Cyber Security
“ Before leaving the scene, clear your desk and your screen ”
Introduction
“ Control + Alt + Delete when you leave your seat ”
What is Cyber Security ?
Cyber security is the practice of protecting systems, networks, and programs from digital
attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive
information; extorting money from users; or interrupting normal business processes. A
successful cybersecurity approach has multiple layers of protection spread across the
computers, networks, programs, or data that one intends to keep safe. In an organization, the
people, processes, and technology must all complement one another to create an effective
defense from cyber attacks.
“ Don’t let your trash become someone else’s
treasure. Feed your shredder often. ”
Let’s Talk
About It
 Cyber security standards are security
standards which enable
organisations to practice safe
security techniques to minimize the
number of successful cyber security
attacks.
 Cyber-security is both about the
insecurity created through
cyberspace and about the technical
and non-technical practices of
making it more secure.
 Cyber security refers to the
technologies and processes
designed to protect computers,
networks and data from unauthorized
access, vulnerabilities and attacks
delivered via the Internet by cyber
criminals.
What is Cyber Crime
Cyber Crime can be defined as offences
that are committed against individuals or
groups of individuals with a criminal motive
to intentionally harm the reputation of the
victim or cause physical or mental harm, or
loss, to the victim directly or indirectly,
using modern telecommunication networks
such as Internet (networks including chat
rooms, emails, notice boards and groups)
and mobile phones (Bluetooth /SMS/MMS)
Cybercrime may threaten a
person or a nation’s
security and financial
health.
Issues surrounding these types
of crimes have become high-
profile, particularly those
surrounding hacking, copyright
infringement, unwarranted
mass-
surveillance, sextortion, child
pornography and child
grooming
There are also problems
of privacy when confidential information is
intercepted or disclosed,
lawfully or otherwise.
Common Cyber Threats
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Email Account Takeover
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Phishing
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Call Forwarding & Credential Replay
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Malware
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Spoofing
How to create a shield ?
Schwab’s internal Information Security Program :
 Internal controls and training
Advanced Technology :
 Advanced encryption technology
 Scans for suspicious behaviour
 Schwab Mobile App
`
Internal Security
Advance
Technology Information
Security
Information Security Controls :
 Passwords
 Schwab Security Tokens
 Biometric identity verification through Voice ID
Alert
Safety Security
 Using stolen Social Security numbers
for employment or other gain
– filing a false tax return
– impersonating another person
Identity Theft
 Social Security numbers
 Usernames
 Date of birth
 Passwords
 Credit card numbers
 Account numbers
 Employment information
 Checks
Personal Data Stolen
 Fraudulent Transactions
– trading
– electronic funds or wire transfers
– account opening
Resulting Crimes
How Cyber Criminals
use stolen data
Identity theft is currently a gold mine for
cybercriminals—one that reached an all-
time high in 2016, with up to $16 billion
worth of losses caused by fraud and
identity theft. Most people are already
aware that theft can happen due to high
visibility cases that occurred during the
past couple of years, like the attack on
Yahoo during latter half of 2016. While
identity theft should be concerning in
itself, the real, tangible damage usually
comes after, when an attacker uses the
stolen information for malicious purposes.
Security is everyone’s
responsibility
Add Text
Easy to change colors,
photos and Text.
Add Text
Easy to change colors,
photos and Text.
Add Text
Easy to change colors,
photos and Text.
Add Text
Easy to change colors,
photos and Text.
A successful cyber security approach has multiple layers of protection
spread across the computers, networks, programs, or data that one
intends to keep safe. In an organization, the people, processes, and
technology must all complement one another to create an effective
defence from cyber attacks
Additional security practices
and behaviours
You can simply impress your audience and add a unique zing and appeal to your Presentations. Get a modern
PowerPoint Presentation that is beautifully designed. I hope and I believe that this Template will your Time, Money
and Reputation. Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this
Template will your Time, Money and Reputation.
Let’s Talk About It…
Architechtu-
re
Here the firewall is inspecting all traffics coming in and out
from the internet via various servers connected to it. We’ll
provide a highlight on these three major medias.
Delivery
Channel
Connectio-
ns
Legacy Gateway
Security Implementation
“SEC_RITY is not complete without U!”
A tremendous amount of security knowledge is
unstructured -- created by humans, for humans --
making it inaccessible to traditional systems. ... In this
short demo, Watson for Cyber Security helps
a security analyst investigate a particular incident to
uncover new patterns and security context never
before seen.
As cyberattacks grow in volume and complexity,
artificial intelligence (AI) is helping under-resourced
security operations analysts stay ahead of threats.
Curating threat intelligence from millions of research
papers, blogs and news stories, AI provides instant
insights to help you fight through the noise of
thousands of daily alerts, drastically reducing
response times.
AI technologies like machine learning and natural
language processing enable analysts to respond to
threats with greater confidence and speed.
Watson for Cyber SecurityAI for Cyber
Security
“ Protect personal information. The identity saved could be your own ”
Who Could Be
An
ATTACKER ?
Governments attempting to
use AI to establish
hegemony, control people,
or take down other
governments.
Corporations trying to
achieve monopoly,
destroying the competition
through illegal means.
Militaries developing cyber-
weapons and robot soldiers
to achieve dominance.
01
03
05
Doomsday cults attempting
to bring the end of the world
by any means.
Criminals attempting to
develop proxy systems
to avoid risk and
responsibility.
Hackers attempting to steal
information, resources or
destroy cyberinfrastructure
targets.
02
04
06
of Cyber Security
Advantages
Block Unwanted Traffic :
Help free up bandwidth for
legitimate business traffic
Reduce cost :
Eliminate the need to buy and
manage premises-based
security devices and
appliances.
Buy What You Need :
Pay-as-You_ Go service let you
scale the solution easily as your
organization grows.
Always On :
Proactive security keeps you
ahead of threats and changing
conditions to stay in control.
Benefits :
IT security solutions are essential for all kinds
of businesses, particularly when you think
about how important the internet and your
digital systems are for your day-to-day
operations.
In 2017, more than 46% of UK businesses
suffered a cyber-attack (Cyber security
breaches survey 2017) of some sort, and
without the very best in cyber security
solutions, many of these businesses
have suffered as a result, with decreased
customer trust and even the actual theft of
personal information.
Reporting Cyber
Crime
Victim
Support
NFIB Alerts
What to do?
 If you or someone else is in immediate danger or risk of harm dial 999 now.
 If you are suffering a live cyber attack that is in progress, call now on 0300
123 2040 to report, do not report using the online tool. This service is
available 24 hours a day, 7 days a week for businesses, charities and
organisations. Our advisors are also available 24/7 on web chat if you
have any questions - http://www.actionfraud.police.uk/report-a-fraud-
including-online-crime
Victim Support
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
National Fraud Intelligence Bureau
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
Alerts
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
Law Enforcement
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
Law
Enforcement
Thank You
“ Think before you click ”
Security

Cyber security

  • 1.
    Cyber Security “ Beforeleaving the scene, clear your desk and your screen ”
  • 2.
    Introduction “ Control +Alt + Delete when you leave your seat ”
  • 3.
    What is CyberSecurity ? Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks. “ Don’t let your trash become someone else’s treasure. Feed your shredder often. ”
  • 4.
    Let’s Talk About It Cyber security standards are security standards which enable organisations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber-security is both about the insecurity created through cyberspace and about the technical and non-technical practices of making it more secure.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
  • 5.
    What is CyberCrime Cyber Crime can be defined as offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth /SMS/MMS) Cybercrime may threaten a person or a nation’s security and financial health. Issues surrounding these types of crimes have become high- profile, particularly those surrounding hacking, copyright infringement, unwarranted mass- surveillance, sextortion, child pornography and child grooming There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise.
  • 6.
    Common Cyber Threats Youcan simply impress your audience and add a unique zing and appeal to your Presentations. Email Account Takeover You can simply impress your audience and add a unique zing and appeal to your Presentations. Phishing You can simply impress your audience and add a unique zing and appeal to your Presentations. Call Forwarding & Credential Replay You can simply impress your audience and add a unique zing and appeal to your Presentations. Malware You can simply impress your audience and add a unique zing and appeal to your Presentations. Spoofing
  • 7.
    How to createa shield ? Schwab’s internal Information Security Program :  Internal controls and training Advanced Technology :  Advanced encryption technology  Scans for suspicious behaviour  Schwab Mobile App ` Internal Security Advance Technology Information Security Information Security Controls :  Passwords  Schwab Security Tokens  Biometric identity verification through Voice ID
  • 8.
    Alert Safety Security  Usingstolen Social Security numbers for employment or other gain – filing a false tax return – impersonating another person Identity Theft  Social Security numbers  Usernames  Date of birth  Passwords  Credit card numbers  Account numbers  Employment information  Checks Personal Data Stolen  Fraudulent Transactions – trading – electronic funds or wire transfers – account opening Resulting Crimes How Cyber Criminals use stolen data Identity theft is currently a gold mine for cybercriminals—one that reached an all- time high in 2016, with up to $16 billion worth of losses caused by fraud and identity theft. Most people are already aware that theft can happen due to high visibility cases that occurred during the past couple of years, like the attack on Yahoo during latter half of 2016. While identity theft should be concerning in itself, the real, tangible damage usually comes after, when an attacker uses the stolen information for malicious purposes.
  • 9.
    Security is everyone’s responsibility AddText Easy to change colors, photos and Text. Add Text Easy to change colors, photos and Text. Add Text Easy to change colors, photos and Text. Add Text Easy to change colors, photos and Text. A successful cyber security approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defence from cyber attacks
  • 10.
    Additional security practices andbehaviours You can simply impress your audience and add a unique zing and appeal to your Presentations. Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this Template will your Time, Money and Reputation. Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this Template will your Time, Money and Reputation.
  • 11.
    Let’s Talk AboutIt… Architechtu- re Here the firewall is inspecting all traffics coming in and out from the internet via various servers connected to it. We’ll provide a highlight on these three major medias. Delivery Channel Connectio- ns Legacy Gateway Security Implementation “SEC_RITY is not complete without U!”
  • 12.
    A tremendous amountof security knowledge is unstructured -- created by humans, for humans -- making it inaccessible to traditional systems. ... In this short demo, Watson for Cyber Security helps a security analyst investigate a particular incident to uncover new patterns and security context never before seen. As cyberattacks grow in volume and complexity, artificial intelligence (AI) is helping under-resourced security operations analysts stay ahead of threats. Curating threat intelligence from millions of research papers, blogs and news stories, AI provides instant insights to help you fight through the noise of thousands of daily alerts, drastically reducing response times. AI technologies like machine learning and natural language processing enable analysts to respond to threats with greater confidence and speed. Watson for Cyber SecurityAI for Cyber Security “ Protect personal information. The identity saved could be your own ”
  • 13.
    Who Could Be An ATTACKER? Governments attempting to use AI to establish hegemony, control people, or take down other governments. Corporations trying to achieve monopoly, destroying the competition through illegal means. Militaries developing cyber- weapons and robot soldiers to achieve dominance. 01 03 05 Doomsday cults attempting to bring the end of the world by any means. Criminals attempting to develop proxy systems to avoid risk and responsibility. Hackers attempting to steal information, resources or destroy cyberinfrastructure targets. 02 04 06
  • 14.
    of Cyber Security Advantages BlockUnwanted Traffic : Help free up bandwidth for legitimate business traffic Reduce cost : Eliminate the need to buy and manage premises-based security devices and appliances. Buy What You Need : Pay-as-You_ Go service let you scale the solution easily as your organization grows. Always On : Proactive security keeps you ahead of threats and changing conditions to stay in control. Benefits : IT security solutions are essential for all kinds of businesses, particularly when you think about how important the internet and your digital systems are for your day-to-day operations. In 2017, more than 46% of UK businesses suffered a cyber-attack (Cyber security breaches survey 2017) of some sort, and without the very best in cyber security solutions, many of these businesses have suffered as a result, with decreased customer trust and even the actual theft of personal information.
  • 15.
    Reporting Cyber Crime Victim Support NFIB Alerts Whatto do?  If you or someone else is in immediate danger or risk of harm dial 999 now.  If you are suffering a live cyber attack that is in progress, call now on 0300 123 2040 to report, do not report using the online tool. This service is available 24 hours a day, 7 days a week for businesses, charities and organisations. Our advisors are also available 24/7 on web chat if you have any questions - http://www.actionfraud.police.uk/report-a-fraud- including-online-crime Victim Support Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. National Fraud Intelligence Bureau Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. Alerts Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. Law Enforcement Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. Law Enforcement
  • 16.
    Thank You “ Thinkbefore you click ” Security