SlideShare a Scribd company logo
CYBERSECURITY
TRAINING
Windstone Health Services
2021
WHAT IS CYBER SECURITY?
• Cyber Security is the practice of protecting systems, networks, and programs from
digital attacks.
• These cyberattacks are usually aimed at accessing, changing, or destroying sensitive
information; extorting money from users; or interrupting normal business
procedures.
WHY IS CYBER SECURITY
IMPORTANT?
• Cyberattacks are a serious risk for all businesses
• Out of 1,045 small and medium-sized businesses that contributed to this cyber
security survey conducted in 2018 by the Ponemon Institute:
1. 67% of respondents suffered a cyberattack in 2018 (compared to 61% the previous
year)
2. 60% of survey respondents that had a data breach said the cause was a negligent
employee or independent contractor
3. A significant majority of respondents experienced an exploit or malware that evaded
their company’s intrusion detection or antivirus software
4. Mobile devices were the most vulnerable entry points to companies’ computer
networks
WHAT IS CYBER SECURITY ALL
ABOUT?
• Users must understand and
comply with basic data security
principles such as choosing
strong passwords, being wary of
attachments in email, and
backing up data.
• Organizations must have a framework
for how they deal with both
attempted and successful cyber
attacks.
• One well-respected framework can
guide you. It explains how you can
identify attacks, protect systems,
detect and respond to threats, and
recover from successful attacks.
• Technology is essential to giving
organizations and individuals the
computer security tools needed to
protect themselves from cyber
attacks.
• Three main entities must be
protected: endpoint devices like
computers, smart devices, and
routers; networks; and the cloud.
COMMON CYBER SECURITY
THREATS
Types of Malware:
• Virus
• Worm
• Trojan Horse
• Adware
• Spyware
• Ransomware
Threats:
• Malware
• Phishing
• Spamming
• Man-in-the-middle
Attack
• Denial-of-service Attack
• SQL Injection
• Zero-day Exploit
Malware
A malware attack is a piece of malicious
software which takes over a person’s
computer in order to spread the bug
onto other people’s devices and profiles.
It can also infect a computer and turn it
into a botnet, which means the cyber
criminal can control the computer and
use it to send malware to others.
Phishing
Phishing attacks are designed to steal login
and password details so that the cyber
criminal can assume control of the victim’s
social network, email and online bank
accounts.
70% of internet users choose the same
password for almost every web service they
use. This is why phishing is so effective, as
the criminal, by using the same login details,
can access multiple private accounts and
manipulate them for their own good.
Spamming
Spamming is when a cyber criminal sends
emails designed to make a victim spend
money on counterfeit or fake goods.
Often advertising pharmaceutical
products or security software, which
people believe they need to solve
security issues which do not actually
exist.
Virus
A computer virus attaches itself to a
program or file enabling it to spread
from one computer to another, leaving
infections as it travels.
Worm
A worm is similar to a virus by design and
is considered to be a sub-class of a virus.
Worms spread from computer to
computer, but unlike a virus, it has the
capability to travel without any human
action.
A worm takes advantage of file or
information transport features on your
system, which is what allows it to travel
unaided.
Trojan Horse
A Trojan Horse is full of as much trickery
as the mythological Trojan Horse it was
named after.
The Trojan Horse, at first glance will
appear to be useful software but will
actually do damage once installed or run
on your computer.
Types of Malware
Adware
Adware is also known as advertising-supported
software. It is software which renders
advertisements for the purpose of generating
revenue for its author. The advertisements are
published on the screen presented to the user at
the time of installation. Adware is programmed
to examine which Internet sites, the user visits
frequently and to present and feature related
advertisements. Not all adware has malicious
intent, but it becomes a problem anyway
because it harms computer performance and
can be annoying.
Spyware
This type of malicious software, spies on you,
tracks your internet activities. It helps the
hacker in gathering information about the
victim’s system, without the consent of the
victim. This spyware’s presence is typically
hidden from the host and it is very difficult
to detect. Some spyware like keyloggers may
be installed intentionally in an organization
to monitor activities of employees.
Ransomware
Ransomware is an advanced type of malware
that restricts access to the computer system
until the user pays a fee. Your screen might
show a pop-up warning that your have been
locked out of your computer and that you
can access only after paying the
cybercriminal. The cybercriminal demands a
ransom to be paid in order for the restriction
to be removed.
Types of Malware
MAN-IN-THE-MIDDLE ATTACK
• A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves
between a user and a website. This kind of attack comes in several forms.
• For example, a fake banking website may be used to capture financial login
information. The fake site is “in the middle” between the user and the actual bank
website.
DENIAL-OF-SERVICE ATTACK
• Refers to events that render systems on a computer network temporarily unusable.
• Denials of service can happen accidentally as the result of actions taken by network users or
administrators, but often they are malicious DoS attacks.
• They may target servers, network routers or network communication links.
• They can cause computers and routers to shut down ("crash") and links to bog down.
• They usually do not cause permanent damage.
SQL INJECTION
• SQL query is one way an application talks
to the database
• SQL injection occurs when an application
fails to sanitize untrusted data (such as
data in web form fields) in a database
query
• An attacker can use specially-crafted SQL
commands to trick the application into
asking the database to execute
unexpected commands
ZERO-DAY EXPLOIT
• “Zero-day” is a loose term for a recently
discovered vulnerability or exploit for a
vulnerability that hackers can use to attack
systems.
• These threats are incredibly dangerous
because only the attacker is aware of their
existence.
• Exploits can go unnoticed for years and are
often sold on the black market for large
sums of money.
CONSEQUENCES OF INACTION
• Loss or damage of electronic data
• Extra expenses to keep your business operating
• You may suffer a loss of income (i.e. a denial of
service attack forces you to shut down your business,
causing you to lose both income and customers)
• Loss of confidentiality, integrity and/or availability of
valuable patient information
• Network security and privacy lawsuits (i.e. if a cyber
thief steals data from your computer system and the
data belongs to another party, that party may sue
you)
• Allows attackers to covertly gather personal data,
including financial information and
usernames/passwords
WHAT CAN YOU DO?
RESPONSIBLE BROWSING
• Do not download/install/open
programs/executables without
consulting/reviewing with IT support.
• Beware of cloned websites that may appear
to be legitimate. Note that secure websites
start with https, not http.
• Beware of suspicious websites, even if they
are https://. Here is an example.
• https://www.bankofamerica.com
and https://www.bankofarnerica.com are
two different sites, one of them is trying to
steal your identity. (Please note how
cleverly ‘m’ was replaced by ‘rn’).
RESPONSIBLE EMAIL ACTIONS
• Do not click on suspicious links embedded
in emails. Hover over questionable links to
reveal the true destination before clicking.
• Don’t open attachments or click on URLs in
unsolicited emails, even from users you
know.
• Alert IT support immediately upon receiving
suspicious emails.
• Do not act on email-based requests for
sensitive personal information, money
movements, or trading. Directly verify all
requests with the clients and ask questions.
RESPONSIBLE USE OF EXTERNAL MEDIA
• Do not insert any USB drive or
CDs/DVDs that you’ve received from an
unknown/unreliable source.
• Do not install programs that was copied
from a USB drive, external drive and/or
found over the internet.
PASSWORDS
• Do not share your passwords at any cause.
They must not be shared with colleagues,
vendors and IT support.
• Change your passwords every 90 days.
When choosing a password:
• Make new passwords difficult to guess by
avoiding dictionary words, and mixing
letters, numbers and punctuation.
• Use a unique long and strong password for
each account to prevent a quick and
invasive attack on all of your accounts.
SOFTWARE UPDATES
• Updates - sometimes called patches - fix
problems and glitches with your operating
system (OS) (e.g., Windows) and software
programs (e.g., Microsoft Office
applications). Anti-virus software removes
viruses, quarantines and repairs infected
files, and can help prevent future viruses.
• Please ensure all software patches are
installed and kept up-to-date by your IT
department.
• To avoid computer problems caused by
viruses, please ensure that an anti-virus
program like Sophos is installed and kept
up to date.
WHAT CAN YOUR COMPANY DO?
• Use a Virtual Private Network (VPN) to encrypt your
web traffic. An encrypted VPN severely limits a
hacker’s ability to read or modify web traffic.
• Ensure your operating system is up-to-date.
• Must have anti-virus software installed onto your
system to scan the entire system at boot along with e-
mails and files as they are downloaded from the
Internet
• Network should have strong firewalls and protocols to
prevent unauthorized access.
• Secure your communications through encryption.
• Regularly talk to employees about cybersecurity.
COMMON TECHNOLOGY USED TO
PROTECT OUR RESOURCES
• Next-generation firewalls
• DNS filtering
• Malware protection
• Antivirus software
• Email security solutions
WHILE YOU MAKE THE
BEST EFFORT TO SECURE
THE COMPANY’S
INFRASTRUCTURE…
A SYSTEM IS ONLY AS
SECURE AS THE WEAKEST
LINK.

More Related Content

What's hot

Cybersecurity
CybersecurityCybersecurity
Cybersecurity
A. Shamel
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Vaishak Chandran
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Ramiro Cid
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
Surya Bathulapalli
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
AbdalrhmanTHassan
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
Yasir Nafees
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
davidcurriecia
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
SnapComms
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 

What's hot (20)

Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 

Similar to Cybersecurity Training

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
Avani Patel
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
Chinatu Uzuegbu
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
MuhammadRehan856177
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
Adebisi Tolulope
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
samina khan
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
Alefya1
 
Cyber security
Cyber security Cyber security
Cyber security
ZwebaButt
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
Avani Patel
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
kanika sharma
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
JenetSilence
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
SumanPramanik7
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
SumanPramanik7
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
DrPraveenKumar37
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
MuhammadRehan856177
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
Arish Roy
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 

Similar to Cybersecurity Training (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 

Recently uploaded

ARTIFICIAL INTELLIGENCE IN HEALTHCARE.pdf
ARTIFICIAL INTELLIGENCE IN  HEALTHCARE.pdfARTIFICIAL INTELLIGENCE IN  HEALTHCARE.pdf
ARTIFICIAL INTELLIGENCE IN HEALTHCARE.pdf
Anujkumaranit
 
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
GL Anaacs
 
Superficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptxSuperficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptx
Dr. Rabia Inam Gandapore
 
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
bkling
 
Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...
Sujoy Dasgupta
 
micro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdfmicro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdf
Anurag Sharma
 
Physiology of Chemical Sensation of smell.pdf
Physiology of Chemical Sensation of smell.pdfPhysiology of Chemical Sensation of smell.pdf
Physiology of Chemical Sensation of smell.pdf
MedicoseAcademics
 
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #GirlsFor Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
Savita Shen $i11
 
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.GawadHemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
NephroTube - Dr.Gawad
 
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdfAlcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Dr Jeenal Mistry
 
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTSARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
Dr. Vinay Pareek
 
The Normal Electrocardiogram - Part I of II
The Normal Electrocardiogram - Part I of IIThe Normal Electrocardiogram - Part I of II
The Normal Electrocardiogram - Part I of II
MedicoseAcademics
 
heat stroke and heat exhaustion in children
heat stroke and heat exhaustion in childrenheat stroke and heat exhaustion in children
heat stroke and heat exhaustion in children
SumeraAhmad5
 
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model SafeSurat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Savita Shen $i11
 
basicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdfbasicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdf
aljamhori teaching hospital
 
Evaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animalsEvaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animals
Shweta
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
د.محمود نجيب
 
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptxANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
Swetaba Besh
 
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
kevinkariuki227
 
POST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its managementPOST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its management
touseefaziz1
 

Recently uploaded (20)

ARTIFICIAL INTELLIGENCE IN HEALTHCARE.pdf
ARTIFICIAL INTELLIGENCE IN  HEALTHCARE.pdfARTIFICIAL INTELLIGENCE IN  HEALTHCARE.pdf
ARTIFICIAL INTELLIGENCE IN HEALTHCARE.pdf
 
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
HOT NEW PRODUCT! BIG SALES FAST SHIPPING NOW FROM CHINA!! EU KU DB BK substit...
 
Superficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptxSuperficial & Deep Fascia of the NECK.pptx
Superficial & Deep Fascia of the NECK.pptx
 
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
Report Back from SGO 2024: What’s the Latest in Cervical Cancer?
 
Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...Couples presenting to the infertility clinic- Do they really have infertility...
Couples presenting to the infertility clinic- Do they really have infertility...
 
micro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdfmicro teaching on communication m.sc nursing.pdf
micro teaching on communication m.sc nursing.pdf
 
Physiology of Chemical Sensation of smell.pdf
Physiology of Chemical Sensation of smell.pdfPhysiology of Chemical Sensation of smell.pdf
Physiology of Chemical Sensation of smell.pdf
 
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #GirlsFor Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
For Better Surat #ℂall #Girl Service ❤85270-49040❤ Surat #ℂall #Girls
 
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.GawadHemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
Hemodialysis: Chapter 3, Dialysis Water Unit - Dr.Gawad
 
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdfAlcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
Alcohol_Dr. Jeenal Mistry MD Pharmacology.pdf
 
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTSARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
ARTHROLOGY PPT NCISM SYLLABUS AYURVEDA STUDENTS
 
The Normal Electrocardiogram - Part I of II
The Normal Electrocardiogram - Part I of IIThe Normal Electrocardiogram - Part I of II
The Normal Electrocardiogram - Part I of II
 
heat stroke and heat exhaustion in children
heat stroke and heat exhaustion in childrenheat stroke and heat exhaustion in children
heat stroke and heat exhaustion in children
 
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model SafeSurat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
Surat @ℂall @Girls ꧁❤8527049040❤꧂@ℂall @Girls Service Vip Top Model Safe
 
basicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdfbasicmodesofventilation2022-220313203758.pdf
basicmodesofventilation2022-220313203758.pdf
 
Evaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animalsEvaluation of antidepressant activity of clitoris ternatea in animals
Evaluation of antidepressant activity of clitoris ternatea in animals
 
KDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologistsKDIGO 2024 guidelines for diabetologists
KDIGO 2024 guidelines for diabetologists
 
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptxANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
ANATOMY AND PHYSIOLOGY OF URINARY SYSTEM.pptx
 
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
TEST BANK for Operations Management, 14th Edition by William J. Stevenson, Ve...
 
POST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its managementPOST OPERATIVE OLIGURIA and its management
POST OPERATIVE OLIGURIA and its management
 

Cybersecurity Training

  • 2. WHAT IS CYBER SECURITY? • Cyber Security is the practice of protecting systems, networks, and programs from digital attacks. • These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business procedures.
  • 3. WHY IS CYBER SECURITY IMPORTANT? • Cyberattacks are a serious risk for all businesses • Out of 1,045 small and medium-sized businesses that contributed to this cyber security survey conducted in 2018 by the Ponemon Institute: 1. 67% of respondents suffered a cyberattack in 2018 (compared to 61% the previous year) 2. 60% of survey respondents that had a data breach said the cause was a negligent employee or independent contractor 3. A significant majority of respondents experienced an exploit or malware that evaded their company’s intrusion detection or antivirus software 4. Mobile devices were the most vulnerable entry points to companies’ computer networks
  • 4. WHAT IS CYBER SECURITY ALL ABOUT? • Users must understand and comply with basic data security principles such as choosing strong passwords, being wary of attachments in email, and backing up data. • Organizations must have a framework for how they deal with both attempted and successful cyber attacks. • One well-respected framework can guide you. It explains how you can identify attacks, protect systems, detect and respond to threats, and recover from successful attacks. • Technology is essential to giving organizations and individuals the computer security tools needed to protect themselves from cyber attacks. • Three main entities must be protected: endpoint devices like computers, smart devices, and routers; networks; and the cloud.
  • 5. COMMON CYBER SECURITY THREATS Types of Malware: • Virus • Worm • Trojan Horse • Adware • Spyware • Ransomware Threats: • Malware • Phishing • Spamming • Man-in-the-middle Attack • Denial-of-service Attack • SQL Injection • Zero-day Exploit
  • 6. Malware A malware attack is a piece of malicious software which takes over a person’s computer in order to spread the bug onto other people’s devices and profiles. It can also infect a computer and turn it into a botnet, which means the cyber criminal can control the computer and use it to send malware to others. Phishing Phishing attacks are designed to steal login and password details so that the cyber criminal can assume control of the victim’s social network, email and online bank accounts. 70% of internet users choose the same password for almost every web service they use. This is why phishing is so effective, as the criminal, by using the same login details, can access multiple private accounts and manipulate them for their own good. Spamming Spamming is when a cyber criminal sends emails designed to make a victim spend money on counterfeit or fake goods. Often advertising pharmaceutical products or security software, which people believe they need to solve security issues which do not actually exist.
  • 7. Virus A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Worm A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. Trojan Horse A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Types of Malware
  • 8. Adware Adware is also known as advertising-supported software. It is software which renders advertisements for the purpose of generating revenue for its author. The advertisements are published on the screen presented to the user at the time of installation. Adware is programmed to examine which Internet sites, the user visits frequently and to present and feature related advertisements. Not all adware has malicious intent, but it becomes a problem anyway because it harms computer performance and can be annoying. Spyware This type of malicious software, spies on you, tracks your internet activities. It helps the hacker in gathering information about the victim’s system, without the consent of the victim. This spyware’s presence is typically hidden from the host and it is very difficult to detect. Some spyware like keyloggers may be installed intentionally in an organization to monitor activities of employees. Ransomware Ransomware is an advanced type of malware that restricts access to the computer system until the user pays a fee. Your screen might show a pop-up warning that your have been locked out of your computer and that you can access only after paying the cybercriminal. The cybercriminal demands a ransom to be paid in order for the restriction to be removed. Types of Malware
  • 9. MAN-IN-THE-MIDDLE ATTACK • A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website. This kind of attack comes in several forms. • For example, a fake banking website may be used to capture financial login information. The fake site is “in the middle” between the user and the actual bank website.
  • 10. DENIAL-OF-SERVICE ATTACK • Refers to events that render systems on a computer network temporarily unusable. • Denials of service can happen accidentally as the result of actions taken by network users or administrators, but often they are malicious DoS attacks. • They may target servers, network routers or network communication links. • They can cause computers and routers to shut down ("crash") and links to bog down. • They usually do not cause permanent damage.
  • 11. SQL INJECTION • SQL query is one way an application talks to the database • SQL injection occurs when an application fails to sanitize untrusted data (such as data in web form fields) in a database query • An attacker can use specially-crafted SQL commands to trick the application into asking the database to execute unexpected commands
  • 12. ZERO-DAY EXPLOIT • “Zero-day” is a loose term for a recently discovered vulnerability or exploit for a vulnerability that hackers can use to attack systems. • These threats are incredibly dangerous because only the attacker is aware of their existence. • Exploits can go unnoticed for years and are often sold on the black market for large sums of money.
  • 13. CONSEQUENCES OF INACTION • Loss or damage of electronic data • Extra expenses to keep your business operating • You may suffer a loss of income (i.e. a denial of service attack forces you to shut down your business, causing you to lose both income and customers) • Loss of confidentiality, integrity and/or availability of valuable patient information • Network security and privacy lawsuits (i.e. if a cyber thief steals data from your computer system and the data belongs to another party, that party may sue you) • Allows attackers to covertly gather personal data, including financial information and usernames/passwords
  • 15. RESPONSIBLE BROWSING • Do not download/install/open programs/executables without consulting/reviewing with IT support. • Beware of cloned websites that may appear to be legitimate. Note that secure websites start with https, not http. • Beware of suspicious websites, even if they are https://. Here is an example. • https://www.bankofamerica.com and https://www.bankofarnerica.com are two different sites, one of them is trying to steal your identity. (Please note how cleverly ‘m’ was replaced by ‘rn’).
  • 16. RESPONSIBLE EMAIL ACTIONS • Do not click on suspicious links embedded in emails. Hover over questionable links to reveal the true destination before clicking. • Don’t open attachments or click on URLs in unsolicited emails, even from users you know. • Alert IT support immediately upon receiving suspicious emails. • Do not act on email-based requests for sensitive personal information, money movements, or trading. Directly verify all requests with the clients and ask questions.
  • 17. RESPONSIBLE USE OF EXTERNAL MEDIA • Do not insert any USB drive or CDs/DVDs that you’ve received from an unknown/unreliable source. • Do not install programs that was copied from a USB drive, external drive and/or found over the internet.
  • 18. PASSWORDS • Do not share your passwords at any cause. They must not be shared with colleagues, vendors and IT support. • Change your passwords every 90 days. When choosing a password: • Make new passwords difficult to guess by avoiding dictionary words, and mixing letters, numbers and punctuation. • Use a unique long and strong password for each account to prevent a quick and invasive attack on all of your accounts.
  • 19. SOFTWARE UPDATES • Updates - sometimes called patches - fix problems and glitches with your operating system (OS) (e.g., Windows) and software programs (e.g., Microsoft Office applications). Anti-virus software removes viruses, quarantines and repairs infected files, and can help prevent future viruses. • Please ensure all software patches are installed and kept up-to-date by your IT department. • To avoid computer problems caused by viruses, please ensure that an anti-virus program like Sophos is installed and kept up to date.
  • 20. WHAT CAN YOUR COMPANY DO? • Use a Virtual Private Network (VPN) to encrypt your web traffic. An encrypted VPN severely limits a hacker’s ability to read or modify web traffic. • Ensure your operating system is up-to-date. • Must have anti-virus software installed onto your system to scan the entire system at boot along with e- mails and files as they are downloaded from the Internet • Network should have strong firewalls and protocols to prevent unauthorized access. • Secure your communications through encryption. • Regularly talk to employees about cybersecurity.
  • 21. COMMON TECHNOLOGY USED TO PROTECT OUR RESOURCES • Next-generation firewalls • DNS filtering • Malware protection • Antivirus software • Email security solutions
  • 22. WHILE YOU MAKE THE BEST EFFORT TO SECURE THE COMPANY’S INFRASTRUCTURE… A SYSTEM IS ONLY AS SECURE AS THE WEAKEST LINK.

Editor's Notes

  1. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html https://fthmb.tqn.com/ht65ckVNmtzO0TmLuzmas6vSQU4=/1500x1000/filters:fill(auto,1)/antivirus-5a72401a8e1b6e0037eca70b.jpg
  2. https://www.thebalancesmb.com/dangers-of-cyber-attacks-462537
  3. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html https://www.bing.com/images/search?view=detailV2&ccid=wIf5MzXI&id=3142055A4D46FB796117D51611F237BFA84D0A6E&thid=OIP.wIf5MzXI4cFVROcRha_ScwHaDh&mediaurl=http%3a%2f%2fwww-qa.es3.com%2fwp-content%2fuploads%2f2015%2f06%2fpeople-process-technology.png&exph=475&expw=1000&q=people%2c+process+and+technology+icon&simid=607989079640378120&selectedIndex=7&ajaxhist=0
  4. https://www.telegraph.co.uk/technology/8267578/What-is-the-difference-between-spam-malware-and-phishing.html
  5. https://fossbytes.com/difference-viruses-worms-ransomware-trojans-bots-malware-spyware-etc/
  6. https://www.telegraph.co.uk/technology/8267578/What-is-the-difference-between-spam-malware-and-phishing.html https://nerdcrossing.com/malware-vs-adware-vs-spyware-vs-viruses/ https://fossbytes.com/difference-viruses-worms-ransomware-trojans-bots-malware-spyware-etc/ https://antivirus.comodo.com/blog/malware-vs-viruses-whats-difference/
  7. https://phoenixnap.com/blog/man-in-the-middle-attacks-prevention
  8. https://www.lifewire.com/denial-of-service-dos-and-ddos-817997
  9. https://searchsoftwarequality.techtarget.com/definition/SQL-injection https://www.malwarebytes.com/sql-injection/ https://www.hungred.com/useful-information/solutions-sql-injection-attack/ https://www.bing.com/images/search?view=detailV2&ccid=fp%2broyNV&id=D8BE98CC271607E8090CC1A6DE726657CDB2F8A1&thid=OIP.fp-royNVoUodEHecBi8QHQHaEN&mediaurl=https%3a%2f%2fwww.veracode.com%2fsites%2fdefault%2ffiles%2fstyles%2fmedia_responsive_widest%2fpublic%2fwhat-is-sql-injection_0.png&exph=471&expw=829&q=sql+injection+attack&simid=608023800158093620&selectedIndex=0&qft=+filterui%3aimagesize-large&ajaxhist=0
  10. https://www.forcepoint.com/cyber-edu/zero-day-exploit
  11. https://www.thebalancesmb.com/dangers-of-cyber-attacks-462537
  12. https://azprioritycare.com/wp-content/uploads/2019/06/2019-AZPC-Cyber-Security-Compliance-Training.pdf https://www.webopedia.com/DidYouKnow/Internet/virus.asp DO’S: Keep a backup of your data in a safe place so that no hacker attack can cause you to lose your data. Always consult with IT support if you are suspicious of any emails, links or attachments. DON’T’S: Do not click on suspicious links embedded in emails or open files attached in an email from unknown sources. Do not download programs/executables from untrusty websites and from external media. Do not save your passwords on your computer. Do not visit websites that are not intended for work
  13. https://kirkpatrickprice.com/blog/top-5-cyber-security-awareness-tips-employees/
  14. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html http://antiviruscoupon.net/wp-content/uploads/2015/07/best-antivirus-software.jpg
  15. http://go.kaspersky.com/rs/kaspersky1/images/Top_10_Tips_For_Educating_Employees_About_Cybersecurity_eBook.pdf?mkt_tok=3RkMMJWWfF9wsRonuKXNcO%2FhmjTEU5z16OglWa%2BzlMI%2F0ER3fOvrPUfGjI4ITMZjI%2BSLDwEYGJlv6SgFQrDHMalq1LgPXxE%3D