SlideShare a Scribd company logo
CYBER
SECURITY
Sit Dolor Amet
What is cyber security?
• In simple words cyber security can be termed as a
technology which protects the networks and computer
systems from theft or disclosure or damage to their
hardware or software or electronic data. The
cybersecurity is a bundle of methods, processes and
technologies to support the safe, confidentiality, integrity
and availability of computer systems networks and data.
Why do we need cyber
security?
• The internet has become the integral part of today’s
generation of people; from communicating through instant
messages and emails to banking, travelling, studying and
shopping, internet has touched every aspect of life. With the
growing use of the internet by people, protecting important
information has become a necessity. A computer that is not
having appropriate security controls can be infected with
malicious logic and thus any type of information can be
accessed in moments. Number of infected Web Pages and
malicious websites can be seen every day that infects the
computer and allow hackers to gain illegal access to other
computer systems.
What are the benefits of
cybersecurity?
The benefits of implementing and maintaining cybersecurity
practices include:
 Business protection against cyberattacks and data
breaches.
 Protection for data and networks.
 Prevention of unauthorized user access.
 Improved recovery time after a breach.
 Protection for end users and endpoint devices.
 Regulatory compliance.
 Business continuity.
Types of cyber security threats
• Malware
• Ransomware
• Social engineering
• Insider threats
• DDos attack
• Man in the middle attack
How to prevent the breaches?
• Conduct cyber security training and awareness
• Perform risk assessments
• Ensure vulnerability management and software patch
management/updates
• Use the principle of least privilege
• Enforce secure password storage and policies
• Implement a robust business continuity and incidence response (BC-IR)
plan
• Perform periodic security reviews
• Backup data
• Use encryption for data at rest and in transit
• Design software and networks with security in mind
• Implement strong input validation and industry standards in secure
coding
Some real attacks
• Attacks on India’s CoWIN app
• SolarWinds Attack
• LinkedIn Phishing Scam
• Cyber-attack on Air India
Scope…
1. New Technologies and Devices
The reasons for the rise in cyberattacks—and the focus on protecting
against them—is multifold, Noubir says. One factor is the increase in new
technologies and new devices. By 2027, Business Insider predicts that more
than 41 billion Internet of Things (IoT) devices will be online and connected.
The IoT industry has become a prime target for cybercriminals and has sent
device makers scrambling to protect their smart plugs, wearable fitness
devices, and baby monitors from attacks.
2. Increasing Ransomware Attacks
Monetization is another key factor contributing to the rise in cyber attacks. In
the past, Noubir says, it was difficult for cybercriminals to profit from attacks,
but that has since changed. Now, cybercriminals have increasingly turned to
ransomware attacks, or those in which attackers gain access to and encrypt
a victim’s data and demand a ransom. “Cryptocurrencies and the emergence
of ransomware have made it easier for someone to commit a crime and get
away with it because they can get paid in untraceable ways,” he says.
“There’s also [the anonymous communication software] Tor, which makes it
easier to anonymize threats.”
3. Attacks on Cloud Services
Embracing this technology comes with many benefits such as
reduced operational costs and increased efficiency. Although opting
for such systems can be highly beneficial to organizations, they have
also become the target of cyberthreats. If these systems are not
properly configured or maintained, attackers are more likely to be able
to exploit vulnerabilities in the systems’ security and gain access to
sensitive information. This is particularly important, seeing that many
of today’s organizations rely on cloud services as employees work
remotely.
4. Outdated and Inefficient Systems
Finally, Noubir notes that businesses increase the risk of an attack or
breach by connecting legacy systems. When IT implements
patchwork solutions to resolve operational issues, security
vulnerabilities can be created inadvertently.
As cyberattacks are becoming increasingly sophisticated alongside
rapidly changing technologies, these outdated and inefficient systems
become easy targets.
CONCLUSION
• How the cybersecurity challenge will evolve as technologies and threats
evolve, and how this may alter workforce capability and capacity
requirements.
• How advances—such as better-quality, more-secure software; more
productive cybersecurity tools; better training of the workers that operate
and manage IT systems; or more robust law enforcement—might change
the number of workers needed in certain roles and change the skills
needed for others.
• How much responsibility for cybersecurity might shift from organizations at
large to more specialist information technology (IT) or cybersecurity firms,
which may reduce the number or change the mix of cybersecurity workers
needed by organizations.
Thank you
Malavika B
MCA(2020-22)
Hindusthan college of arts and science Coimbatore

More Related Content

What's hot

Cyber Security
Cyber SecurityCyber Security
Cyber Security
Arshad Khan
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
RaviPrashant5
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
Paige Rasid
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
PECB
 
Cyber security
Cyber securityCyber security
Cyber security
Manjushree Mashal
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
Rubal Sagwal
 
cyber security
cyber security cyber security
cyber security
NiharikaVoleti
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
PranjalShah18
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
Radar Cyber Security
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
Cyber security
Cyber securityCyber security
Cyber security
Harsh verma
 
Cyber security
Cyber securityCyber security
Cyber security
Pihu Goel
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
A.S. Sabuj
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
ChandanChandu928137
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
jayashri kolekar
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
 

What's hot (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
Advanced Cybersecurity Risk Management: How to successfully address your Cybe...
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
cyber security
cyber security cyber security
cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 

Similar to CYBER SECURITY.pptx

Cyber Security
Cyber SecurityCyber Security
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
ParthYadav89
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
AnushkaThakur11
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
RahimMakhani2
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
Careerera
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
E.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
Ken Flott
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
IndSightsResearchSG
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Vishwajeet Singh
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
KARANSINGHD
 
Computer security
Computer securityComputer security
Computer security
abdulrehman1673
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
ijtsrd
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
Kirti Ahirrao
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
accenture
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
accenture
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
IRJET Journal
 

Similar to CYBER SECURITY.pptx (20)

Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cyber Security.pptx
Cyber Security.pptxCyber Security.pptx
Cyber Security.pptx
 
Cybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdfCybersecurity In IoT Challenges And Effective Strategies.pdf
Cybersecurity In IoT Challenges And Effective Strategies.pdf
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
Computer security
Computer securityComputer security
Computer security
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 
Securing the digital economy
Securing the digital economySecuring the digital economy
Securing the digital economy
 
Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet Securing the Digital Economy: Reinventing the Internet
Securing the Digital Economy: Reinventing the Internet
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Recently uploaded

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 

Recently uploaded (16)

test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 

CYBER SECURITY.pptx

  • 2. What is cyber security? • In simple words cyber security can be termed as a technology which protects the networks and computer systems from theft or disclosure or damage to their hardware or software or electronic data. The cybersecurity is a bundle of methods, processes and technologies to support the safe, confidentiality, integrity and availability of computer systems networks and data.
  • 3. Why do we need cyber security? • The internet has become the integral part of today’s generation of people; from communicating through instant messages and emails to banking, travelling, studying and shopping, internet has touched every aspect of life. With the growing use of the internet by people, protecting important information has become a necessity. A computer that is not having appropriate security controls can be infected with malicious logic and thus any type of information can be accessed in moments. Number of infected Web Pages and malicious websites can be seen every day that infects the computer and allow hackers to gain illegal access to other computer systems.
  • 4. What are the benefits of cybersecurity? The benefits of implementing and maintaining cybersecurity practices include:  Business protection against cyberattacks and data breaches.  Protection for data and networks.  Prevention of unauthorized user access.  Improved recovery time after a breach.  Protection for end users and endpoint devices.  Regulatory compliance.  Business continuity.
  • 5. Types of cyber security threats • Malware • Ransomware • Social engineering • Insider threats • DDos attack • Man in the middle attack
  • 6. How to prevent the breaches? • Conduct cyber security training and awareness • Perform risk assessments • Ensure vulnerability management and software patch management/updates • Use the principle of least privilege • Enforce secure password storage and policies • Implement a robust business continuity and incidence response (BC-IR) plan • Perform periodic security reviews • Backup data • Use encryption for data at rest and in transit • Design software and networks with security in mind • Implement strong input validation and industry standards in secure coding
  • 7. Some real attacks • Attacks on India’s CoWIN app • SolarWinds Attack • LinkedIn Phishing Scam • Cyber-attack on Air India
  • 8. Scope… 1. New Technologies and Devices The reasons for the rise in cyberattacks—and the focus on protecting against them—is multifold, Noubir says. One factor is the increase in new technologies and new devices. By 2027, Business Insider predicts that more than 41 billion Internet of Things (IoT) devices will be online and connected. The IoT industry has become a prime target for cybercriminals and has sent device makers scrambling to protect their smart plugs, wearable fitness devices, and baby monitors from attacks. 2. Increasing Ransomware Attacks Monetization is another key factor contributing to the rise in cyber attacks. In the past, Noubir says, it was difficult for cybercriminals to profit from attacks, but that has since changed. Now, cybercriminals have increasingly turned to ransomware attacks, or those in which attackers gain access to and encrypt a victim’s data and demand a ransom. “Cryptocurrencies and the emergence of ransomware have made it easier for someone to commit a crime and get away with it because they can get paid in untraceable ways,” he says. “There’s also [the anonymous communication software] Tor, which makes it easier to anonymize threats.”
  • 9. 3. Attacks on Cloud Services Embracing this technology comes with many benefits such as reduced operational costs and increased efficiency. Although opting for such systems can be highly beneficial to organizations, they have also become the target of cyberthreats. If these systems are not properly configured or maintained, attackers are more likely to be able to exploit vulnerabilities in the systems’ security and gain access to sensitive information. This is particularly important, seeing that many of today’s organizations rely on cloud services as employees work remotely. 4. Outdated and Inefficient Systems Finally, Noubir notes that businesses increase the risk of an attack or breach by connecting legacy systems. When IT implements patchwork solutions to resolve operational issues, security vulnerabilities can be created inadvertently. As cyberattacks are becoming increasingly sophisticated alongside rapidly changing technologies, these outdated and inefficient systems become easy targets.
  • 10. CONCLUSION • How the cybersecurity challenge will evolve as technologies and threats evolve, and how this may alter workforce capability and capacity requirements. • How advances—such as better-quality, more-secure software; more productive cybersecurity tools; better training of the workers that operate and manage IT systems; or more robust law enforcement—might change the number of workers needed in certain roles and change the skills needed for others. • How much responsibility for cybersecurity might shift from organizations at large to more specialist information technology (IT) or cybersecurity firms, which may reduce the number or change the mix of cybersecurity workers needed by organizations.
  • 11. Thank you Malavika B MCA(2020-22) Hindusthan college of arts and science Coimbatore