SlideShare a Scribd company logo
CYBER SECURITY IN BANKS
PRESENTED BY:
TEAM CYBER AVENGERS
ANMOL TAPOL
SANISH SHRESTHA
SANJAY GAUTAM
WE MUST HAVE SEEN THESE HEADLINES 
WHAT IS CYBER SECURITY?
-Protection of “Cyber” from unwarranted threats & unauthorized
access.
CYBER COMPUTER COMPUTER
NETWORK
COMPUTER
NETWORK
VIRTUAL
REALITY
Ransomeware Phishing Hacking
Data Leakage
Insider
Threat
HEEELLPP!
WHAT HAS THE REGULATOR DONE?
Install Perimeter Defense, Access
Control, Firewall, Encryption &
Antivirus
Prepare Preventive, Detective and
Responsive IT Security Strategy
Provide information on Incident &
Attack
Conduct IT Audit and apply
International Best Practices
Circular 6/076/77
DO BANKS HAVE
OTHER LEGAL
PROTECTION?
• Electronic Transactions Act, 2063
 Formation of Controller
Supervision & access to any
computer system
Recognition of alternation of source
code as offence
Recognition of unauthorized access
as offence
• Punishments
 Fine not exceeding NPR 200,000;
or
 Imprisonment not exceeding 3
years; or
 Both
• Adequacy of Punishment???
 Minimal nature of
punishment
 Higher cases of impunity
 Financial losses are in
millions
• Suggestions….
 Include modern terminologies
 Increase capital punishment
 Compliance with extradition
 Link with BAFIA, 2073
CYBER SECURITY IN CORE BANKING SYSTEM
• Procedures to that includes security experts that monitor, prevent & detect fraud
in CBS.
• Due focus placed on cashless movements.
• General IT controls may not track down the vulnerable areas.
• Use of reputed third party vendors or in-house development.
• Common sources:
Cyber
criminals
National
States
Hacktivists
Insiders
& Service
providers
Poor back-
up or
Clouding
services
Use of
sub-
standard
tools
MODERNIZATION
TARGETS
•Financial Institutions and Banks
•Internet Service Providers
•Governments and Defense agencies
•Multinational corporations
•Everyone connected to the network
Cracker:
Computer-savvy
programmer creates
attack software
Script Kiddies:
Unsophisticated
computer users
who know how to
execute
programs
Hacker Bulletin Board
SQL Injection
Buffer overflow
Password Crackers
Password Dictionaries
Successful attacks!
Crazyman broke into …
CoolCat penetrated…
Criminals:
Create & sell bots -> spam
Sell credit card numbers,…
System Administrators
Some scripts are useful
to protect networks…
11
TYPE OF MAJOR ATTACKS
• Social Engineering
• Malware
• Phishing
• Man-In-The-Middle Attack
• Denial-of-service attack
• Password Attack
SOCIAL ENGINEERING
• Hacking of Humans
• Information
Gathering
• Relationship
Developing
• Exploitation
Phone Call:
This is John,
the System
Admin.
What is your
password?
MALWARE
• Virus
• Worm
• Trojan
• Ransomware
• Spyware
• Adware
• Botnet
PHISHIN
G
• The main aim of Phishing is to steal restricted and private
information such as credit card details, login ids, and
passwords, etc.
• By impersonating oneself as a reliable establishment in
electronic communication.
• It is usually done through email spoofing/ instant messaging/
untrusted sites
MAN-IN-THE-MIDDLE ATTACK
• MitM attacks are the type of attacks where the attacker
eavesdrop between two consequently communicating hosts by
putting himself in between the point of data transmission
DENIAL-OF-SERVICE ATTACK
• In denial-of-service attack (DoS attack) the offender tries to
make digital assets inaccessible to its anticipated users.
• The offender provisionally interrupts services of a host who is
linked to the Internet.
PASSWORD ATTACK
• Brute-force
• Dictionary attack
SYMPTOMS
 Antivirus software detects a problem
 Pop-ups suddenly appear (may sell security software)
 Disk space disappears
 Files or transactions appear that should not be there
 System slows down to a crawl
CONT..
 Unusual messages, sounds, or displays on your monitor
 Stolen laptop (1 in 10 stolen in laptop lifetime)
 Your mouse moves by itself
 Your computer shuts down and powers off by itself
 Often not recognized
HOW TO PROTECT YOURSELF FROM CYBER
ATTACK
• Upgrade Your Operating System
• Turn on Automatic Updates
• Anti-Virus Software
• Back Up Your Data
• Create Secure Passwords
CONT..
• Set up a Firewall
• Validate SSL Certificates
• Avoid Installing Bundled Freeware
• Be Careful What You Download
• What To Do If You Get Hacked
• Never Ever Pay Hackers
BACKUP DATA
NO SECURITY MEASURE IS 100%
WHAT INFORMATION IS IMPORTANT TO YOU?
IS YOUR DATA BACK-UP?
THE FLOOR IS OPEN
THANK YOU
&
HAVE A GOOD DAY 

More Related Content

What's hot

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
Parab Mishra
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Foram Gosai
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
Self-employed
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
sommerville-videos
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
hubbysoni
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
ShafeeqaFarsana
 
Cyber security
Cyber security Cyber security
Cyber security
Sachith Lekamge
 
Cyber security
Cyber securityCyber security
Cyber security
ChethanMp7
 
Ppt
PptPpt
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
Ramiro Cid
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
Noushad Hasan
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
sweetpeace1
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
sanjana mun
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Bhandari Hìmáñßhü
 
Cyber crime
Cyber crimeCyber crime

What's hot (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Network Security and Firewall
Network Security and FirewallNetwork Security and Firewall
Network Security and Firewall
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ppt
PptPpt
Ppt
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Cyber security ppt final

cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
sakshiyad2611
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Arslan Meher
 
Security Threats & Cyber Crimes
Security Threats & Cyber CrimesSecurity Threats & Cyber Crimes
Security Threats & Cyber Crimes
Kushan Dananjaya
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
SumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
ArmaanBishnoi
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
ritik shukla
 
Cybercrime
CybercrimeCybercrime
Cybercrime
Vansh Verma
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
karanjohar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
Md. Atiqur Rahman
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
indhuchezhian
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
RavinderSingh172970
 
Cybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of CybercrimeCybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of Cybercrime
Lumiverse Solutions Pvt Ltd
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 
DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015
Andrzej Bartosiewicz
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
taufiq463421
 

Similar to Cyber security ppt final (20)

cyber threats and attacks.pptx
cyber threats and attacks.pptxcyber threats and attacks.pptx
cyber threats and attacks.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Security Threats & Cyber Crimes
Security Threats & Cyber CrimesSecurity Threats & Cyber Crimes
Security Threats & Cyber Crimes
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
Cybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of CybercrimeCybercrime | What is Cybercrime | Impacts of Cybercrime
Cybercrime | What is Cybercrime | Impacts of Cybercrime
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015DNS Cybersecurity in 2012-2015
DNS Cybersecurity in 2012-2015
 
Malware attack Social engineering attack
Malware attack  Social engineering attackMalware attack  Social engineering attack
Malware attack Social engineering attack
 

Recently uploaded

Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
Aggregage
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
Kirill Klimov
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
LuanWise
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
Chandresh Chudasama
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
CA Dr. Prithvi Ranjan Parhi
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
FelixPerez547899
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
aragme
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
techboxsqauremedia
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
thesiliconleaders
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
my Pandit
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
my Pandit
 
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
ABHILASH DUTTA
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
Alexandra Fulford
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
Top Forex Brokers Review
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
taqyea
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
DerekIwanaka1
 

Recently uploaded (20)

Understanding User Needs and Satisfying Them
Understanding User Needs and Satisfying ThemUnderstanding User Needs and Satisfying Them
Understanding User Needs and Satisfying Them
 
Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024Organizational Change Leadership Agile Tour Geneve 2024
Organizational Change Leadership Agile Tour Geneve 2024
 
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel ChartSatta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
Satta Matka Dpboss Matka Guessing Kalyan Chart Indian Matka Kalyan panel Chart
 
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta MatkaDpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
Dpboss Matka Guessing Satta Matta Matka Kalyan Chart Satta Matka
 
Building Your Employer Brand with Social Media
Building Your Employer Brand with Social MediaBuilding Your Employer Brand with Social Media
Building Your Employer Brand with Social Media
 
Structural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for BuildingsStructural Design Process: Step-by-Step Guide for Buildings
Structural Design Process: Step-by-Step Guide for Buildings
 
Income Tax exemption for Start up : Section 80 IAC
Income Tax  exemption for Start up : Section 80 IACIncome Tax  exemption for Start up : Section 80 IAC
Income Tax exemption for Start up : Section 80 IAC
 
Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024Company Valuation webinar series - Tuesday, 4 June 2024
Company Valuation webinar series - Tuesday, 4 June 2024
 
2022 Vintage Roman Numerals Men Rings
2022 Vintage Roman  Numerals  Men  Rings2022 Vintage Roman  Numerals  Men  Rings
2022 Vintage Roman Numerals Men Rings
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
Creative Web Design Company in Singapore
Creative Web Design Company in SingaporeCreative Web Design Company in Singapore
Creative Web Design Company in Singapore
 
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfThe 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdf
 
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your TasteZodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Taste
 
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...
 
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
The Evolution and Impact of OTT Platforms: A Deep Dive into the Future of Ent...
 
Business storytelling: key ingredients to a story
Business storytelling: key ingredients to a storyBusiness storytelling: key ingredients to a story
Business storytelling: key ingredients to a story
 
Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024Best Forex Brokers Comparison in INDIA 2024
Best Forex Brokers Comparison in INDIA 2024
 
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
一比一原版新西兰奥塔哥大学毕业证(otago毕业证)如何办理
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
BeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdfBeMetals Investor Presentation_June 1, 2024.pdf
BeMetals Investor Presentation_June 1, 2024.pdf
 

Cyber security ppt final

  • 1. CYBER SECURITY IN BANKS PRESENTED BY: TEAM CYBER AVENGERS ANMOL TAPOL SANISH SHRESTHA SANJAY GAUTAM
  • 2. WE MUST HAVE SEEN THESE HEADLINES 
  • 3. WHAT IS CYBER SECURITY? -Protection of “Cyber” from unwarranted threats & unauthorized access. CYBER COMPUTER COMPUTER NETWORK COMPUTER NETWORK VIRTUAL REALITY Ransomeware Phishing Hacking Data Leakage Insider Threat HEEELLPP!
  • 4. WHAT HAS THE REGULATOR DONE? Install Perimeter Defense, Access Control, Firewall, Encryption & Antivirus Prepare Preventive, Detective and Responsive IT Security Strategy Provide information on Incident & Attack Conduct IT Audit and apply International Best Practices Circular 6/076/77
  • 5. DO BANKS HAVE OTHER LEGAL PROTECTION? • Electronic Transactions Act, 2063  Formation of Controller Supervision & access to any computer system Recognition of alternation of source code as offence Recognition of unauthorized access as offence • Punishments  Fine not exceeding NPR 200,000; or  Imprisonment not exceeding 3 years; or  Both • Adequacy of Punishment???  Minimal nature of punishment  Higher cases of impunity  Financial losses are in millions • Suggestions….  Include modern terminologies  Increase capital punishment  Compliance with extradition  Link with BAFIA, 2073
  • 6. CYBER SECURITY IN CORE BANKING SYSTEM • Procedures to that includes security experts that monitor, prevent & detect fraud in CBS. • Due focus placed on cashless movements. • General IT controls may not track down the vulnerable areas. • Use of reputed third party vendors or in-house development. • Common sources: Cyber criminals National States Hacktivists Insiders & Service providers Poor back- up or Clouding services Use of sub- standard tools
  • 7.
  • 9.
  • 10. TARGETS •Financial Institutions and Banks •Internet Service Providers •Governments and Defense agencies •Multinational corporations •Everyone connected to the network
  • 11. Cracker: Computer-savvy programmer creates attack software Script Kiddies: Unsophisticated computer users who know how to execute programs Hacker Bulletin Board SQL Injection Buffer overflow Password Crackers Password Dictionaries Successful attacks! Crazyman broke into … CoolCat penetrated… Criminals: Create & sell bots -> spam Sell credit card numbers,… System Administrators Some scripts are useful to protect networks… 11
  • 12. TYPE OF MAJOR ATTACKS • Social Engineering • Malware • Phishing • Man-In-The-Middle Attack • Denial-of-service attack • Password Attack
  • 13. SOCIAL ENGINEERING • Hacking of Humans • Information Gathering • Relationship Developing • Exploitation Phone Call: This is John, the System Admin. What is your password?
  • 14. MALWARE • Virus • Worm • Trojan • Ransomware • Spyware • Adware • Botnet
  • 15. PHISHIN G • The main aim of Phishing is to steal restricted and private information such as credit card details, login ids, and passwords, etc. • By impersonating oneself as a reliable establishment in electronic communication. • It is usually done through email spoofing/ instant messaging/ untrusted sites
  • 16.
  • 17. MAN-IN-THE-MIDDLE ATTACK • MitM attacks are the type of attacks where the attacker eavesdrop between two consequently communicating hosts by putting himself in between the point of data transmission
  • 18. DENIAL-OF-SERVICE ATTACK • In denial-of-service attack (DoS attack) the offender tries to make digital assets inaccessible to its anticipated users. • The offender provisionally interrupts services of a host who is linked to the Internet.
  • 19.
  • 21. SYMPTOMS  Antivirus software detects a problem  Pop-ups suddenly appear (may sell security software)  Disk space disappears  Files or transactions appear that should not be there  System slows down to a crawl
  • 22. CONT..  Unusual messages, sounds, or displays on your monitor  Stolen laptop (1 in 10 stolen in laptop lifetime)  Your mouse moves by itself  Your computer shuts down and powers off by itself  Often not recognized
  • 23. HOW TO PROTECT YOURSELF FROM CYBER ATTACK • Upgrade Your Operating System • Turn on Automatic Updates • Anti-Virus Software • Back Up Your Data • Create Secure Passwords
  • 24. CONT.. • Set up a Firewall • Validate SSL Certificates • Avoid Installing Bundled Freeware • Be Careful What You Download • What To Do If You Get Hacked • Never Ever Pay Hackers
  • 25. BACKUP DATA NO SECURITY MEASURE IS 100% WHAT INFORMATION IS IMPORTANT TO YOU? IS YOUR DATA BACK-UP?
  • 26. THE FLOOR IS OPEN
  • 27. THANK YOU & HAVE A GOOD DAY 

Editor's Notes

  1. Backup should be done (at least)once a week. If possible, store to a removable media. The removable media should be big enough to hold 52 weeks of backup (e.g., 500GB). Do a full backup once a month and store it in offsite location. This would be useful in case of a disaster in your office (fire, theft, flood, etc). On the removable media create 12 folders for each month. Backup data should be tested periodically to ensure reliability.