SlideShare a Scribd company logo
1 of 8
CYBER THREATS AND ITS
TYPES
ADITYA KUMAR
WHAT IS CYBER THREAT?
A CYBER SECURITY THREAT REFERS TO ANY
POSSIBLE MALICIOUS ATTACK THAT SEEKS TO
UNLAWFULLY ACCESS DATA, DISRUPT DIGITAL
OPERATIONS OR DAMAGE INFORMATION.
TYPES OF CYBER THREATS
PHISHING
PHISHING ATTACKS ARE MEANT FOR
STEALING USER INFORMATION, SUCH AS
USER CREDENTIALS AND CREDIT CARD
NUMBERS AND PINS TO ACCESS BANK
ACCOUNT OF THE VICTIM OR TAKE CONTROL
OF SOCIAL NETWORK DATA.
MALWARE
MALWARE IS INTRUSIVE SOFTWARE THAT IS
DESIGNED TO DAMAGE AND DESTROY
COMPUTERS AND COMPUTER SYSTEMS.
MALWARE IS A CONTRACTION FOR
“MALICIOUS SOFTWARE”.
SMISHING
AS THE DEFINITION OF SMISHING
SUGGESTS, THE TERM COMBINES "SMS"
(SHORT MESSAGE SERVICES, BETTER
KNOWN AS TEXTING) AND "PHISHING." TO
FURTHER DEFINE SMISHING, IT IS
CATEGORIZED AS A TYPE OF SOCIAL
ENGINEERING ATTACK THAT RELIES ON
EXPLOITING HUMAN TRUST RATHER THAN
TECHNICAL EXPLOITS.
AND THERE ARE MANY MORE…
Virus Trojan Horse Spyware Ransomware Worm Adware
EFFECTS OF THREATS ON BANKING AND
FINANCIAL INSTITUTIONS
• BIGGEST THREAT TO BANK AND FINANCIAL INSTITUTIONS IS MONEY LOSS
• CYBER CRIMINALS GAIN REMOTE ACCESS TO THE SYSTEMS WHERE THEY CAN ADMINISTER ALL DATA.
• THEY CAN STEAL THE CONFIDENTIAL INFORMATION AND THEY CAN SALE IT, EVEN THEY CAN USE IT FOR SPYING OR TERRORISM.
• THEY CAN TARGET CUSTOMERS BY ATTACKING ON ORGANIZATION. IT MAY RESULT INTO CUSTOMER FRUSTRATION OR
CUSTOMER IDENTITY THEFT.
• ORGANIZATION’S PUBLIC REPUTATION CAN BE DESTRUCTED FOR INSUFFICIENT INFORMATION SECURITY COMPLIANCE.
CONCLUSION
CYBER ISSUES ARE GLOBAL ISSUES NOW. IT CAN BE NOTED THAT THERE IS NO DISCRIMINATION OF DEVELOPED
OR UNDERDEVELOPED COUNTRIES. THESE ATTACKS ARE NOT BOUNDARY RESTRICTED. THERE IS NO WAY TO
ESCAPE FROM THE FACT THAT THE MOST TARGET ORGANIZATIONS ARE FINANCIAL INSTITUTIONS BECAUSE
MONEY, INFORMATION AND PUBLIC ARE MOST ASSOCIATED WITH THEM. IT CAN BE CONCLUDED THAT BANKS AS A
FINANCIAL INSTITUTION CONTAIN HIGHER CYBER RISK AS COMPARE TO OTHER INSTITUTIONS. MOST OF THE TIME
MOTIVE OF CYBER CRIMINALS IS TO GAIN FINANCIAL ADVANTAGE OR TO FRUSTRATE THE CUSTOMERS. BUT
INSTITUTIONS CAN FIGHT BY WORKING VERY ACTIVELY. ORGANIZATIONS MUST BE UPDATED WITH LATEST TOOLS
AND TACTICS USED BY HACKER TO GAIN ANY ILLEGAL ADVANTAGE. IN ADDITION TO THE ABOVE, WHITE HAT
HACKERS REPORT THE ORGANIZATIONS FROM CYBER THREAT. ORGANIZATIONS SHOULD PAY ATTENTION TO
THEIR REPORTS AND MUST ENCOURAGE WHITE-HAT HACKERS BY SPLENDID REWARDS AND BOUNTIES SO CYBER-
CRIMINALS MAY BE DISCOURAGED.
THANK YOU !!

More Related Content

Similar to Cyber Threats and its Types: Malware, Virus.pptx

Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
NYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-SecurityNYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-SecurityOndrej Krehel
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against propertyvarunbamba
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance Hubbard Insurance Group
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism Accenture
 
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxtodd271
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorEMC
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commercemanigoyal112
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber InsuranceJohn Ryan
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan
 

Similar to Cyber Threats and its Types: Malware, Virus.pptx (20)

Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
NYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-SecurityNYCDS-DQ-Winter-2016-Cyber-Security
NYCDS-DQ-Winter-2016-Cyber-Security
 
Patrick armstrong athens
Patrick armstrong athensPatrick armstrong athens
Patrick armstrong athens
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
Cyber crime against property
Cyber crime against propertyCyber crime against property
Cyber crime against property
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance 10 Reasons to buy Cyber Liability Insurance
10 Reasons to buy Cyber Liability Insurance
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
cyber terrorism
 cyber terrorism  cyber terrorism
cyber terrorism
 
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docxRunning Head CYBERSECURITY1CYBERSECURITY 15.docx
Running Head CYBERSECURITY1CYBERSECURITY 15.docx
 
Countering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website BehaviorCountering Cyber Threats By Monitoring “Normal” Website Behavior
Countering Cyber Threats By Monitoring “Normal” Website Behavior
 
Cyber security and its impact on E commerce
Cyber security and its impact on E commerceCyber security and its impact on E commerce
Cyber security and its impact on E commerce
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
A Guide To Cyber Insurance
A Guide To Cyber InsuranceA Guide To Cyber Insurance
A Guide To Cyber Insurance
 
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - DubaiAftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
Aftab Hasan Speaking at Cyber Security in Banking Conference - Dubai
 

Recently uploaded

Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsUXDXConf
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxJennifer Lim
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024TopCSSGallery
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoTAnalytics
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyUXDXConf
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024Stephanie Beckett
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreelreely ones
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlPeter Udo Diehl
 

Recently uploaded (20)

Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 

Cyber Threats and its Types: Malware, Virus.pptx

  • 1. CYBER THREATS AND ITS TYPES ADITYA KUMAR
  • 2.
  • 3. WHAT IS CYBER THREAT? A CYBER SECURITY THREAT REFERS TO ANY POSSIBLE MALICIOUS ATTACK THAT SEEKS TO UNLAWFULLY ACCESS DATA, DISRUPT DIGITAL OPERATIONS OR DAMAGE INFORMATION.
  • 4. TYPES OF CYBER THREATS PHISHING PHISHING ATTACKS ARE MEANT FOR STEALING USER INFORMATION, SUCH AS USER CREDENTIALS AND CREDIT CARD NUMBERS AND PINS TO ACCESS BANK ACCOUNT OF THE VICTIM OR TAKE CONTROL OF SOCIAL NETWORK DATA. MALWARE MALWARE IS INTRUSIVE SOFTWARE THAT IS DESIGNED TO DAMAGE AND DESTROY COMPUTERS AND COMPUTER SYSTEMS. MALWARE IS A CONTRACTION FOR “MALICIOUS SOFTWARE”. SMISHING AS THE DEFINITION OF SMISHING SUGGESTS, THE TERM COMBINES "SMS" (SHORT MESSAGE SERVICES, BETTER KNOWN AS TEXTING) AND "PHISHING." TO FURTHER DEFINE SMISHING, IT IS CATEGORIZED AS A TYPE OF SOCIAL ENGINEERING ATTACK THAT RELIES ON EXPLOITING HUMAN TRUST RATHER THAN TECHNICAL EXPLOITS.
  • 5. AND THERE ARE MANY MORE… Virus Trojan Horse Spyware Ransomware Worm Adware
  • 6. EFFECTS OF THREATS ON BANKING AND FINANCIAL INSTITUTIONS • BIGGEST THREAT TO BANK AND FINANCIAL INSTITUTIONS IS MONEY LOSS • CYBER CRIMINALS GAIN REMOTE ACCESS TO THE SYSTEMS WHERE THEY CAN ADMINISTER ALL DATA. • THEY CAN STEAL THE CONFIDENTIAL INFORMATION AND THEY CAN SALE IT, EVEN THEY CAN USE IT FOR SPYING OR TERRORISM. • THEY CAN TARGET CUSTOMERS BY ATTACKING ON ORGANIZATION. IT MAY RESULT INTO CUSTOMER FRUSTRATION OR CUSTOMER IDENTITY THEFT. • ORGANIZATION’S PUBLIC REPUTATION CAN BE DESTRUCTED FOR INSUFFICIENT INFORMATION SECURITY COMPLIANCE.
  • 7. CONCLUSION CYBER ISSUES ARE GLOBAL ISSUES NOW. IT CAN BE NOTED THAT THERE IS NO DISCRIMINATION OF DEVELOPED OR UNDERDEVELOPED COUNTRIES. THESE ATTACKS ARE NOT BOUNDARY RESTRICTED. THERE IS NO WAY TO ESCAPE FROM THE FACT THAT THE MOST TARGET ORGANIZATIONS ARE FINANCIAL INSTITUTIONS BECAUSE MONEY, INFORMATION AND PUBLIC ARE MOST ASSOCIATED WITH THEM. IT CAN BE CONCLUDED THAT BANKS AS A FINANCIAL INSTITUTION CONTAIN HIGHER CYBER RISK AS COMPARE TO OTHER INSTITUTIONS. MOST OF THE TIME MOTIVE OF CYBER CRIMINALS IS TO GAIN FINANCIAL ADVANTAGE OR TO FRUSTRATE THE CUSTOMERS. BUT INSTITUTIONS CAN FIGHT BY WORKING VERY ACTIVELY. ORGANIZATIONS MUST BE UPDATED WITH LATEST TOOLS AND TACTICS USED BY HACKER TO GAIN ANY ILLEGAL ADVANTAGE. IN ADDITION TO THE ABOVE, WHITE HAT HACKERS REPORT THE ORGANIZATIONS FROM CYBER THREAT. ORGANIZATIONS SHOULD PAY ATTENTION TO THEIR REPORTS AND MUST ENCOURAGE WHITE-HAT HACKERS BY SPLENDID REWARDS AND BOUNTIES SO CYBER- CRIMINALS MAY BE DISCOURAGED.