SlideShare a Scribd company logo
CYBER
SECURITY
SUBMITTED BY:
TANU GUJJAR
AB-1244 SUBMITTED TO:
Mr. Mahesh Kumar Bhandari
What is Cybersecurity?
Cybersecurity is the practice of protecting critical systems and sensitive
information from digital attacks. Also known as information technology (IT)
security, cybersecurity measures are designed to combat threats against networked
systems and applications, whether those threats originate from inside or outside of
an organization.
Why is cybersecurity important?
With an increasing number of users, devices and programs in the modern
enterprise, combined with the increased deluge of data -- much of which is
sensitive or confidential -- the importance of cybersecurity continues to grow. The
growing volume and sophistication of cyber attackers and attack techniques
compound the problem even further.
CYBER CRIME
Cyber crime is broadly defined as any illegal activity that
involves a computer, another digital device or a computer
network. Cyber crime includes common cybersecurity
threats like social engineering, software vulnerability
exploits and network attacks. But it also includes criminal
acts like hacktivist protests, harassment and extortion,
money laundering, and more.
Cyber crime targets both individuals and companies.
Typically, attackers target businesses for direct financial
gain or to sabotage or disrupt operations. They target
individuals as part of large-scale scams, or to compromise
their devices and use them as a platform for nefarious
activity.
What are the different types of cybersecurity threats?
The process of keeping up with new technologies, security trends and threat intelligence is a challenging task. It
is necessary in order to protect information and other assets from cyberthreats, which take many forms. Types of
cyberthreats include:
● Malware is a form of malicious software in which any file or program can be used to harm a
computer user. This includes worms, viruses, Trojans and spyware.
● Ransomware is another type of malware. It involves an attacker locking the victim's computer
system files -- typically through encryption -- and demanding a payment to decrypt and unlock
them.
● Social engineering is an attack that relies on human interaction to trick users into breaking
security procedures to gain sensitive information that is typically protected.
● Phishing is a form of social engineering where fraudulent email or text messages that
resemble those from reputable or known sources are sent. Often random attacks, the intent of
these messages is to steal sensitive data, such as credit card or login information.
.
● Spear phishing is a type of phishing attack that has an intended target user, organization or
business.
● Distributed denial-of-service (DDoS) attacks are those in which multiple systems disrupt the traffic
of a targeted system, such as a server, website or other network resource. By flooding the target with
messages, connection requests or packets, the attackers can slow the system or crash it, preventing
legitimate traffic from using it.
● Advanced persistent threats (APTs) are prolonged targeted attacks in which an attacker infiltrates a
network and remains undetected for long periods of time with the aim to steal data.
● Man-in-the-middle (MitM) attacks are eavesdropping attacks that involve an attacker intercepting
and relaying messages between two parties who believe they are communicating with each other.
● Other common attacks include botnets, drive-by-download attacks, exploit kits, malvertising, vishing,
credential stuffing attacks, cross-site scripting (XSS) attacks, SQL injection attacks, business email
Common Cyber Crimes
● Data or computer/mobile phone owned by you is found in the hands of
someone else.
● A password is stolen and used by someone else for fraudulent purpose.
● An email is read by someone else by fraudulently making use of
password.
● Capturing, publishing or transmitting the image of a private area
without any person’s consent or knowledge.
● Sending offensive messages through communication service,etc.
● Publishing or transmitting obscene material electric form.
● Stalking/ Cyber Stalking
● Tampering with computer source documents.
Cryptography
What is Cryptography?
Cryptography or cryptology is the practice of study of techniques for secure
communication in the presence of adversarial behavior. More generally,
cryptography is about constructing and analyzing protocols that prevent third
parties or the public from reading private messages, various aspects in information
security such as data confidentiality, data integrity, authentication, and non-
repudiation are central to modern cryptography. Modern cryptography exists at the
intersection of the discipline of the disciplines of mathematics, computer science,
electrical engineering, communication science, and physics. Applications of
cryptography include electric commerce, chip-based payment cards, digital
currencies, computer passwords, and military communications.
How does it actually works?
Cryptographic Algorithms
Cryptosystem use a set of procedures known as cryptographic algorithms, or ciphers,
to encrypt and decrypt messages to secure communications among computer
systems, devices and applications.
A cipher suite uses one algorithm for encryption, another algorithm for message
authentication and another for key exchange. This process, embedded in protocols
and written in software that runs on operating systems and networked computer
systems involves:
● public and private key generation for data encryption or decryption
● digital signing and verification for message authentication
● key exchange
Classification of Cryptography
IT Laws
● The Information Technology Act, 2000 contains all of the IT laws of India.
● Set of rules which govern everything from how we act to what can be provided over
the internet in the cyberspace.
● The IT Act not only extends to the whole of India but it is also applicable to any
offense or contravention outside India by any person.
● Important to know that while the IT Act includes several offenses and the
punishments for the same, some provisions also attract punishment under the IPC
(Indian Penal Code).
● According to Ministry of Electronic and Information Technology, Government of
India : Cyber Laws yields legal recognition to electronic documents and a structure to
support e-filing and e-commerce transactions and also provides a legal structure to reduce
cyber crimes.
● Generically, cyber law is referred to as the Law of the Internet.
Why are IT Laws Important?
● IT Laws or Cyber Laws are important because they touch almost all aspects of transactions
and activities involving the internet, World Wide Web and cyberspace.
● The law is enacted to save people and organizations from cybercrime and other internet-
related crimes. It protects the privacy of every individual and organization.
● As per rules and regulations of the Cyber-law, a person who commits cyber crime is liable
to get punishment. If anyone violates and breaks the provisions of the law, then it allows
another person or organization to take legal action against that person.
● In today’s highly digitalized world, almost everyone is affected by cyber law. For example:
Almost all transactions in shares are in demat form. Almost all companies extensively
depend upon their computer networks and keep their valuable data in electronic form.
Government forms including income tax returns, company law forms etc. are now filled in
electronic form.
Recent Data Breaches Took Place in India
● Domino’s India Data Breach
Happened in April, 2021. Impacted 180 million order details.
Data breached : Name, email, mobile number, order numbers, delivery address, GPS location
● COVID-19 test results of Indian patients leaked online
Happened in January,2021. Impacted At least 1500 Indian citizens (real-time number
estimated to be higher)
Data breached : patients’ full names, dates of birth, testing dates and centers in which
the tests were held
Recent Data Breaches Took Place in India
● Air India Data Breach
Happened in February, 2021. Impacted 4.5 million records.
Data breached : Name, passport, credit card details, birth dates, contact information,
passport information, ticket information and Air India’s frequent flyer data.
● Upstox Data Breach
Happened in April,2021. Impacted 2.5 million records.
Data breached : Name, email, mobile number aadhaar and bank account details.
Drawbacks of IT Laws
● No legislative process.
● No consultation.
● Identify Theft.
● Breach of Privacy.
● Cyber War.
Ethical Hacking
What is Ethical Hacking?
Ethical Hacking involves an authorized attempt to gain unauthorized access
to a computer system, application, or data. Carrying out an ethical hack
involves duplicating strategies and actions of malicious attackers. This
practice helps to identify security vulnerabilities which can be resolved
before a malicious attacker has the opportunity to exploit them.
Key concepts of Ethical Hacking:
● Stay legal
● Define the scope
● Report vulnerabilities
● Respect data sensitivity
How are ethical hackers different than malicious hackers?
An ethical hacker reports the identified vulnerabilities to the organization.
Additionally, they provide remediation advice. In many cases, with the
organization’s consent, the ethical hacker performs a re-test to ensure the
vulnerabilities are fully resolved. While malicious hackers intend to gain
unauthorized access to a resource for the financial gain or personal recognition
and thus aren’t concerned with improving the organization’s security posture.
CYBER SECURITY TECHNIQUES
1. Access control and password security The concept of user name and password has
been fundamental way of protecting our Information. This may be one of the first measures
regarding cyber security.
2. Authentication of data The documents that we receive must always be authenticated be
before downloading that is should be checked if it has originated from a trusted and a
reliable source and that they are not altered. Authenticating of these documents is usually
done by the anti virus software present in the devices. T
3.Malware scanners This is software that usually scans all the files and documents present in
the system for malicious code or harmful viruses. Viruses, worms, and Trojan horses are
examples of malicious software that are often grouped together and referred to as malware.
4 Firewalls A firewall is a software program or piece of hardware that helps screen out hackers,
viruses, and worms that try to reach your computer over the Internet. All messages entering or
leaving the internet pass through the firewall present, which examines each message and blocks
those that do not meet the specified security criteria. Hence firewalls play an important role in
detecting the malware
5 Anti-virus software Antivirus software is a computer
program that detects, prevents, and takes
action to disarm or remove malicious software
Programs, such as viruses and worms. Most antivirus
programs include an auto-update feature that enables
the program to download profiles of new viruses so that
it can check for the new viruses as soon as they are
discovered. An anti virus software is a must and basic
necessity for every system
How is AI used in cybersecurity?
Artificial Intelligence as become an integral component to keep companies protected from the
growing number and sophistication of cyberthreats. Using artificial intelligence (AI) and machine
learning in areas with high-volume data streams can help improve cybersecurity in three main
categories:
● Threat detection. AI platforms can analyze data and recognize known threats, as well as
predict novel threats.
● Threat response. AI platforms also create and automatically enact security protections.
● Human augmentation. Security pros are often overloaded with alerts and repetitive tasks.
AI can help eliminate alert fatigue by automatically triaging low-risk alarms and automating
big data analysis and other repetitive tasks, freeing humans for more sophisticated tasks.
What are the career opportunities in cybersecurity?
As the cyberthreat landscape continues to grow and new threats emerge -- such as IoT
threats -- individuals are needed with cybersecurity awareness and hardware and
software skills , IT professionals and other computer specialists are needed in security
roles, such as:
● Chief information security officer (CISO) is the individual who implements the
security program across the organization and oversees the IT security
department's operations.
● Chief security office (CSO) is the executive responsible for the physical and/or
cybersecurity of a company.
● Security engineers protect company assets from threats with a focus on quality
control within the IT infrastructure.
● Security architects are responsible for planning, analyzing, designing, testing, maintaining
and supporting an enterprise's critical infrastructure.
● Security analysts have several responsibilities that include planning security measures and
controls, protecting digital files, and conducting both internal and external security audits.
● Penetration testers are ethical hackers who test the security of systems, networks and
applications, seeking vulnerabilities that could be exploited by malicious actors.
● Threat hunters are threat analysts who aim to uncover vulnerabilities and attacks and
mitigate them before they compromise a business.
Other cybersecurity careers include security consultants, data protection officer, cloud security architects,
security operations manager (SOC) managers and analysts, security investigators, cryptographers and
security administrators.
Thank
You
References
● https://searchsecurity.techtarget.com/definition/cryptography
● https://www.synopsys.com/glossary/what-is-ethical-hacking.html
● https://www.greycampus.com/opencampus/ethical-hacking/what-is-footprinting
● https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Challenges_And_Its_
Emerging_Trends_On_Latest_Technologies
● https://cisomag.eccouncil.org/biggest-data-breaches-in-india/
● https://www.jigsawacademy.com/blogs/cyber-security/the-importance-of-cyber-security/
● https://www.indiacode.nic.in/bitstream/123456789/1999/3/A2000-21.pdf
● https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-security
● https://en.wikipedia.org/wiki/Information_Technology_Act,_2000
● https://www.geeksforgeeks.org/cyber-law-it-law-in-india/
● https://www.csoonline.com/article/3541148/the-biggest-data-breaches-in-india.html

More Related Content

What's hot

Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
Malware and security
Malware and securityMalware and security
Malware and security
Gurbakash Phonsa
 
Social engineering
Social engineeringSocial engineering
Social engineering
Vishal Kumar
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AbhishekDas794104
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
 
Cyber security
Cyber securityCyber security
Cyber security
Nimesh Gajjar
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
Parth Makadiya
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
msaksida
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
Toño Herrera
 
Social engineering
Social engineeringSocial engineering
Social engineering
Robert Hood
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
Cyber Security in Bangladesh
Cyber Security in Bangladesh Cyber Security in Bangladesh
Cyber Security in Bangladesh
Mohiuddin Murad
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 

What's hot (20)

Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Security in Bangladesh
Cyber Security in Bangladesh Cyber Security in Bangladesh
Cyber Security in Bangladesh
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
ETHICAL HACKING
ETHICAL HACKING ETHICAL HACKING
ETHICAL HACKING
 

Similar to Cyber security

Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
nikshaikh786
 
Cybercrime
CybercrimeCybercrime
Cybercrime
MobeenaJavid
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
TanushreeChakraborty27
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey96
 
C018131821
C018131821C018131821
C018131821
IOSR Journals
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
AnupmaMunshi
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
ssuserd25aae
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
Ashokkumar Gnanasekar
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Illumeo
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
Aman Sharma
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
Sitamarhi Institute of Technology
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
Dr. Prashant Vats
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
Taniya Fansupkar
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
ShailendraPandey96
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
Task 3
Task 3Task 3
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
RobertBhattarai
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
Shylesh BC
 

Similar to Cyber security (20)

Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
C018131821
C018131821C018131821
C018131821
 
Cyber Ethics Notes.pdf
Cyber Ethics Notes.pdfCyber Ethics Notes.pdf
Cyber Ethics Notes.pdf
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
cybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdfcybersecurityawareness-presentation-170627121043.pdf
cybersecurityawareness-presentation-170627121043.pdf
 
Cyber security awareness presentation
Cyber security awareness  presentationCyber security awareness  presentation
Cyber security awareness presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet UsersCYBER CRIME - A Threat To Internet Users
CYBER CRIME - A Threat To Internet Users
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
SHAILENDRA.ppt
SHAILENDRA.pptSHAILENDRA.ppt
SHAILENDRA.ppt
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Task 3
Task 3Task 3
Task 3
 
IT-Presentation.pptx
IT-Presentation.pptxIT-Presentation.pptx
IT-Presentation.pptx
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 

Cyber security

  • 1. CYBER SECURITY SUBMITTED BY: TANU GUJJAR AB-1244 SUBMITTED TO: Mr. Mahesh Kumar Bhandari
  • 2. What is Cybersecurity? Cybersecurity is the practice of protecting critical systems and sensitive information from digital attacks. Also known as information technology (IT) security, cybersecurity measures are designed to combat threats against networked systems and applications, whether those threats originate from inside or outside of an organization. Why is cybersecurity important? With an increasing number of users, devices and programs in the modern enterprise, combined with the increased deluge of data -- much of which is sensitive or confidential -- the importance of cybersecurity continues to grow. The growing volume and sophistication of cyber attackers and attack techniques compound the problem even further.
  • 3. CYBER CRIME Cyber crime is broadly defined as any illegal activity that involves a computer, another digital device or a computer network. Cyber crime includes common cybersecurity threats like social engineering, software vulnerability exploits and network attacks. But it also includes criminal acts like hacktivist protests, harassment and extortion, money laundering, and more. Cyber crime targets both individuals and companies. Typically, attackers target businesses for direct financial gain or to sabotage or disrupt operations. They target individuals as part of large-scale scams, or to compromise their devices and use them as a platform for nefarious activity.
  • 4. What are the different types of cybersecurity threats? The process of keeping up with new technologies, security trends and threat intelligence is a challenging task. It is necessary in order to protect information and other assets from cyberthreats, which take many forms. Types of cyberthreats include: ● Malware is a form of malicious software in which any file or program can be used to harm a computer user. This includes worms, viruses, Trojans and spyware. ● Ransomware is another type of malware. It involves an attacker locking the victim's computer system files -- typically through encryption -- and demanding a payment to decrypt and unlock them. ● Social engineering is an attack that relies on human interaction to trick users into breaking security procedures to gain sensitive information that is typically protected. ● Phishing is a form of social engineering where fraudulent email or text messages that resemble those from reputable or known sources are sent. Often random attacks, the intent of these messages is to steal sensitive data, such as credit card or login information.
  • 5.
  • 6. . ● Spear phishing is a type of phishing attack that has an intended target user, organization or business. ● Distributed denial-of-service (DDoS) attacks are those in which multiple systems disrupt the traffic of a targeted system, such as a server, website or other network resource. By flooding the target with messages, connection requests or packets, the attackers can slow the system or crash it, preventing legitimate traffic from using it. ● Advanced persistent threats (APTs) are prolonged targeted attacks in which an attacker infiltrates a network and remains undetected for long periods of time with the aim to steal data. ● Man-in-the-middle (MitM) attacks are eavesdropping attacks that involve an attacker intercepting and relaying messages between two parties who believe they are communicating with each other. ● Other common attacks include botnets, drive-by-download attacks, exploit kits, malvertising, vishing, credential stuffing attacks, cross-site scripting (XSS) attacks, SQL injection attacks, business email
  • 7. Common Cyber Crimes ● Data or computer/mobile phone owned by you is found in the hands of someone else. ● A password is stolen and used by someone else for fraudulent purpose. ● An email is read by someone else by fraudulently making use of password. ● Capturing, publishing or transmitting the image of a private area without any person’s consent or knowledge. ● Sending offensive messages through communication service,etc. ● Publishing or transmitting obscene material electric form. ● Stalking/ Cyber Stalking ● Tampering with computer source documents.
  • 8. Cryptography What is Cryptography? Cryptography or cryptology is the practice of study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages, various aspects in information security such as data confidentiality, data integrity, authentication, and non- repudiation are central to modern cryptography. Modern cryptography exists at the intersection of the discipline of the disciplines of mathematics, computer science, electrical engineering, communication science, and physics. Applications of cryptography include electric commerce, chip-based payment cards, digital currencies, computer passwords, and military communications.
  • 9. How does it actually works?
  • 10. Cryptographic Algorithms Cryptosystem use a set of procedures known as cryptographic algorithms, or ciphers, to encrypt and decrypt messages to secure communications among computer systems, devices and applications. A cipher suite uses one algorithm for encryption, another algorithm for message authentication and another for key exchange. This process, embedded in protocols and written in software that runs on operating systems and networked computer systems involves: ● public and private key generation for data encryption or decryption ● digital signing and verification for message authentication ● key exchange
  • 12. IT Laws ● The Information Technology Act, 2000 contains all of the IT laws of India. ● Set of rules which govern everything from how we act to what can be provided over the internet in the cyberspace. ● The IT Act not only extends to the whole of India but it is also applicable to any offense or contravention outside India by any person. ● Important to know that while the IT Act includes several offenses and the punishments for the same, some provisions also attract punishment under the IPC (Indian Penal Code). ● According to Ministry of Electronic and Information Technology, Government of India : Cyber Laws yields legal recognition to electronic documents and a structure to support e-filing and e-commerce transactions and also provides a legal structure to reduce cyber crimes. ● Generically, cyber law is referred to as the Law of the Internet.
  • 13. Why are IT Laws Important? ● IT Laws or Cyber Laws are important because they touch almost all aspects of transactions and activities involving the internet, World Wide Web and cyberspace. ● The law is enacted to save people and organizations from cybercrime and other internet- related crimes. It protects the privacy of every individual and organization. ● As per rules and regulations of the Cyber-law, a person who commits cyber crime is liable to get punishment. If anyone violates and breaks the provisions of the law, then it allows another person or organization to take legal action against that person. ● In today’s highly digitalized world, almost everyone is affected by cyber law. For example: Almost all transactions in shares are in demat form. Almost all companies extensively depend upon their computer networks and keep their valuable data in electronic form. Government forms including income tax returns, company law forms etc. are now filled in electronic form.
  • 14. Recent Data Breaches Took Place in India ● Domino’s India Data Breach Happened in April, 2021. Impacted 180 million order details. Data breached : Name, email, mobile number, order numbers, delivery address, GPS location ● COVID-19 test results of Indian patients leaked online Happened in January,2021. Impacted At least 1500 Indian citizens (real-time number estimated to be higher) Data breached : patients’ full names, dates of birth, testing dates and centers in which the tests were held
  • 15. Recent Data Breaches Took Place in India ● Air India Data Breach Happened in February, 2021. Impacted 4.5 million records. Data breached : Name, passport, credit card details, birth dates, contact information, passport information, ticket information and Air India’s frequent flyer data. ● Upstox Data Breach Happened in April,2021. Impacted 2.5 million records. Data breached : Name, email, mobile number aadhaar and bank account details.
  • 16. Drawbacks of IT Laws ● No legislative process. ● No consultation. ● Identify Theft. ● Breach of Privacy. ● Cyber War.
  • 17. Ethical Hacking What is Ethical Hacking? Ethical Hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Carrying out an ethical hack involves duplicating strategies and actions of malicious attackers. This practice helps to identify security vulnerabilities which can be resolved before a malicious attacker has the opportunity to exploit them.
  • 18. Key concepts of Ethical Hacking: ● Stay legal ● Define the scope ● Report vulnerabilities ● Respect data sensitivity How are ethical hackers different than malicious hackers? An ethical hacker reports the identified vulnerabilities to the organization. Additionally, they provide remediation advice. In many cases, with the organization’s consent, the ethical hacker performs a re-test to ensure the vulnerabilities are fully resolved. While malicious hackers intend to gain unauthorized access to a resource for the financial gain or personal recognition and thus aren’t concerned with improving the organization’s security posture.
  • 19.
  • 20.
  • 21. CYBER SECURITY TECHNIQUES 1. Access control and password security The concept of user name and password has been fundamental way of protecting our Information. This may be one of the first measures regarding cyber security. 2. Authentication of data The documents that we receive must always be authenticated be before downloading that is should be checked if it has originated from a trusted and a reliable source and that they are not altered. Authenticating of these documents is usually done by the anti virus software present in the devices. T 3.Malware scanners This is software that usually scans all the files and documents present in the system for malicious code or harmful viruses. Viruses, worms, and Trojan horses are examples of malicious software that are often grouped together and referred to as malware.
  • 22. 4 Firewalls A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet. All messages entering or leaving the internet pass through the firewall present, which examines each message and blocks those that do not meet the specified security criteria. Hence firewalls play an important role in detecting the malware 5 Anti-virus software Antivirus software is a computer program that detects, prevents, and takes action to disarm or remove malicious software Programs, such as viruses and worms. Most antivirus programs include an auto-update feature that enables the program to download profiles of new viruses so that it can check for the new viruses as soon as they are discovered. An anti virus software is a must and basic necessity for every system
  • 23. How is AI used in cybersecurity? Artificial Intelligence as become an integral component to keep companies protected from the growing number and sophistication of cyberthreats. Using artificial intelligence (AI) and machine learning in areas with high-volume data streams can help improve cybersecurity in three main categories: ● Threat detection. AI platforms can analyze data and recognize known threats, as well as predict novel threats. ● Threat response. AI platforms also create and automatically enact security protections. ● Human augmentation. Security pros are often overloaded with alerts and repetitive tasks. AI can help eliminate alert fatigue by automatically triaging low-risk alarms and automating big data analysis and other repetitive tasks, freeing humans for more sophisticated tasks.
  • 24. What are the career opportunities in cybersecurity? As the cyberthreat landscape continues to grow and new threats emerge -- such as IoT threats -- individuals are needed with cybersecurity awareness and hardware and software skills , IT professionals and other computer specialists are needed in security roles, such as: ● Chief information security officer (CISO) is the individual who implements the security program across the organization and oversees the IT security department's operations. ● Chief security office (CSO) is the executive responsible for the physical and/or cybersecurity of a company. ● Security engineers protect company assets from threats with a focus on quality control within the IT infrastructure.
  • 25. ● Security architects are responsible for planning, analyzing, designing, testing, maintaining and supporting an enterprise's critical infrastructure. ● Security analysts have several responsibilities that include planning security measures and controls, protecting digital files, and conducting both internal and external security audits. ● Penetration testers are ethical hackers who test the security of systems, networks and applications, seeking vulnerabilities that could be exploited by malicious actors. ● Threat hunters are threat analysts who aim to uncover vulnerabilities and attacks and mitigate them before they compromise a business. Other cybersecurity careers include security consultants, data protection officer, cloud security architects, security operations manager (SOC) managers and analysts, security investigators, cryptographers and security administrators.
  • 27. References ● https://searchsecurity.techtarget.com/definition/cryptography ● https://www.synopsys.com/glossary/what-is-ethical-hacking.html ● https://www.greycampus.com/opencampus/ethical-hacking/what-is-footprinting ● https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Challenges_And_Its_ Emerging_Trends_On_Latest_Technologies ● https://cisomag.eccouncil.org/biggest-data-breaches-in-india/ ● https://www.jigsawacademy.com/blogs/cyber-security/the-importance-of-cyber-security/ ● https://www.indiacode.nic.in/bitstream/123456789/1999/3/A2000-21.pdf ● https://www.kaspersky.co.in/resource-center/definitions/what-is-cyber-security ● https://en.wikipedia.org/wiki/Information_Technology_Act,_2000 ● https://www.geeksforgeeks.org/cyber-law-it-law-in-india/ ● https://www.csoonline.com/article/3541148/the-biggest-data-breaches-in-india.html