2. 1. Introduction to Cyber Security
2. Need of Cyber Security
3. Types of Cyber Security
4. Types of Cyber Attacks And Preventions on it
5. Conclusion
6. References
Contents
3. Introduction to Cyber Security
What is CyberSpace?
•Worldwide Network of Computers
•Open to Public (Internet)
What is CyberSecurity?
Technologies & Processes to Protect
• Computers
• Networks
• Data from Unauthorized Users
• Vulnerabilities
4. Need of Cyber Security
1. To Protect Sensitive Business & Personal
Information
2. Safeguard National Security
3. To Protect Sensitive Data of
• Government
• Military
• Corporation
• Financial Institutions
• Hospital & ETC
10. Cyber Attacks…?
1. What is CyberAttack?
Attempt to
• Destroy
• Expose
• Alter
• Disable Unauthorized use of an Asset
2. Why CyberAttacks Become Possible?
• Vulnerability
• Spam
• Virus
11. 1. SQL injection
• Code Injection Technique that Exploits a
Security Vulnerability in Application
• Occurs at the Database layer of Application
2. SQL - Structured Query Language
• Used to communicate with the database
• ANSI-compliant SQL
MITM
XSS
DOS
SQL Injection
Phishing
Types of Cyber Attacks & Preventions
SQL Injection
12. • admin' --
• admin' #
• admin'/*
• or 1=1--
• ' or 1=1#
• ' or 1=1/*
• ') or '1'='1--
• ') or ('1'='1—
MITM
XSS
DOS
SQL Injection
Phishing
Types of Cyber Attacks & Preventions
SQL Injection Login Tricks
15. SQL Injection
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & Preventions
Phishing
• Is the act of attempting to acquire information such as
Usernames, Passwords, and Credit card
• Using Fake Web-Pages identical to the legitimate
one.
17. SQL Injection
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & Preventions
Phishing Preventions
1. Pay attention to the URL of a website.
2. Be suspicious of unsolicited phone calls, visits.
3. Do not provide personal information or information
about your organization
4. Do not respond to email solicitations for personal
information
5. Don't send sensitive information over the Internet
before checking a website's security
18. SQL Injection
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & Preventions
Man-In-The-Middle Attack
The MITM intercepts communications between two
systems and is performed when the attacker is in control
of a router along normal point of traffic.
19. SQL Injection
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & Preventions
Cross Site Scripting(XSS) Attack
XSS is a security breach that takes advantage of
dynamically generated Web pages.
20. SQL Injection
Phishing
MITM
XSS
DOS
Types of Cyber Attacks & Preventions
Daniel of Service(DOS) Attack
It basically means, launching an attack, which will
temporarily make the services, offered by the Network
unusable by legitimate users.
21. Conclusion
1. The Goal of Secure Computing
•Confidentiality
•Integrity
•Availability
2.Threats to Security in
Computing
•Interception
•Interruption
•Modification
•Fabrication3. Controls available to prevent
the threats
•Encryption & Programing Controls
•OS & Network Controls
•Administrative Controls
•Laws & Ethics