Cyber Security
A professional approach to protection
What is Cyber? What is Cyber
Security?
Elements of
Cyber Security
Types of Cyber
Threats
Latest Cyber
Threats
End-User
Protection
Cyber
Safety Tips
What is Cyber?
Storing Data
Protecting
Data
Accessing
Data
Processing
Data
Transmitting
Data
Linking Data
What is Cyber Security?
Cyber security refers to the body of technologies,
processes, and practices designed to protect networks,
devices, programs, and data from attack, damage, or
unauthorized access. Cyber security may also be
referred to as information technology security.
Elements of Cyber Security
NETWORK
SECURITY
Practice of securing a
computer network
APPLICATION
SECURITY
Keeping software and
devices free of threats
INFORMATION
SECURITY
Protects the integrity and
privacy of data
OPERATIONAL
SECURITY
Protects and handles
data assets
DISASTER
RECOVERY
Restores operations and
information after the
disaster
CLOUD
SECURITY
Protecting data in a 100%
online environment
Types of Cyber Threats
Cyber-crime
1
Cyber-attack
2
Cyber-terrorism
3
There are three forms of cyber-threats:
Methods used to threaten Cyber Security
PHISHING
Targeting victims
with fake emails
MALWARE
Software created
to disrupt or
damage user’s
computer
MAN-IN-THE-
MIDDLE- ATTACK
Intercepts
communication
between two
individuals to
steal data
SQL INJECTION
Take control and
steal data from a
database
DOS ATTACK
Makes the computer
system inaccessible for
the users
Latest Cyber Threats
DRIDEX MALWARE
Affects the public, government,
infrastructure and business worldwide
SCAM DATING SITES
Affects people emotionally and
personally
EMOTET MALWARE
Steals data and load malware
Dridex Malware
The U.S. Department of Justice
(DOJ) charged the cyber-criminal
group in a global Dridex
malware attack.
6 1
2
4 3
5
This has affected the public,
government, infrastructure, and
businesses worldwide..
Dridex is a financial Trojan with
a range of capabilities.
Affecting victims since 2014, it
infects computers through
phishing emails or existing
malware.
Stealing passwords, banking
details, and personal data, it has
caused massive financial losses
The U.K.’s National Cyber
Security Centre advises to
“ensure devices are patched,
anti-virus is turned on and up to
date and files are backed up”.
Emotet Malware
The Australian Cyber Security Centre
warned national organizations about a
global cyber threat from Emotet
malware
1
2
3
Sophisticated Trojan that can steal data
and load other malware
Thrives on unsophisticated password
Scam Dating Sites
FBI warned U.S. citizens to be aware of
the confidence fraud such as dating
sites, chat rooms, and apps
1
2
3
Perpetrators take advantage of people
seeking new partners, duping victims
into giving away personal data.
The FBI reports that this threat has
affected 114 victims in New Mexico in
2019, with financial losses amounting to
$1.6 million.
Why Cyber Security is important?
Government, Military, corporate world,
financial, and medical organizations, collect,
process, and store unmatched data on
devices.
Data can be sensitive information, like
intellectual property, financial data, or
personal information, and data with negative
consequences.
Organizations transmit sensitive data across
networks and to other devices while doing
business.
Thus, Cyber Security describes the discipline
dedicated to protecting that information and
systems that areused to process or store
them
Detect and remove
malicious code hidden
in Master Boot Record
(MBR) and are designed
to encrypt or wipe data
End-User Protection
End-user protection
or endpoint security
is a crucial aspect of
cyber security
Cyber-security relies on
cryptographic protocols
to encrypt emails, files,
and other critical data
Scans computers for
pieces of malicious
code, quarantines this
code, and then removes
Confine potentially
malicious programs to a
virtual environment
separate from a user's
network
Electronic security
protocols also focus on
real-time malware
detection
Cyber Safety Tips
Do not open email
attachments from
unknown senders
Avoid using
unsecure Wi-Fi
networks in public
places
Use Anti-Virus
software
Update your
software and
operating system
Use strong
passwords
Do not click on links
in emails from
unknown senders
Cybersecurity

Cybersecurity

  • 1.
    Cyber Security A professionalapproach to protection
  • 2.
    What is Cyber?What is Cyber Security? Elements of Cyber Security Types of Cyber Threats Latest Cyber Threats End-User Protection Cyber Safety Tips
  • 3.
    What is Cyber? StoringData Protecting Data Accessing Data Processing Data Transmitting Data Linking Data
  • 4.
    What is CyberSecurity? Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
  • 5.
    Elements of CyberSecurity NETWORK SECURITY Practice of securing a computer network APPLICATION SECURITY Keeping software and devices free of threats INFORMATION SECURITY Protects the integrity and privacy of data OPERATIONAL SECURITY Protects and handles data assets DISASTER RECOVERY Restores operations and information after the disaster CLOUD SECURITY Protecting data in a 100% online environment
  • 6.
    Types of CyberThreats Cyber-crime 1 Cyber-attack 2 Cyber-terrorism 3 There are three forms of cyber-threats:
  • 7.
    Methods used tothreaten Cyber Security PHISHING Targeting victims with fake emails MALWARE Software created to disrupt or damage user’s computer MAN-IN-THE- MIDDLE- ATTACK Intercepts communication between two individuals to steal data SQL INJECTION Take control and steal data from a database DOS ATTACK Makes the computer system inaccessible for the users
  • 8.
    Latest Cyber Threats DRIDEXMALWARE Affects the public, government, infrastructure and business worldwide SCAM DATING SITES Affects people emotionally and personally EMOTET MALWARE Steals data and load malware
  • 9.
    Dridex Malware The U.S.Department of Justice (DOJ) charged the cyber-criminal group in a global Dridex malware attack. 6 1 2 4 3 5 This has affected the public, government, infrastructure, and businesses worldwide.. Dridex is a financial Trojan with a range of capabilities. Affecting victims since 2014, it infects computers through phishing emails or existing malware. Stealing passwords, banking details, and personal data, it has caused massive financial losses The U.K.’s National Cyber Security Centre advises to “ensure devices are patched, anti-virus is turned on and up to date and files are backed up”.
  • 10.
    Emotet Malware The AustralianCyber Security Centre warned national organizations about a global cyber threat from Emotet malware 1 2 3 Sophisticated Trojan that can steal data and load other malware Thrives on unsophisticated password
  • 11.
    Scam Dating Sites FBIwarned U.S. citizens to be aware of the confidence fraud such as dating sites, chat rooms, and apps 1 2 3 Perpetrators take advantage of people seeking new partners, duping victims into giving away personal data. The FBI reports that this threat has affected 114 victims in New Mexico in 2019, with financial losses amounting to $1.6 million.
  • 12.
    Why Cyber Securityis important? Government, Military, corporate world, financial, and medical organizations, collect, process, and store unmatched data on devices. Data can be sensitive information, like intellectual property, financial data, or personal information, and data with negative consequences. Organizations transmit sensitive data across networks and to other devices while doing business. Thus, Cyber Security describes the discipline dedicated to protecting that information and systems that areused to process or store them
  • 13.
    Detect and remove maliciouscode hidden in Master Boot Record (MBR) and are designed to encrypt or wipe data End-User Protection End-user protection or endpoint security is a crucial aspect of cyber security Cyber-security relies on cryptographic protocols to encrypt emails, files, and other critical data Scans computers for pieces of malicious code, quarantines this code, and then removes Confine potentially malicious programs to a virtual environment separate from a user's network Electronic security protocols also focus on real-time malware detection
  • 14.
    Cyber Safety Tips Donot open email attachments from unknown senders Avoid using unsecure Wi-Fi networks in public places Use Anti-Virus software Update your software and operating system Use strong passwords Do not click on links in emails from unknown senders