SlideShare a Scribd company logo
INTRODUCTION TO CYBER
SECURITY &
FUNDAMENTALS OF IDPS
TECHNOLOGY
ANJANA PJ
CYBER SECURITY ADMINISTRATOR
WIPRO TECHNOLOGIES , KOCHI
INTRODUCTION TO CYBER
SECURITY
ANJANA P J
CYBER SECURITY ADMINISTRATOR
WIPRO TECHNOLOGIES
KOCHI
WHAT IS CYBER SECURITY?
• objective is to establish rules and measure to use against
attacks over the Internet.
• To prevent data breaches
• To prevent any unauthorized access/ usage.
Cyber security protection revolves around detection, recovery, and
response. Network security focuses on preventing access to IT
infrastructure through data encryption, password security, and other security
measures.
Cyber security aims to protect all digital data, while
network security seeks to protect transit data only.
Network security includes viruses and worms while
cyber security is more involved in phishing and pre-
texting.
CYBER v/s NETWORK SECURITY
CYBER SECURITY - STRATEGIES
HACKING
MALWARE
DOS & DDOS
SQL INJECTION
BRUTE FORCE
HACKING
Activities that seek to compromise digital
devices
motivated by financial gain, protest,
information gathering (spying), and even
just for the “fun” of the challenge.
Hackers are usually skilled computer
programmers with knowledge of computer
security.
• Malware is a collective term of viruses, worms, Trojans, etc.
• Hackers intentionally build Malware to cause damage to
computers and networks.
• Malware is usually distributed by email as a link or file,
requiring the recipient to click on the link or open the file to
execute it.
TYPES:
1.RANSOMWARE
2.SPYWARE
3.ADWARE
4.VIRUS/WORMS
MALWARE
DOS/DDOS ATTACKS
COMPARISON
Parameter Of Comparison DoS DDoS
Definition
DoS stands for Denial of Service
attack. It is used to crash a
website by transferring a load of
access requests from a
computer.
DDoS stands for Distributed
Denial of Service attack. It is also
used to crash a website and
make it unavailable to the users.
Facilitated By
DoS attack is facilitated by using
a single system.
DDoS attack is facilitated by using
a multiple systems.
Severity
DoS attack is considered less
severe.
DDoS attack is a very severe
attack.
Speed of Attack
The speed of a DoS attack is
slow.
The DDoS attack has a quick
speed.
Detection
A DoS attack can be easily
detected by identifying
the IP address of the attacking
computer.
A DDoS attack is difficult to
detect as many computers attack
the site at the same time.
Some attackers use applications and scripts as brute force tools.
BRUTE FORCE
Brute force is a simple attack method and has a high success
rate.
Involves ‘guessing’ username and passwords to
gain unauthorized access to a system.
SQL INJECTION ATTACK
SQL injection is a common attack vector that allows users with malicious SQL code to access
hidden information by manipulating the backend of databases.
A successful SQL injection can result in deletion of entire databases, unauthorized use of sensitive
data, and unintended granting of administrative rights to a database.
How to prevent ?
Password safety
Destroy all traces of your
personal info on hardware
you plan on selling.
Do not use open Wi-Fi on
your router
Update your OS and other software
frequently, if not automatically
OVERVIEW OF SOME SOLUTIONS
FIREWALL
INTRUSION
DETECTION
/PREVENTION
SYSTEM
WEB APPLICATION
FIREWALL
PROXY
EMAIL SECURITY
NETWORK ACCESS
CONTROL
SIEM
VULNERABILITY
ANALYSIS &
PREVENTION
COMMON VENDORS
• CISCO
• PALO ALTO
• CHECKPOINT
• RADWARE
• IMPERVA
• FIREEYE
• FORTINET
Workforce revealed that the percentage of women in cybersecurity is
roughly 24%.
In India around 11% of the sector’s workforce
Let’s bring out more women leaders !
HAPPY WOMEN’S DAY

More Related Content

What's hot

Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
Rashad Aliyev
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
Gareth Davies
 
Internet Security
Internet SecurityInternet Security
Internet Security
Peter R. Egli
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
Md. Hasan Basri (Angel)
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
Theko Moima
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
Quick Heal Technologies Ltd.
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Happiest Minds Technologies
 
Web security
Web securityWeb security
Web security
rakesh bandaru
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityAnand Kater
 
Web security by khubaib
Web security by khubaibWeb security by khubaib
Web security by khubaib
Khubaib Ahmad Kunjahi
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
Mohammed Adam
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
NormShield
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
Mohammed Adam
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
Vishal Singh
 
Web Security Training : Tonex Training
Web Security Training : Tonex TrainingWeb Security Training : Tonex Training
Web Security Training : Tonex Training
Bryan Len
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
divyanshigarg4
 
Cyber security snowe vazeer
Cyber security snowe vazeerCyber security snowe vazeer
Cyber security snowe vazeer
snowe123
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
Mohammed Adam
 

What's hot (19)

Introduction to Information security
Introduction to Information securityIntroduction to Information security
Introduction to Information security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
Cyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moimaCyber security talks 2019 by theko moima
Cyber security talks 2019 by theko moima
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
Dos and Don'ts of Internet Security
Dos and Don'ts of Internet SecurityDos and Don'ts of Internet Security
Dos and Don'ts of Internet Security
 
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime Cyber Security Analytics – The Weapon to Fight Cyber Crime
Cyber Security Analytics – The Weapon to Fight Cyber Crime
 
Web security
Web securityWeb security
Web security
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Web security by khubaib
Web security by khubaibWeb security by khubaib
Web security by khubaib
 
Career Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed AdamCareer Guidance on Cybersecurity by Mohammed Adam
Career Guidance on Cybersecurity by Mohammed Adam
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
Web Security Training : Tonex Training
Web Security Training : Tonex TrainingWeb Security Training : Tonex Training
Web Security Training : Tonex Training
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cyber security snowe vazeer
Cyber security snowe vazeerCyber security snowe vazeer
Cyber security snowe vazeer
 
Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2Webinar On Ethical Hacking & Cybersecurity - Day2
Webinar On Ethical Hacking & Cybersecurity - Day2
 

Similar to Cyber security[1118]

CYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxCYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptx
MOHAMMEDASHIK71
 
cyber security
cyber securitycyber security
cyber security
Naveed Ahmed Siddiqui
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
Haider Ali Malik
 
Cyber security
Cyber securityCyber security
Cyber security
Bablu Shofi
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
InsecureLab
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
MiltonBiswas8
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
Khappiyo
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
JamshidRaqi
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
zaarahary
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
cyberprosocial
 
Web security
Web securityWeb security
Web security
Iqbal Shaikh
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Security Threats & Cyber Crimes
Security Threats & Cyber CrimesSecurity Threats & Cyber Crimes
Security Threats & Cyber Crimes
Kushan Dananjaya
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
SidakSingh43
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
manigoyal112
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
Michael Noel
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
rahulbhardwaj312501
 

Similar to Cyber security[1118] (20)

CYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptxCYBER SECURITY final ppt-1.pptx
CYBER SECURITY final ppt-1.pptx
 
cyber security
cyber securitycyber security
cyber security
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
cyber security
cyber security cyber security
cyber security
 
Computer security 7.pptx
Computer security 7.pptxComputer security 7.pptx
Computer security 7.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Blockchain in cyber security
Blockchain in cyber securityBlockchain in cyber security
Blockchain in cyber security
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
Web security
Web securityWeb security
Web security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Security Threats & Cyber Crimes
Security Threats & Cyber CrimesSecurity Threats & Cyber Crimes
Security Threats & Cyber Crimes
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
IT Insecurity - Understanding the Threat of Modern Cyberattacks - DWCNZ 2024
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Recently uploaded

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 

Recently uploaded (20)

AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang,  ICLR 2024, MLILAB, KAIST AI.pdfJ.Yang,  ICLR 2024, MLILAB, KAIST AI.pdf
J.Yang, ICLR 2024, MLILAB, KAIST AI.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 

Cyber security[1118]

  • 1. INTRODUCTION TO CYBER SECURITY & FUNDAMENTALS OF IDPS TECHNOLOGY ANJANA PJ CYBER SECURITY ADMINISTRATOR WIPRO TECHNOLOGIES , KOCHI INTRODUCTION TO CYBER SECURITY ANJANA P J CYBER SECURITY ADMINISTRATOR WIPRO TECHNOLOGIES KOCHI
  • 2. WHAT IS CYBER SECURITY? • objective is to establish rules and measure to use against attacks over the Internet. • To prevent data breaches • To prevent any unauthorized access/ usage.
  • 3. Cyber security protection revolves around detection, recovery, and response. Network security focuses on preventing access to IT infrastructure through data encryption, password security, and other security measures. Cyber security aims to protect all digital data, while network security seeks to protect transit data only. Network security includes viruses and worms while cyber security is more involved in phishing and pre- texting. CYBER v/s NETWORK SECURITY
  • 4. CYBER SECURITY - STRATEGIES
  • 5. HACKING MALWARE DOS & DDOS SQL INJECTION BRUTE FORCE
  • 6. HACKING Activities that seek to compromise digital devices motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge. Hackers are usually skilled computer programmers with knowledge of computer security.
  • 7.
  • 8. • Malware is a collective term of viruses, worms, Trojans, etc. • Hackers intentionally build Malware to cause damage to computers and networks. • Malware is usually distributed by email as a link or file, requiring the recipient to click on the link or open the file to execute it. TYPES: 1.RANSOMWARE 2.SPYWARE 3.ADWARE 4.VIRUS/WORMS MALWARE
  • 10. COMPARISON Parameter Of Comparison DoS DDoS Definition DoS stands for Denial of Service attack. It is used to crash a website by transferring a load of access requests from a computer. DDoS stands for Distributed Denial of Service attack. It is also used to crash a website and make it unavailable to the users. Facilitated By DoS attack is facilitated by using a single system. DDoS attack is facilitated by using a multiple systems. Severity DoS attack is considered less severe. DDoS attack is a very severe attack. Speed of Attack The speed of a DoS attack is slow. The DDoS attack has a quick speed. Detection A DoS attack can be easily detected by identifying the IP address of the attacking computer. A DDoS attack is difficult to detect as many computers attack the site at the same time.
  • 11. Some attackers use applications and scripts as brute force tools. BRUTE FORCE Brute force is a simple attack method and has a high success rate. Involves ‘guessing’ username and passwords to gain unauthorized access to a system.
  • 12. SQL INJECTION ATTACK SQL injection is a common attack vector that allows users with malicious SQL code to access hidden information by manipulating the backend of databases. A successful SQL injection can result in deletion of entire databases, unauthorized use of sensitive data, and unintended granting of administrative rights to a database.
  • 13. How to prevent ? Password safety Destroy all traces of your personal info on hardware you plan on selling. Do not use open Wi-Fi on your router Update your OS and other software frequently, if not automatically
  • 14. OVERVIEW OF SOME SOLUTIONS FIREWALL INTRUSION DETECTION /PREVENTION SYSTEM WEB APPLICATION FIREWALL PROXY EMAIL SECURITY NETWORK ACCESS CONTROL SIEM VULNERABILITY ANALYSIS & PREVENTION
  • 15. COMMON VENDORS • CISCO • PALO ALTO • CHECKPOINT • RADWARE • IMPERVA • FIREEYE • FORTINET
  • 16. Workforce revealed that the percentage of women in cybersecurity is roughly 24%. In India around 11% of the sector’s workforce Let’s bring out more women leaders ! HAPPY WOMEN’S DAY