SlideShare a Scribd company logo
1 of 15
Download to read offline
Cybersecurity,
hackers and
viruses
Digital Danger - 15-23.3.2022
Joanna Kwapień
Katarzyna Rutowska
What is cybersecurity,
how does it work?
Cybersecurity is designed to provide multiple layers of protection across all of the
computers, networks, and programs used by a business. In order to create a
unified defence against potential cyberattacks, it is important that the business,
employees, processes, and technology are designed to work seamlessly together.
Cybersecurity systems that function properly will be able to detect, investigate, and
resolve potential weaknesses and vulnerabilities in the system before they can be
exploited by a hacker or malicious software.
In short words:
By implementing security, businesses and individuals can protect
themselves against the full range of cyber security threats outlined
below, as well as the numerous others that exist.
With cyber security, companies do not have to worry about
unauthorized users accessing their network or data. It helps them
protect both their end users and their employees.
What are the benefits
of cybersecurity?
Even in those rare cases that security does not prevent an attack or
breach, it improves the recovery time afterward. In addition companies
will often notice that customers and developers are more confident in
products that have strong cyber security solutions in place.
Threats vs vulnerabilities vs consequences
Threat:
Threats can include social
engineering attacks, DDoS
attacks, and advanced
persistent threats, to name a
few. Threat actors may be
associated with nation-
states, insiders, criminal
enterprises, and are typically
motivated by financial gain
or political agendas.


Vulnerability:
In cybersecurity, a
vulnerability refers to
weakness, flaw, or error that
can be exploited by attackers
to gain unauthorized access.
Vulnerabilities can be taken
advantage of in a number of
ways, which is why
vulnerability management is
crucial for staying ahead of
criminals.


Consequence:
The consequence is the actual
harm or damages that occur as a
result of a network disruption.
Typically, an organization will
incur both direct and indirect
consequences as they work to
remediate the problem.
Depending on the attack,
consequences may impact an
organization’s finances,
operations, reputation, and
regulatory compliance status.
What are the different types
of cybersecurity threats?
1. Malware
Malware is malicious software such as spyware, ransomware, viruses
and worms. Malware is activated when a user clicks on a malicious link
or attachment, which leads to installing dangerous software.
2. Emotet
An advanced, modular banking Trojan that primarily functions as a
downloader or dropper of other banking Trojans. Emotet continues to
be among the most costly and destructive malware.
3. Denial of Service
A denial of service (DoS) is a type of cyber attack that floods a
computer or network so it can’t respond to requests. A distributed DoS
(DDoS) does the same thing, but the attack originates from a computer
network. Cyber attackers often use a flood attack to disrupt the
“handshake” process and carry out a DoS. Several other techniques
may be used, and some cyber attackers use the time that a network is
disabled to launch other attacks.
What are the different types
of cybersecurity threats?
4. Man in the Middle
MITM attacks often occur when a visitor uses an unsecured public Wi-Fi
network. Attackers insert themselves between the visitor and the network, and
then use malware to install software and use data maliciously.
5. Phishing
Phishing attacks use fake communication, such as an email, to trick the
receiver into opening it and carrying out the instructions inside, such as
providing a credit card number.
6. SQL Injection
A Structured Query Language (SQL) injection is a type of cyber attack that
results from inserting malicious code into a server that uses SQL. When
infected, the server releases information. Submitting the malicious code can
be as simple as entering it into a vulnerable website search box.
7. Password Attacks
With the right password, a cyber attacker has access to a wealth of
information. Password attacks include accessing a password database or
outright guessing.
Cybersecurity in Poland
The Polish cybersecurity market is relatively
small. The most important group of clients is
(for many years) several large clients, i.e. the
largest public and private companies, state
apparatus, as well as universities and other
public entities (e.g. hospitals). The second
important group are small and medium-
sized enterprises. Warsaw is by far the
dominant center in Poland, where almost
one third of the surveyed companies
conduct their activities. Other important
centersare: Poznań, Wrocław, Kraków and
Silesia.
The vast majority of cybersecurity
companies are located in western or central
Poland, which is also related to the wealth
and population of these regions. When it
comes to the dynamics of the emergence of
companies in Poland dealing with
cybersecurity, there has been a clear upward
trend in recent years.
What are the biggest barriers to the
development of cybersecurity in Poland?
1.Low market awareness of the need to use
cybersecurity solutions.
2. Difficulty recruiting cybersecurity experts
and other specialists.
3. Lack of sufficient capital for development.
4. Difficulties in reaching key stakeholders in
the sales process.
5. Unclear legal regulations
2.Anna Kournikova
She may be a famous tennis player, but
she makes a world-beating computer
virus. Thousands of people have been
tricked into opening a mail message
that says it contains a picture of Anna
Kournikova but actually hides a
malicious program. If set off, the
programme plunders the address book
of the Microsoft Outlook e-mail
programme and attempts to send itself
to all the people listed there.
3.Deskop Goose
This could also be the case for the popular
Desktop Goose mini-game. Although it is not
a virus, Desktop Goose can interrupt any
activity on your computer. Will not hesitate to
appear during a PC game by dragging the
note that says "good job".
Can virus look cute?
1. ILOVEYOU
While ILOVEYOU sounds like a cheerful
bon mot you might find printed on the
inside of a Valentine’s Day card, it’s
actually far, far more sinister than that.
ILOVEYOU is one of the most well-known
and destructive viruses of all time. The
virus came in an email with a subject
line that said “I love you”. Being curious
types, people clicked into the email with
aplomb—regardless of the fact the email
wasn’t from anyone they knew. The
malware was a worm that was
downloaded by clicking on an
attachment called ‘LOVE-LETTER-FOR-
YOU.TXT.vbs’. ILOVEYOU overwrote system
files and personal files and spread itself
over and over and over again.
Cybersecurity
challenges
Ransomware attacks - hacking into a user’s data and preventing them from
accessing it until a ransom amount is paid
Cloud attacks - hacking cloud-platforms to steal user data
Phishing attacks - type of social engineering attack often used to steal user data,
including login credentials and credit card numbers
Blockchain and cryptocurrency attacks - it can compromise the customer data
and business operations
Software vulnerabilities - an older software version might contain patches for
security vulnerabilities that are fixed by the developers in the newer version
Machine learning and AI attacks - hese technologies can be used to identify
high-value targets among a large dataset
BYOD policies - your own device may not be strong enough and you risk leaking
the data of your work place
Insider attacks - Employees with malicious intent can leak or export confidential
data to competitors or other individuals
Outdated hardware - Hardware isn’t advanced enough to run the latest software
versions. This leaves such devices on an older version of the software, making them
highly susceptible to cyberattacks.
Cybersecurity vendors and tools






Antivirus Software - program which is designed to prevent, detect, and remove viruses
and other malware attacks on the individual computer, networks, and IT systems
Firewall - Its job is to prevent unauthorized access to or from a private network. It can be
implemented as hardware, software, or a combination of both.
PKI Services - Public Key Infrastructure. This tool supports the distribution and identification
of public encryption keys.
Managed Detection Services - MDR is an advanced security service that provides threat
hunting, threat intelligence, security monitoring, incident analysis, and incident response.
Penetration Testing - In Penetration testing, cybersecurity professionals will use the same
techniques and processes utilized by criminal hackers to check for potential threats and
areas of weakness.
Staff training - it's not a 'cybersecurity tool' but ultimately, having knowledgeable
employees who understand the cybersecurity which is one of the strongest forms of defence
against cyber-attacks.
How to protect yourself?
Install anti-virus software
Set a password, gesture or fingerprint that must be
entered to unlock
Set the device to require a password before applications
are installed
Leave Bluetooth hidden when not in use and disabling
automatic connection to networks
Enable remote locking and/or wiping functions, if your
device supports them.
Change your passwords often and remember - the
longer the password, the better.
Secure your device:
Report a crime
Report it to the sites that has been influenced, for example Facebook Help
Community
Collect and keep evidence
Change all of your passwords
Close any unauthorized or compromised credit or charge accounts
Think about what other personal information may be at risk
You have been a victim of cyber crime
- what to do?
Thank you!
Cybersecurity - Poland.pdf

More Related Content

What's hot

Guide to Psychological First Aid
Guide to Psychological First AidGuide to Psychological First Aid
Guide to Psychological First AidAleja Verna Salando
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationpamelazuley
 
Mental Health, Illness, Stigma and Awareness Strategies
Mental Health, Illness, Stigma and Awareness Strategies Mental Health, Illness, Stigma and Awareness Strategies
Mental Health, Illness, Stigma and Awareness Strategies Aaradhana Reddy
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpointbanksmc11
 
Addiction
AddictionAddiction
Addictionjben501
 
Drug Addiction Original 51 Slides
Drug Addiction Original 51 SlidesDrug Addiction Original 51 Slides
Drug Addiction Original 51 SlidesALI RAZA
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying PowerpointPrissykrissy
 
Domestic violence
Domestic violenceDomestic violence
Domestic violenceAmlan Patel
 
Gaps in mental health
Gaps in mental healthGaps in mental health
Gaps in mental healthTanyaSyngle
 
Parental Mental Health and its impact on Parenting Capacity.
Parental Mental Health and its impact on Parenting Capacity.Parental Mental Health and its impact on Parenting Capacity.
Parental Mental Health and its impact on Parenting Capacity.BASPCAN
 
Understanding drugs and addiction By Mzwandile Mashinini
Understanding drugs and addiction By Mzwandile Mashinini Understanding drugs and addiction By Mzwandile Mashinini
Understanding drugs and addiction By Mzwandile Mashinini mzwandile mashinini
 
Digital de addiction - By Amresh Tiwari
Digital de addiction - By Amresh TiwariDigital de addiction - By Amresh Tiwari
Digital de addiction - By Amresh TiwariAmresh Tiwari
 
Introduction on substance abuse
Introduction on substance abuseIntroduction on substance abuse
Introduction on substance abuseAlisha Rijal
 
Managing Screen Time
Managing Screen TimeManaging Screen Time
Managing Screen TimeScott Burnett
 
Prevention of the Sexual Abuse of Children (English Version)
Prevention of the Sexual Abuse of Children (English Version)Prevention of the Sexual Abuse of Children (English Version)
Prevention of the Sexual Abuse of Children (English Version)neilmcq
 
Mental health and substance abuse
Mental health and substance abuseMental health and substance abuse
Mental health and substance abuseSindhu Ravichandran
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying PowerpointUSAteacher
 

What's hot (20)

Guide to Psychological First Aid
Guide to Psychological First AidGuide to Psychological First Aid
Guide to Psychological First Aid
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
Mental Health, Illness, Stigma and Awareness Strategies
Mental Health, Illness, Stigma and Awareness Strategies Mental Health, Illness, Stigma and Awareness Strategies
Mental Health, Illness, Stigma and Awareness Strategies
 
Bullying powerpoint
Bullying powerpointBullying powerpoint
Bullying powerpoint
 
Addiction
AddictionAddiction
Addiction
 
Drug Addiction Original 51 Slides
Drug Addiction Original 51 SlidesDrug Addiction Original 51 Slides
Drug Addiction Original 51 Slides
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 
Domestic violence
Domestic violenceDomestic violence
Domestic violence
 
Internet addiction
Internet addictionInternet addiction
Internet addiction
 
Gaps in mental health
Gaps in mental healthGaps in mental health
Gaps in mental health
 
Parental Mental Health and its impact on Parenting Capacity.
Parental Mental Health and its impact on Parenting Capacity.Parental Mental Health and its impact on Parenting Capacity.
Parental Mental Health and its impact on Parenting Capacity.
 
Understanding drugs and addiction By Mzwandile Mashinini
Understanding drugs and addiction By Mzwandile Mashinini Understanding drugs and addiction By Mzwandile Mashinini
Understanding drugs and addiction By Mzwandile Mashinini
 
Digital de addiction - By Amresh Tiwari
Digital de addiction - By Amresh TiwariDigital de addiction - By Amresh Tiwari
Digital de addiction - By Amresh Tiwari
 
Introduction on substance abuse
Introduction on substance abuseIntroduction on substance abuse
Introduction on substance abuse
 
Managing Screen Time
Managing Screen TimeManaging Screen Time
Managing Screen Time
 
Bullying
BullyingBullying
Bullying
 
Prevention of the Sexual Abuse of Children (English Version)
Prevention of the Sexual Abuse of Children (English Version)Prevention of the Sexual Abuse of Children (English Version)
Prevention of the Sexual Abuse of Children (English Version)
 
Mental health and substance abuse
Mental health and substance abuseMental health and substance abuse
Mental health and substance abuse
 
PERSONALISED PRICING – UK – November 2018 OECD discussion
PERSONALISED PRICING – UK – November 2018 OECD discussionPERSONALISED PRICING – UK – November 2018 OECD discussion
PERSONALISED PRICING – UK – November 2018 OECD discussion
 
Bullying Powerpoint
Bullying PowerpointBullying Powerpoint
Bullying Powerpoint
 

Similar to Cybersecurity - Poland.pdf

Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Mukesh Chinta
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxjoellemurphey
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingMuhammad FAHAD
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxarnoldmeredith47041
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaperhanniw79
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsHappiest Minds Technologies
 

Similar to Cybersecurity - Poland.pdf (20)

185
185185
185
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Network monitoring white paper
Network monitoring white paperNetwork monitoring white paper
Network monitoring white paper
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
Mim Attack Essay
Mim Attack EssayMim Attack Essay
Mim Attack Essay
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docxThe uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
The uniqueness of the text61.5SHOW ALL MATCHESPage addre.docx
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
SDK Whitepaper
SDK WhitepaperSDK Whitepaper
SDK Whitepaper
 
Cybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdfCybersecurity-NSIC.pdf
Cybersecurity-NSIC.pdf
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest MindsWhitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
Whitepaper: BATTLING IT OUT: APPLICATION AND MOBILE SECURITY - Happiest Minds
 
Information security
Information securityInformation security
Information security
 

More from PavelVtek3

War Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptxWar Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptxPavelVtek3
 
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdfThe Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdfPavelVtek3
 
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...PavelVtek3
 
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...PavelVtek3
 
Mind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdfMind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdfPavelVtek3
 
Fake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptxFake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptxPavelVtek3
 
Cybergrooming - Spain.pptx
Cybergrooming - Spain.pptxCybergrooming - Spain.pptx
Cybergrooming - Spain.pptxPavelVtek3
 
Cyberbullying - Romania.pdf
Cyberbullying - Romania.pdfCyberbullying - Romania.pdf
Cyberbullying - Romania.pdfPavelVtek3
 
Artificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptxArtificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptxPavelVtek3
 

More from PavelVtek3 (9)

War Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptxWar Traumas - Erasmus+ Mind Your Mind Project.pptx
War Traumas - Erasmus+ Mind Your Mind Project.pptx
 
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdfThe Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
The Overuse of Antidepressants - Erasmus+ Mind Your Mind Project.pdf
 
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
Psychologist? I am not fool - The Fear of Professional Mental Help - Erasmus+...
 
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
Greek philosophy, stoicism and its use in psychology - Erasmus+ Mind Your Min...
 
Mind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdfMind Your Mind Erasmus+ - Art as a cure for depression.pdf
Mind Your Mind Erasmus+ - Art as a cure for depression.pdf
 
Fake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptxFake News - Czech Workshop.pptx
Fake News - Czech Workshop.pptx
 
Cybergrooming - Spain.pptx
Cybergrooming - Spain.pptxCybergrooming - Spain.pptx
Cybergrooming - Spain.pptx
 
Cyberbullying - Romania.pdf
Cyberbullying - Romania.pdfCyberbullying - Romania.pdf
Cyberbullying - Romania.pdf
 
Artificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptxArtificial intelligence - Portugal.pptx
Artificial intelligence - Portugal.pptx
 

Recently uploaded

TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingWSO2
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringWSO2
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseWSO2
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 

Recently uploaded (20)

TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 

Cybersecurity - Poland.pdf

  • 1. Cybersecurity, hackers and viruses Digital Danger - 15-23.3.2022 Joanna Kwapień Katarzyna Rutowska
  • 2. What is cybersecurity, how does it work? Cybersecurity is designed to provide multiple layers of protection across all of the computers, networks, and programs used by a business. In order to create a unified defence against potential cyberattacks, it is important that the business, employees, processes, and technology are designed to work seamlessly together. Cybersecurity systems that function properly will be able to detect, investigate, and resolve potential weaknesses and vulnerabilities in the system before they can be exploited by a hacker or malicious software.
  • 4. By implementing security, businesses and individuals can protect themselves against the full range of cyber security threats outlined below, as well as the numerous others that exist. With cyber security, companies do not have to worry about unauthorized users accessing their network or data. It helps them protect both their end users and their employees. What are the benefits of cybersecurity? Even in those rare cases that security does not prevent an attack or breach, it improves the recovery time afterward. In addition companies will often notice that customers and developers are more confident in products that have strong cyber security solutions in place.
  • 5. Threats vs vulnerabilities vs consequences Threat: Threats can include social engineering attacks, DDoS attacks, and advanced persistent threats, to name a few. Threat actors may be associated with nation- states, insiders, criminal enterprises, and are typically motivated by financial gain or political agendas. Vulnerability: In cybersecurity, a vulnerability refers to weakness, flaw, or error that can be exploited by attackers to gain unauthorized access. Vulnerabilities can be taken advantage of in a number of ways, which is why vulnerability management is crucial for staying ahead of criminals. Consequence: The consequence is the actual harm or damages that occur as a result of a network disruption. Typically, an organization will incur both direct and indirect consequences as they work to remediate the problem. Depending on the attack, consequences may impact an organization’s finances, operations, reputation, and regulatory compliance status.
  • 6. What are the different types of cybersecurity threats? 1. Malware Malware is malicious software such as spyware, ransomware, viruses and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing dangerous software. 2. Emotet An advanced, modular banking Trojan that primarily functions as a downloader or dropper of other banking Trojans. Emotet continues to be among the most costly and destructive malware. 3. Denial of Service A denial of service (DoS) is a type of cyber attack that floods a computer or network so it can’t respond to requests. A distributed DoS (DDoS) does the same thing, but the attack originates from a computer network. Cyber attackers often use a flood attack to disrupt the “handshake” process and carry out a DoS. Several other techniques may be used, and some cyber attackers use the time that a network is disabled to launch other attacks.
  • 7. What are the different types of cybersecurity threats? 4. Man in the Middle MITM attacks often occur when a visitor uses an unsecured public Wi-Fi network. Attackers insert themselves between the visitor and the network, and then use malware to install software and use data maliciously. 5. Phishing Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number. 6. SQL Injection A Structured Query Language (SQL) injection is a type of cyber attack that results from inserting malicious code into a server that uses SQL. When infected, the server releases information. Submitting the malicious code can be as simple as entering it into a vulnerable website search box. 7. Password Attacks With the right password, a cyber attacker has access to a wealth of information. Password attacks include accessing a password database or outright guessing.
  • 8. Cybersecurity in Poland The Polish cybersecurity market is relatively small. The most important group of clients is (for many years) several large clients, i.e. the largest public and private companies, state apparatus, as well as universities and other public entities (e.g. hospitals). The second important group are small and medium- sized enterprises. Warsaw is by far the dominant center in Poland, where almost one third of the surveyed companies conduct their activities. Other important centersare: Poznań, Wrocław, Kraków and Silesia. The vast majority of cybersecurity companies are located in western or central Poland, which is also related to the wealth and population of these regions. When it comes to the dynamics of the emergence of companies in Poland dealing with cybersecurity, there has been a clear upward trend in recent years. What are the biggest barriers to the development of cybersecurity in Poland? 1.Low market awareness of the need to use cybersecurity solutions. 2. Difficulty recruiting cybersecurity experts and other specialists. 3. Lack of sufficient capital for development. 4. Difficulties in reaching key stakeholders in the sales process. 5. Unclear legal regulations
  • 9. 2.Anna Kournikova She may be a famous tennis player, but she makes a world-beating computer virus. Thousands of people have been tricked into opening a mail message that says it contains a picture of Anna Kournikova but actually hides a malicious program. If set off, the programme plunders the address book of the Microsoft Outlook e-mail programme and attempts to send itself to all the people listed there. 3.Deskop Goose This could also be the case for the popular Desktop Goose mini-game. Although it is not a virus, Desktop Goose can interrupt any activity on your computer. Will not hesitate to appear during a PC game by dragging the note that says "good job". Can virus look cute? 1. ILOVEYOU While ILOVEYOU sounds like a cheerful bon mot you might find printed on the inside of a Valentine’s Day card, it’s actually far, far more sinister than that. ILOVEYOU is one of the most well-known and destructive viruses of all time. The virus came in an email with a subject line that said “I love you”. Being curious types, people clicked into the email with aplomb—regardless of the fact the email wasn’t from anyone they knew. The malware was a worm that was downloaded by clicking on an attachment called ‘LOVE-LETTER-FOR- YOU.TXT.vbs’. ILOVEYOU overwrote system files and personal files and spread itself over and over and over again.
  • 10. Cybersecurity challenges Ransomware attacks - hacking into a user’s data and preventing them from accessing it until a ransom amount is paid Cloud attacks - hacking cloud-platforms to steal user data Phishing attacks - type of social engineering attack often used to steal user data, including login credentials and credit card numbers Blockchain and cryptocurrency attacks - it can compromise the customer data and business operations Software vulnerabilities - an older software version might contain patches for security vulnerabilities that are fixed by the developers in the newer version Machine learning and AI attacks - hese technologies can be used to identify high-value targets among a large dataset BYOD policies - your own device may not be strong enough and you risk leaking the data of your work place Insider attacks - Employees with malicious intent can leak or export confidential data to competitors or other individuals Outdated hardware - Hardware isn’t advanced enough to run the latest software versions. This leaves such devices on an older version of the software, making them highly susceptible to cyberattacks.
  • 11. Cybersecurity vendors and tools Antivirus Software - program which is designed to prevent, detect, and remove viruses and other malware attacks on the individual computer, networks, and IT systems Firewall - Its job is to prevent unauthorized access to or from a private network. It can be implemented as hardware, software, or a combination of both. PKI Services - Public Key Infrastructure. This tool supports the distribution and identification of public encryption keys. Managed Detection Services - MDR is an advanced security service that provides threat hunting, threat intelligence, security monitoring, incident analysis, and incident response. Penetration Testing - In Penetration testing, cybersecurity professionals will use the same techniques and processes utilized by criminal hackers to check for potential threats and areas of weakness. Staff training - it's not a 'cybersecurity tool' but ultimately, having knowledgeable employees who understand the cybersecurity which is one of the strongest forms of defence against cyber-attacks.
  • 12. How to protect yourself? Install anti-virus software Set a password, gesture or fingerprint that must be entered to unlock Set the device to require a password before applications are installed Leave Bluetooth hidden when not in use and disabling automatic connection to networks Enable remote locking and/or wiping functions, if your device supports them. Change your passwords often and remember - the longer the password, the better. Secure your device:
  • 13. Report a crime Report it to the sites that has been influenced, for example Facebook Help Community Collect and keep evidence Change all of your passwords Close any unauthorized or compromised credit or charge accounts Think about what other personal information may be at risk You have been a victim of cyber crime - what to do?