SlideShare a Scribd company logo
1 of 16
Cyber Security
“ Before leaving the scene, clear your desk and your screen ”
Introduction
“ Control + Alt + Delete when you leave your seat ”
What is Cyber Security ?
Cyber security is the practice of protecting systems, networks, and programs from digital
attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive
information; extorting money from users; or interrupting normal business processes. A
successful cybersecurity approach has multiple layers of protection spread across the
computers, networks, programs, or data that one intends to keep safe. In an organization, the
people, processes, and technology must all complement one another to create an effective
defense from cyber attacks.
“ Don’t let your trash become someone else’s
treasure. Feed your shredder often. ”
Let’s Talk
About It
 Cyber security standards are security
standards which enable
organisations to practice safe
security techniques to minimize the
number of successful cyber security
attacks.
 Cyber-security is both about the
insecurity created through
cyberspace and about the technical
and non-technical practices of
making it more secure.
 Cyber security refers to the
technologies and processes
designed to protect computers,
networks and data from unauthorized
access, vulnerabilities and attacks
delivered via the Internet by cyber
criminals.
What is Cyber Crime
Cyber Crime can be defined as offences
that are committed against individuals or
groups of individuals with a criminal motive
to intentionally harm the reputation of the
victim or cause physical or mental harm, or
loss, to the victim directly or indirectly,
using modern telecommunication networks
such as Internet (networks including chat
rooms, emails, notice boards and groups)
and mobile phones (Bluetooth /SMS/MMS)
Cybercrime may threaten a
person or a nation’s
security and financial
health.
Issues surrounding these types
of crimes have become high-
profile, particularly those
surrounding hacking, copyright
infringement, unwarranted
mass-
surveillance, sextortion, child
pornography and child
grooming
There are also problems
of privacy when confidential information is
intercepted or disclosed,
lawfully or otherwise.
Common Cyber Threats
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Email Account Takeover
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Phishing
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Call Forwarding & Credential Replay
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Malware
You can simply impress your audience and add a unique zing and
appeal to your Presentations.
Spoofing
How to create a shield ?
Schwab’s internal Information Security Program :
 Internal controls and training
Advanced Technology :
 Advanced encryption technology
 Scans for suspicious behaviour
 Schwab Mobile App
`
Internal Security
Advance
Technology Information
Security
Information Security Controls :
 Passwords
 Schwab Security Tokens
 Biometric identity verification through Voice ID
Alert
Safety Security
 Using stolen Social Security numbers
for employment or other gain
– filing a false tax return
– impersonating another person
Identity Theft
 Social Security numbers
 Usernames
 Date of birth
 Passwords
 Credit card numbers
 Account numbers
 Employment information
 Checks
Personal Data Stolen
 Fraudulent Transactions
– trading
– electronic funds or wire transfers
– account opening
Resulting Crimes
How Cyber Criminals
use stolen data
Identity theft is currently a gold mine for
cybercriminals—one that reached an all-
time high in 2016, with up to $16 billion
worth of losses caused by fraud and
identity theft. Most people are already
aware that theft can happen due to high
visibility cases that occurred during the
past couple of years, like the attack on
Yahoo during latter half of 2016. While
identity theft should be concerning in
itself, the real, tangible damage usually
comes after, when an attacker uses the
stolen information for malicious purposes.
Security is everyone’s
responsibility
Add Text
Easy to change colors,
photos and Text.
Add Text
Easy to change colors,
photos and Text.
Add Text
Easy to change colors,
photos and Text.
Add Text
Easy to change colors,
photos and Text.
A successful cyber security approach has multiple layers of protection
spread across the computers, networks, programs, or data that one
intends to keep safe. In an organization, the people, processes, and
technology must all complement one another to create an effective
defence from cyber attacks
Additional security practices
and behaviours
You can simply impress your audience and add a unique zing and appeal to your Presentations. Get a modern
PowerPoint Presentation that is beautifully designed. I hope and I believe that this Template will your Time, Money
and Reputation. Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this
Template will your Time, Money and Reputation.
Let’s Talk About It…
Architechtu-
re
Here the firewall is inspecting all traffics coming in and out
from the internet via various servers connected to it. We’ll
provide a highlight on these three major medias.
Delivery
Channel
Connectio-
ns
Legacy Gateway
Security Implementation
“SEC_RITY is not complete without U!”
A tremendous amount of security knowledge is
unstructured -- created by humans, for humans --
making it inaccessible to traditional systems. ... In this
short demo, Watson for Cyber Security helps
a security analyst investigate a particular incident to
uncover new patterns and security context never
before seen.
As cyberattacks grow in volume and complexity,
artificial intelligence (AI) is helping under-resourced
security operations analysts stay ahead of threats.
Curating threat intelligence from millions of research
papers, blogs and news stories, AI provides instant
insights to help you fight through the noise of
thousands of daily alerts, drastically reducing
response times.
AI technologies like machine learning and natural
language processing enable analysts to respond to
threats with greater confidence and speed.
Watson for Cyber SecurityAI for Cyber
Security
“ Protect personal information. The identity saved could be your own ”
Who Could Be
An
ATTACKER ?
Governments attempting to
use AI to establish
hegemony, control people,
or take down other
governments.
Corporations trying to
achieve monopoly,
destroying the competition
through illegal means.
Militaries developing cyber-
weapons and robot soldiers
to achieve dominance.
01
03
05
Doomsday cults attempting
to bring the end of the world
by any means.
Criminals attempting to
develop proxy systems
to avoid risk and
responsibility.
Hackers attempting to steal
information, resources or
destroy cyberinfrastructure
targets.
02
04
06
of Cyber Security
Advantages
Block Unwanted Traffic :
Help free up bandwidth for
legitimate business traffic
Reduce cost :
Eliminate the need to buy and
manage premises-based
security devices and
appliances.
Buy What You Need :
Pay-as-You_ Go service let you
scale the solution easily as your
organization grows.
Always On :
Proactive security keeps you
ahead of threats and changing
conditions to stay in control.
Benefits :
IT security solutions are essential for all kinds
of businesses, particularly when you think
about how important the internet and your
digital systems are for your day-to-day
operations.
In 2017, more than 46% of UK businesses
suffered a cyber-attack (Cyber security
breaches survey 2017) of some sort, and
without the very best in cyber security
solutions, many of these businesses
have suffered as a result, with decreased
customer trust and even the actual theft of
personal information.
Reporting Cyber
Crime
Victim
Support
NFIB Alerts
What to do?
 If you or someone else is in immediate danger or risk of harm dial 999 now.
 If you are suffering a live cyber attack that is in progress, call now on 0300
123 2040 to report, do not report using the online tool. This service is
available 24 hours a day, 7 days a week for businesses, charities and
organisations. Our advisors are also available 24/7 on web chat if you
have any questions - http://www.actionfraud.police.uk/report-a-fraud-
including-online-crime
Victim Support
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
National Fraud Intelligence Bureau
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
Alerts
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
Law Enforcement
Get a modern PowerPoint
Presentation that is beautifully
designed. Easy to change colors,
photos and Text.
Law
Enforcement
Thank You
“ Think before you click ”
Security

More Related Content

What's hot

Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Cyber security
Cyber securityCyber security
Cyber securityChethanMp7
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber security
Cyber securityCyber security
Cyber securityPihu Goel
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 

What's hot (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 

Similar to Cyber Security Essentials

Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Mverve1
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfMverve1
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber securityCarol Meng-Shih Wang
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesBryTech INC
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Secninjaz Technologies LLP
 
Cyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCR Group
 
Cybersecurity in the Digital Age
Cybersecurity in the Digital AgeCybersecurity in the Digital Age
Cybersecurity in the Digital AgeAqdaskhan19
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 

Similar to Cyber Security Essentials (20)

Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdfGuarding the Digital Fortress.pdf
Guarding the Digital Fortress.pdf
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
What you need to know about cyber security
What you need to know about cyber securityWhat you need to know about cyber security
What you need to know about cyber security
 
Most Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling EnterprisesMost Important Data Security Concerns Troubling Enterprises
Most Important Data Security Concerns Troubling Enterprises
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP Do You Know About Cyber Security? | Secninjaz Technologies LLP
Do You Know About Cyber Security? | Secninjaz Technologies LLP
 
Cyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk AdvisoryCyber Security Threats | Cyberroot Risk Advisory
Cyber Security Threats | Cyberroot Risk Advisory
 
Understanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health CareUnderstanding the Impact of Cyber Security in Health Care
Understanding the Impact of Cyber Security in Health Care
 
Cybersecurity in the Digital Age
Cybersecurity in the Digital AgeCybersecurity in the Digital Age
Cybersecurity in the Digital Age
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Cyber Security Essentials

  • 1. Cyber Security “ Before leaving the scene, clear your desk and your screen ”
  • 2. Introduction “ Control + Alt + Delete when you leave your seat ”
  • 3. What is Cyber Security ? Cyber security is the practice of protecting systems, networks, and programs from digital attacks. These cyber attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber attacks. “ Don’t let your trash become someone else’s treasure. Feed your shredder often. ”
  • 4. Let’s Talk About It  Cyber security standards are security standards which enable organisations to practice safe security techniques to minimize the number of successful cyber security attacks.  Cyber-security is both about the insecurity created through cyberspace and about the technical and non-technical practices of making it more secure.  Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access, vulnerabilities and attacks delivered via the Internet by cyber criminals.
  • 5. What is Cyber Crime Cyber Crime can be defined as offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth /SMS/MMS) Cybercrime may threaten a person or a nation’s security and financial health. Issues surrounding these types of crimes have become high- profile, particularly those surrounding hacking, copyright infringement, unwarranted mass- surveillance, sextortion, child pornography and child grooming There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise.
  • 6. Common Cyber Threats You can simply impress your audience and add a unique zing and appeal to your Presentations. Email Account Takeover You can simply impress your audience and add a unique zing and appeal to your Presentations. Phishing You can simply impress your audience and add a unique zing and appeal to your Presentations. Call Forwarding & Credential Replay You can simply impress your audience and add a unique zing and appeal to your Presentations. Malware You can simply impress your audience and add a unique zing and appeal to your Presentations. Spoofing
  • 7. How to create a shield ? Schwab’s internal Information Security Program :  Internal controls and training Advanced Technology :  Advanced encryption technology  Scans for suspicious behaviour  Schwab Mobile App ` Internal Security Advance Technology Information Security Information Security Controls :  Passwords  Schwab Security Tokens  Biometric identity verification through Voice ID
  • 8. Alert Safety Security  Using stolen Social Security numbers for employment or other gain – filing a false tax return – impersonating another person Identity Theft  Social Security numbers  Usernames  Date of birth  Passwords  Credit card numbers  Account numbers  Employment information  Checks Personal Data Stolen  Fraudulent Transactions – trading – electronic funds or wire transfers – account opening Resulting Crimes How Cyber Criminals use stolen data Identity theft is currently a gold mine for cybercriminals—one that reached an all- time high in 2016, with up to $16 billion worth of losses caused by fraud and identity theft. Most people are already aware that theft can happen due to high visibility cases that occurred during the past couple of years, like the attack on Yahoo during latter half of 2016. While identity theft should be concerning in itself, the real, tangible damage usually comes after, when an attacker uses the stolen information for malicious purposes.
  • 9. Security is everyone’s responsibility Add Text Easy to change colors, photos and Text. Add Text Easy to change colors, photos and Text. Add Text Easy to change colors, photos and Text. Add Text Easy to change colors, photos and Text. A successful cyber security approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defence from cyber attacks
  • 10. Additional security practices and behaviours You can simply impress your audience and add a unique zing and appeal to your Presentations. Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this Template will your Time, Money and Reputation. Get a modern PowerPoint Presentation that is beautifully designed. I hope and I believe that this Template will your Time, Money and Reputation.
  • 11. Let’s Talk About It… Architechtu- re Here the firewall is inspecting all traffics coming in and out from the internet via various servers connected to it. We’ll provide a highlight on these three major medias. Delivery Channel Connectio- ns Legacy Gateway Security Implementation “SEC_RITY is not complete without U!”
  • 12. A tremendous amount of security knowledge is unstructured -- created by humans, for humans -- making it inaccessible to traditional systems. ... In this short demo, Watson for Cyber Security helps a security analyst investigate a particular incident to uncover new patterns and security context never before seen. As cyberattacks grow in volume and complexity, artificial intelligence (AI) is helping under-resourced security operations analysts stay ahead of threats. Curating threat intelligence from millions of research papers, blogs and news stories, AI provides instant insights to help you fight through the noise of thousands of daily alerts, drastically reducing response times. AI technologies like machine learning and natural language processing enable analysts to respond to threats with greater confidence and speed. Watson for Cyber SecurityAI for Cyber Security “ Protect personal information. The identity saved could be your own ”
  • 13. Who Could Be An ATTACKER ? Governments attempting to use AI to establish hegemony, control people, or take down other governments. Corporations trying to achieve monopoly, destroying the competition through illegal means. Militaries developing cyber- weapons and robot soldiers to achieve dominance. 01 03 05 Doomsday cults attempting to bring the end of the world by any means. Criminals attempting to develop proxy systems to avoid risk and responsibility. Hackers attempting to steal information, resources or destroy cyberinfrastructure targets. 02 04 06
  • 14. of Cyber Security Advantages Block Unwanted Traffic : Help free up bandwidth for legitimate business traffic Reduce cost : Eliminate the need to buy and manage premises-based security devices and appliances. Buy What You Need : Pay-as-You_ Go service let you scale the solution easily as your organization grows. Always On : Proactive security keeps you ahead of threats and changing conditions to stay in control. Benefits : IT security solutions are essential for all kinds of businesses, particularly when you think about how important the internet and your digital systems are for your day-to-day operations. In 2017, more than 46% of UK businesses suffered a cyber-attack (Cyber security breaches survey 2017) of some sort, and without the very best in cyber security solutions, many of these businesses have suffered as a result, with decreased customer trust and even the actual theft of personal information.
  • 15. Reporting Cyber Crime Victim Support NFIB Alerts What to do?  If you or someone else is in immediate danger or risk of harm dial 999 now.  If you are suffering a live cyber attack that is in progress, call now on 0300 123 2040 to report, do not report using the online tool. This service is available 24 hours a day, 7 days a week for businesses, charities and organisations. Our advisors are also available 24/7 on web chat if you have any questions - http://www.actionfraud.police.uk/report-a-fraud- including-online-crime Victim Support Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. National Fraud Intelligence Bureau Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. Alerts Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. Law Enforcement Get a modern PowerPoint Presentation that is beautifully designed. Easy to change colors, photos and Text. Law Enforcement
  • 16. Thank You “ Think before you click ” Security