
Infected with
Malware
28% are totally
Vulnerable
34% are partially-prepared.
Incident of Cyber Attacks Per Year in
379
663
870
1000+
2016
2017
2018
2019
BANGLADESH
UPCOMING CYBER THREATS & CHALLNGES
Ransom ware
Web Application Attack
AI-driven Chatbots
Privacy and Security of
Connected Cars
DDoS attacks in IOT
Healthcare
Sector
Data
Breach
Cloud and IOT security
Bank
Robbery
and
Data
Breach
Security Breach in
Industrial Control System
Power Plant attack
ARE WE READY?
OBJECTIVE:
DEVELOP
SECURE FRAMEWORK / TOOLS
CREATE & EMPLOY MORE
SECURITY PROFESSIONALS
Face The Challenge
THE
FIRST STEP
Organizations are hiring more and more Cyber Security
Professional to build and safeguard Information System.
CAREER OPPURTUNITY
CAREER OPPURTUNITY
ESTIMATED SALARIES FOR DIFFERENT ROLE
THE NETWORK
SECURITY
THE AUDITING
TRACKS & THEIR REQUIRED SKILLS/CERTIFICATIONS
THE SECURITY
TESTING
THE CYBER
FORENSIC
TRACKS & THEIR REQUIRED SKILLS/CERTIFICATIONS
THANK YOU

More Related Content

Similar to Career in Cyber Security - City University.pptx

How CyberSecurity Affects Society
How CyberSecurity Affects SocietyHow CyberSecurity Affects Society
How CyberSecurity Affects Society
Chika Wonah
 
Vodqa why cybersecurity
Vodqa   why cybersecurityVodqa   why cybersecurity
Vodqa why cybersecurity
Dileep Bellamkonda
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security Economy
Behnaz Aria
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
Stephanie Holman
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
Cognizant
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2
Felipe Prado
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
Microsoft Asia
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
Razor Technology
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019
BluePayProcessing
 
Infographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeInfographic Economic Impact of Cybercrime
Infographic Economic Impact of Cybercrime
Jeferson Propheta
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
Nathan CAVRIL
 
IBM X-Force Threat Intelligence Index 2020
IBM X-Force Threat Intelligence Index 2020IBM X-Force Threat Intelligence Index 2020
IBM X-Force Threat Intelligence Index 2020
mResearcher
 
Cybercrime (sociology)
Cybercrime (sociology)Cybercrime (sociology)
Cybercrime (sociology)
Shanawaz Ahamed
 
Get Prepared
Get PreparedGet Prepared
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
Dr. Raghavendra GS
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only section
Ernest Staats
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
Confederation of Indian Industry
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
Gabe Schurman
 

Similar to Career in Cyber Security - City University.pptx (20)

How CyberSecurity Affects Society
How CyberSecurity Affects SocietyHow CyberSecurity Affects Society
How CyberSecurity Affects Society
 
Vodqa why cybersecurity
Vodqa   why cybersecurityVodqa   why cybersecurity
Vodqa why cybersecurity
 
Future of Cyber-security Economy
Future of Cyber-security EconomyFuture of Cyber-security Economy
Future of Cyber-security Economy
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Combating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced AnalyticsCombating Cybersecurity Challenges with Advanced Analytics
Combating Cybersecurity Challenges with Advanced Analytics
 
Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2Malwarebytes labs 2019 - state of malware report 2
Malwarebytes labs 2019 - state of malware report 2
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
The State of Data Security
The State of Data SecurityThe State of Data Security
The State of Data Security
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019
 
Infographic Economic Impact of Cybercrime
Infographic Economic Impact of CybercrimeInfographic Economic Impact of Cybercrime
Infographic Economic Impact of Cybercrime
 
Topsec email security 2016
Topsec email security 2016Topsec email security 2016
Topsec email security 2016
 
IBM X-Force Threat Intelligence Index 2020
IBM X-Force Threat Intelligence Index 2020IBM X-Force Threat Intelligence Index 2020
IBM X-Force Threat Intelligence Index 2020
 
Cybercrime (sociology)
Cybercrime (sociology)Cybercrime (sociology)
Cybercrime (sociology)
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only section
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
Cybersecurity infographic
Cybersecurity infographicCybersecurity infographic
Cybersecurity infographic
 

More from Boni Yeamin

Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
Boni Yeamin
 
Mastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking SuccessMastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking Success
Boni Yeamin
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Boni Yeamin
 
Open source SOC Tools for Home-Lab
Open source SOC Tools for Home-LabOpen source SOC Tools for Home-Lab
Open source SOC Tools for Home-Lab
Boni Yeamin
 
security onion
security onionsecurity onion
security onion
Boni Yeamin
 
Structures in C.pptx
Structures in C.pptxStructures in C.pptx
Structures in C.pptx
Boni Yeamin
 
Effective note keeping
Effective note keepingEffective note keeping
Effective note keeping
Boni Yeamin
 
Network Operations Center (NOC)
Network Operations Center (NOC)Network Operations Center (NOC)
Network Operations Center (NOC)
Boni Yeamin
 
Open Source Cybersecurity Tools
Open Source Cybersecurity ToolsOpen Source Cybersecurity Tools
Open Source Cybersecurity Tools
Boni Yeamin
 
VMware Workstation
VMware WorkstationVMware Workstation
VMware Workstation
Boni Yeamin
 
How to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptxHow to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptx
Boni Yeamin
 
Boni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdfBoni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdf
Boni Yeamin
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
Boni Yeamin
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOC
Boni Yeamin
 

More from Boni Yeamin (14)

Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.Enterprise Security Monitoring, And Log Management.
Enterprise Security Monitoring, And Log Management.
 
Mastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking SuccessMastering LinkedIn - From Profile Setup to Networking Success
Mastering LinkedIn - From Profile Setup to Networking Success
 
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and GrafanaBuilding Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
Building Active Directory Monitoring with Telegraf, InfluxDB, and Grafana
 
Open source SOC Tools for Home-Lab
Open source SOC Tools for Home-LabOpen source SOC Tools for Home-Lab
Open source SOC Tools for Home-Lab
 
security onion
security onionsecurity onion
security onion
 
Structures in C.pptx
Structures in C.pptxStructures in C.pptx
Structures in C.pptx
 
Effective note keeping
Effective note keepingEffective note keeping
Effective note keeping
 
Network Operations Center (NOC)
Network Operations Center (NOC)Network Operations Center (NOC)
Network Operations Center (NOC)
 
Open Source Cybersecurity Tools
Open Source Cybersecurity ToolsOpen Source Cybersecurity Tools
Open Source Cybersecurity Tools
 
VMware Workstation
VMware WorkstationVMware Workstation
VMware Workstation
 
How to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptxHow to Build Your Linkedin Profile To Get Jobs.pptx
How to Build Your Linkedin Profile To Get Jobs.pptx
 
Boni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdfBoni Yeamin Thesis final_report.pdf
Boni Yeamin Thesis final_report.pdf
 
cybersecurity analyst.pptx
cybersecurity analyst.pptxcybersecurity analyst.pptx
cybersecurity analyst.pptx
 
Introduction to SOC
Introduction to SOCIntroduction to SOC
Introduction to SOC
 

Recently uploaded

Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
Nicolás Lopéz
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
alexjohnson7307
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
aslasdfmkhan4750
 
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSECHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
kumarjarun2010
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Muhammad Ali
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
Matthias Neugebauer
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
Zilliz
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes..."Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
Anant Gupta
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
ssuser1915fe1
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
Steven Carlson
 
CiscoIconsLibrary cours de réseau VLAN.ppt
CiscoIconsLibrary cours de réseau VLAN.pptCiscoIconsLibrary cours de réseau VLAN.ppt
CiscoIconsLibrary cours de réseau VLAN.ppt
moinahousna
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
SynapseIndia
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Networks
 
The importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT StandardizationThe importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT Standardization
Axel Rennoch
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
aakash malhotra
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
BrainSell Technologies
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 

Recently uploaded (20)

Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024Vertex AI Agent Builder - GDG Alicante - Julio 2024
Vertex AI Agent Builder - GDG Alicante - Julio 2024
 
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
leewayhertz.com-AI agents for healthcare Applications benefits and implementa...
 
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
High Profile Girls Call ServiCe Hyderabad 0000000000 Tanisha Best High Class ...
 
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSECHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
CHAPTER-8 COMPONENTS OF COMPUTER SYSTEM CLASS 9 CBSE
 
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
Litestack talk at Brighton 2024 (Unleashing the power of SQLite for Ruby apps)
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Opencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of MünsterOpencast Summit 2024 — Opencast @ University of Münster
Opencast Summit 2024 — Opencast @ University of Münster
 
Using LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and MilvusUsing LLM Agents with Llama 3, LangGraph and Milvus
Using LLM Agents with Llama 3, LangGraph and Milvus
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes..."Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
"Mastering Graphic Design: Essential Tips and Tricks for Beginners and Profes...
 
Feature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptxFeature sql server terbaru performance.pptx
Feature sql server terbaru performance.pptx
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 
Vulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive OverviewVulnerability Management: A Comprehensive Overview
Vulnerability Management: A Comprehensive Overview
 
CiscoIconsLibrary cours de réseau VLAN.ppt
CiscoIconsLibrary cours de réseau VLAN.pptCiscoIconsLibrary cours de réseau VLAN.ppt
CiscoIconsLibrary cours de réseau VLAN.ppt
 
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptxUse Cases & Benefits of RPA in Manufacturing in 2024.pptx
Use Cases & Benefits of RPA in Manufacturing in 2024.pptx
 
IPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite SolutionIPLOOK Remote-Sensing Satellite Solution
IPLOOK Remote-Sensing Satellite Solution
 
The importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT StandardizationThe importance of Quality Assurance for ICT Standardization
The importance of Quality Assurance for ICT Standardization
 
Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024Three New Criminal Laws in India 1 July 2024
Three New Criminal Laws in India 1 July 2024
 
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdfAcumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
Acumatica vs. Sage Intacct vs. NetSuite _ NOW CFO.pdf
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 

Career in Cyber Security - City University.pptx

  • 1. Cyber Security : Build your Career to Secure the Future!
  • 2. Boni yeamin SOC Analyst CARE Bangladesh PRESENTED BY
  • 4. Recall: Cyber Attacks and Incidents (Global) WANNACRY Ransom ware (2017) NotPetya Ransom ware (2016) Github DDOS attack (2018) US University Breach (2018). UBER Data Breach (2016) Equifax Data Breach (2017)
  • 5. 2018 Data Breach (2018) 1.76 billion records were leaked in January 2019 alone 2019 Data Breach (2019) Toyota's Second Data Breach Affects Millions Of Drivers Recall: Cyber Attacks and Incidents (Global): 2019
  • 8. The United States and the Middle East spend the most on post-data breach response. Costs in the U.S. were $1.56 million and $1.43 million in the Middle East
  • 9. The global cost of cybercrime exceeded almost $2 trillion in 2019 69.55%unique users are in the highest risk of local virus infection. 80% users are the victim of spam attack The global average cost of a data breach is $3.6 million — and it keeps increasing every year. FACTS
  • 10. DID YOU KNOW? 76% of Cyber Attacks are Financially Motivated!! Verizon’s 2018 Breach Investigations Report also found that 76 percent of cyber attacks are motivated by money; most of these attacks (73 percent) are perpetrated by people outside of the organization, with the majority being carried out by organized criminal groups and 12 percent being carried out by nation-state or state-affiliated actors.
  • 12. The total cost of a successful Cyber attack is over $5 million, or $301 per employee! The average cost of a Malware attack on a company is $2.4 Million!!. -Accenture
  • 13. Bangladesh is 2ndin the level of infection among all the countries. -Kaspersky Security Bulletin (2015) 69.55%unique users are in the highest risk of local virus infection in Bangladesh. 80% users are the victim of spam attack -Trend Micro Global Spam Map In a recent test of two hours that was run in Bangladesh Computer Council, total number of infected IP in Bangladesh was 34552. IP’s of renowned companies like Grameen Phone, Bangla link and 3 were also found in that list. FACTS: BANGLADESH
  • 17. Bangladesh ranked 6th worst Cyber Secure country 19.7% Computers are Infected with Malware only 38 % of existing Banks are fully-equipped to combat Cyber Attacks 35.91% Mobile Handsets are Infected with Malware 28% are totally Vulnerable 34% are partially-prepared.
  • 18. Incident of Cyber Attacks Per Year in 379 663 870 1000+ 2016 2017 2018 2019 BANGLADESH
  • 19. UPCOMING CYBER THREATS & CHALLNGES Ransom ware Web Application Attack AI-driven Chatbots Privacy and Security of Connected Cars DDoS attacks in IOT Healthcare Sector Data Breach Cloud and IOT security Bank Robbery and Data Breach Security Breach in Industrial Control System Power Plant attack
  • 21. OBJECTIVE: DEVELOP SECURE FRAMEWORK / TOOLS CREATE & EMPLOY MORE SECURITY PROFESSIONALS Face The Challenge THE FIRST STEP
  • 22. Organizations are hiring more and more Cyber Security Professional to build and safeguard Information System.
  • 25. ESTIMATED SALARIES FOR DIFFERENT ROLE
  • 26. THE NETWORK SECURITY THE AUDITING TRACKS & THEIR REQUIRED SKILLS/CERTIFICATIONS
  • 27. THE SECURITY TESTING THE CYBER FORENSIC TRACKS & THEIR REQUIRED SKILLS/CERTIFICATIONS