Cyber
Attack
Cyber Security is the technology and
process that is designed to protect
networks and devices from attack,
damage, or unauthorized access.
Protection of
business
Increase
productivity
Inspires customer
confidence
Stops your website
from crashing
Protection for
customers or clients
Confidentiality, Integrity, Availability
have served as the industry standard
for Computer Security since the time
of first mainframes.
The principles
of confidentiality assert
that information and
functions can be
accessed only by
authorized parties.
Example: Military
Secrets
The principles of
confidentiality assert that
information and functions can
be added, altered, or removed
only by authorized people &
means.
Example: Incorrect data
entered by a user in the
database
The principles of availability assets that
systems, functions, and data must be available
on demand according to agreed-upon
parameters based on levels of service.
Cybercrime is any
criminal activity that
involves a computer,
network device or a
network
Most Cybercrime are
carried out in order
to generate profit
for the Cyber
Criminals.
Cybercrime are carried
out against computers or
devices directly to
damage or disable the,
spread malware, steal
secret information, etc.
Fraud, Denial
of Service
(DOS)
Customer Sniffing,
traffickers Viruses
Information theft
& manipulating
data
Achieving state’s military
objectives
Demanding ransom
Damaging reputation of
the target
Financial loss to the target
Disputing business
continuity
WhiteHat
Hacker
01
0
2
Black Hat
Hacker
0
3
Gray Hat
Hacker
0
4
Red Hat
0
5
Hacktivi
st
0
6
Script
Kiddie
A Cyber
Security expert is an
individual employed
by an organization
to protect their
data.
₹
- Kali Linux
Cyber Security learning material (2).pptx

Cyber Security learning material (2).pptx

Editor's Notes

  • #4 industrial espionage means embracing illegal and unethical methods of collecting corporate data to gain a competitive advantage