SlideShare a Scribd company logo
1 of 22
INTRODUCTION
Cybersecurity refers to a set of techniques used to
protect the integrity of networks, programs and data
from attack, damage or unauthorized access.
Three main aspects we are trying to control,
namely:
Unauthorized Access
Unauthorized Deletion
Unauthorized Modification
The CIA triad- is also commonly referred to as the
three pillars of security and most of the security
policies of an organization are built on these three
principles.
1. Confidentiality- the protection of personal
information.
2.Integrity- refers to methods of ensuring that data is
real, accurate and safeguarded from unauthorized
user modification.
3.Availability- refers to the ability of a user to
access information or resources in a specified
location and in the correct format.
HISTORY
Cybersecurity began in the 1970s when researcher Bob Thomas created
a computer programme called Creeper that could move across
ARPANET’s network.
1970- a number of security measures were developed, including
encryption algorithms, firewalls, and access control systems. The
development of the internet in the 1990s led to the creation of new
security protocols, such as the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS), which are used to secure online
communications and transactions.
early 2000's- a number of high-profile cyberattacks, such as the Code
Red and Nimda worms, highlighted the growing threat of cybercrime.
HISTORY
Cybersecurity has been developed and advanced by a range of
individuals and organizations over time. It is difficult to attribute the
development of cybersecurity to any one person or group, as it has
evolved as a response to the changing threat landscape and the growth of
computer networks.
OTHER CONTRIBUTORS:
-Whitfield Diffie
-Martin Hellman
-Robert moris
HISTORY
Where did cybersecurity begin?
Cyber magazine takes a look at the history of cybersecurity from inception
to the present day.
Cybersecurity is becoming increasingly significant due to the increased
reliance on computer systems, the Internet and wireless network standards
such as Bluetooth and Wi-Fi, and due to the growth of smart devices and
the various devices that constitute the ‘Internet of things’.
1970s: ARAPNET and the Creeper
Cybersecurity began in the 1970s when researcher Bob Thomas created a computer
programme called Creeper that could move across ARPANET’s network, leaving a
breadcrumb trail wherever it went. Ray Tomlinson, the inventor of email, wrote the
programme Reaper, which chased and deleted Creeper.
HISTORY
1980s: Birth of the commercial antivirus
1987 was the birth year of commercial antivirus although there were competing
claims for the innovator of the first antivirus product. Andreas Lüning and Kai Figge
released their first antivirus product for the Atari ST – which also saw the release of
Ultimate Virus Killer in 1987. Three Czechoslovakians created the first version of
the NOD antivirus in the same year and in the US, John McAfee founded McAfee
and released VirusScan.
1990s: The world goes online
With the internet becoming available to the public, more people began putting their
personal information online. Organised crime entities saw this as a potential source
of revenue and started to steal data from people and governments via the web. By the
middle of the 1990s, network security threats had increased exponentially and
firewalls and antivirus programmes had to be produced on a mass basis to protect the
public.
HISTORY
2000s: Threats diversify and multiply
In the early 2000s crime organisations started to heavily fund
professional cyberattacks and governments began to clamp down on the
criminality of hacking, giving much more serious sentences to those
culpable. Information security continued to advance as the internet grew
as well but, unfortunately, so did viruses.
2021: The next generation
The cybersecurity industry is continuing to grow at the speed of light.
The global cybersecurity market size is forecast to grow to $345.4bn by
2026 according to Statista. Ransomware is one of the most common
threats to any organisation's data security and is forecast to continue to
increase.
DEFINITION
Cyber security is the application of
technologies, processes, and controls to
protect systems, networks, programs, devices
and data from cyber attacks.
5 types of cyber security:
1. Critical infrastructure cyber security
2. Network security
3. Cloud security
4. IoT (Internet of Things) security
5. Application security
DEFINITION
1. Critical infrastructure cyber security
-Critical infrastructure organisations are often more vulnerable to attack
than others because SCADA (supervisory control and data acquisition)
systems often rely on older software.
2. Network security
-Network security involves addressing vulnerabilities affecting your
operating systems and network architecture, including servers and hosts,
firewalls and wireless access points, and network protocols.
3. Cloud security
-Cloud security is concerned with securing data, applications, and
infrastructure in the Cloud.
DEFINITION
4. IoT (Internet of Things) security
-IoT security involves securing smart devices and networks
connected to the IoT. IoT devices include things that connect
to the Internet without human intervention, such as smart fire
alarms, lights, thermostats, and other appliances.
5. Application security
-Application security involves addressing vulnerabilities
resulting from insecure development processes in designing,
coding, and publishing software or a website.
EXAMPLES: LATEST TRENDS
Examples of Network Security includes:
• Antivirus and Antispyware programs,
• Firewall that block unauthorized
access to a network and
• VPNs (Virtual Private Networks) used
for secure
EXAMPLES: LATEST TRENDS
Latest Trends:
1. Rise of Automotive Hacking
2. Potential of Artificial Intelligence (AI)
3. Mobile is the New Target
4. Cloud is Also Potentially Vulnerable
5. Data Breaches: Prime target
6. IoT with 5G Network: The New Era of
Technology and Risks
7. Automation and Integration
8. Targeted Ransomware
9. State-Sponsored Cyber Warfare
NEWS RELATED ARTICLES
◆ Kimsuky Updates its Tactics to
Target South Korean Experts
Threat Actors (March 24, 2023)
Cyware Alerts - Hacker News
◆ Black Magic APT Targets Ukraine
with CommonMagic and
PowerMagic Breaches and
Incidents (March 24, 2023)
Cyware Alerts - Hacker News
NEWS RELATED ARTICLES
◆ Hacktivists Increasingly Claim to
Target and Impact OT
◆ NETWORK SECURITYCisco
Patches High-Severity
Vulnerabilities in IOS Software
◆ Hackers inject credit card
stealers into payment processing
modules
ADVANTAGES
1. Protects sensitive personal information
-Cyber Security can prevent such attacks in the
first place as it is a proactive approach.
2. Protect private and Business data
-Cyber Security is a complete security package
that can protect businesses and organisations
from various threats.
3. Improves productivity
-An effective Cyber Security strategy can give
an early warning on when to expect attacks and
give suggestions on how to respond.
ADVANTAGES
4. Provides a business continuity plan
-Cyber Security uses Artificial Intelligence (AI)
and machine learning to create a business
continuity plan.
5. Improve the overall security of an organisation
-Cyber Security is a one-stop solution for all
security issues for businesses and
organisations.
DISADVANTAGES
1. Regular Update
-Businesses need to regularly update their
software, hardware, and security strategy to be
one step ahead of the attackers.
2. Needs Continuous learning
-The threats are new and never-ending, and so
is the learning process to keep up with the
threats.
3. Complex to Setup
-Setting up security architectures and tools like
a firewall can be complicated and could take a
long time.
DISADVANTAGES
4. Slower Systems
-Over time, Systems tend to become sluggish as running
these security applications takes up a lot of resources.
5. Constant Monitoring
-An effective Cyber Security strategy involves continuous
monitoring of new threats.
6. Talent Shortage
-Cyber Security is vast, and there's a significant talent
shortage in this field.
7. Expensive
-Implementing Cyber Security can be very expensive as it
is an ongoing process that requires consistent learning and
spending.
SUMMARY
Over the years, the term Cyber Security has gained much
importance and become a common part of each one’s life who is associated
with a computer or a smartphone device. When people submit their data
online, it becomes vulnerable to cyber-attacks or cyber-crimes.
Moreover, cyber-attacks can happen over an external facing DNS
server or an internal firewall, which in turn effects the data and
infrastructure within the enterprise that inherently causes significant
damage to the business of the associated organization.
Cyber Security offers security, from unauthorized access or
exploitation, through online services to the massive data, associated
appliances and network that is used for communication.
CONCLUSION
In conclusion, information is a critical part of any
organization and investing on the right service provider keeps your
business in safe hands in the ever-expanding IoT (Internet of Things)
world.
A scalable and customized cyber security-driven business
model includes disaster-recovery capabilities and secures data and the
underlying infrastructure of the organization, thus building a safe
barrier for the information even before it is attacked and saving the
organization from a loss of billions of dollars that could result from
the security threat.
REFERENCES:
https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.edureka.co/blog/what-is-
cybersecurity/amp/&ved=2ahUKEwiB4q-ugfL9AhWhR2wGHa5UB-
IQFnoECC4QAQ&usg=AOvVaw2yLUdOD9SfH9hRhZjwGftQ
https://cybermagazine.com/cyber-security/history-cybersecurity
https://www.theknowledgeacademy.com/blog/advantages-and-disadvantages-of-cybersecurity/
https://www.knowledgehut.com/blog/security/cyber-security-trends
https://images.app.goo.gl/NHZWwbcFrrUVACNL7
https://images.app.goo.gl/m8sbTYQHH6HLEosLA
https://www.google.com/imgres?imgurl=https%3A%2F%2Fexecutiveacademy.at%2Ffileadmin_synced_asset
s%2F_processed_%2Fc%2Fc%2Fcsm_filler-news-cyber-security-best-practices-
verordnung1_32070b9668.jpg&tbnid=xfXUl0zmLStxrM&vet=1&imgrefurl=https%3A%2F%2Fexecutiveaca
demy.at%2Fen%2Fnews%2Fdetail%2Fcybersecurity-from-best-practice-to-
regulation&docid=UJ06Rniw2aHKyM&w=1200&h=632&hl=en-US&source=sh%2Fx%2Fim

More Related Content

What's hot

Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and HackingParth Makadiya
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet vimal kumar arora
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness programAvanzo net
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar SessionKalilur Rahman
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresAditya Ratnaparkhi
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin itRushana Bandara
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security PresentationHaniyaMaha
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

What's hot (20)

Cyber security and Hacking
Cyber security and HackingCyber security and Hacking
Cyber security and Hacking
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to Internet Governance
Introduction to Internet GovernanceIntroduction to Internet Governance
Introduction to Internet Governance
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber awareness program
Cyber awareness programCyber awareness program
Cyber awareness program
 
Cybersecurity - Webinar Session
Cybersecurity - Webinar SessionCybersecurity - Webinar Session
Cybersecurity - Webinar Session
 
Cybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive MeasuresCybersecurity - Introduction and Preventive Measures
Cybersecurity - Introduction and Preventive Measures
 
Social and professional issuesin it
Social and professional issuesin itSocial and professional issuesin it
Social and professional issuesin it
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 

Similar to Cyber Security

Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxNigussMehari4
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docxssuser719d6b
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 

Similar to Cyber Security (20)

Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
C018131821
C018131821C018131821
C018131821
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Forensics
ForensicsForensics
Forensics
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Cyber Security

  • 1.
  • 2. INTRODUCTION Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access. Three main aspects we are trying to control, namely: Unauthorized Access Unauthorized Deletion Unauthorized Modification
  • 3. The CIA triad- is also commonly referred to as the three pillars of security and most of the security policies of an organization are built on these three principles. 1. Confidentiality- the protection of personal information. 2.Integrity- refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification. 3.Availability- refers to the ability of a user to access information or resources in a specified location and in the correct format.
  • 4. HISTORY Cybersecurity began in the 1970s when researcher Bob Thomas created a computer programme called Creeper that could move across ARPANET’s network. 1970- a number of security measures were developed, including encryption algorithms, firewalls, and access control systems. The development of the internet in the 1990s led to the creation of new security protocols, such as the Secure Sockets Layer (SSL) and Transport Layer Security (TLS), which are used to secure online communications and transactions. early 2000's- a number of high-profile cyberattacks, such as the Code Red and Nimda worms, highlighted the growing threat of cybercrime.
  • 5. HISTORY Cybersecurity has been developed and advanced by a range of individuals and organizations over time. It is difficult to attribute the development of cybersecurity to any one person or group, as it has evolved as a response to the changing threat landscape and the growth of computer networks. OTHER CONTRIBUTORS: -Whitfield Diffie -Martin Hellman -Robert moris
  • 6. HISTORY Where did cybersecurity begin? Cyber magazine takes a look at the history of cybersecurity from inception to the present day. Cybersecurity is becoming increasingly significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices and the various devices that constitute the ‘Internet of things’. 1970s: ARAPNET and the Creeper Cybersecurity began in the 1970s when researcher Bob Thomas created a computer programme called Creeper that could move across ARPANET’s network, leaving a breadcrumb trail wherever it went. Ray Tomlinson, the inventor of email, wrote the programme Reaper, which chased and deleted Creeper.
  • 7. HISTORY 1980s: Birth of the commercial antivirus 1987 was the birth year of commercial antivirus although there were competing claims for the innovator of the first antivirus product. Andreas Lüning and Kai Figge released their first antivirus product for the Atari ST – which also saw the release of Ultimate Virus Killer in 1987. Three Czechoslovakians created the first version of the NOD antivirus in the same year and in the US, John McAfee founded McAfee and released VirusScan. 1990s: The world goes online With the internet becoming available to the public, more people began putting their personal information online. Organised crime entities saw this as a potential source of revenue and started to steal data from people and governments via the web. By the middle of the 1990s, network security threats had increased exponentially and firewalls and antivirus programmes had to be produced on a mass basis to protect the public.
  • 8. HISTORY 2000s: Threats diversify and multiply In the early 2000s crime organisations started to heavily fund professional cyberattacks and governments began to clamp down on the criminality of hacking, giving much more serious sentences to those culpable. Information security continued to advance as the internet grew as well but, unfortunately, so did viruses. 2021: The next generation The cybersecurity industry is continuing to grow at the speed of light. The global cybersecurity market size is forecast to grow to $345.4bn by 2026 according to Statista. Ransomware is one of the most common threats to any organisation's data security and is forecast to continue to increase.
  • 9. DEFINITION Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks. 5 types of cyber security: 1. Critical infrastructure cyber security 2. Network security 3. Cloud security 4. IoT (Internet of Things) security 5. Application security
  • 10. DEFINITION 1. Critical infrastructure cyber security -Critical infrastructure organisations are often more vulnerable to attack than others because SCADA (supervisory control and data acquisition) systems often rely on older software. 2. Network security -Network security involves addressing vulnerabilities affecting your operating systems and network architecture, including servers and hosts, firewalls and wireless access points, and network protocols. 3. Cloud security -Cloud security is concerned with securing data, applications, and infrastructure in the Cloud.
  • 11. DEFINITION 4. IoT (Internet of Things) security -IoT security involves securing smart devices and networks connected to the IoT. IoT devices include things that connect to the Internet without human intervention, such as smart fire alarms, lights, thermostats, and other appliances. 5. Application security -Application security involves addressing vulnerabilities resulting from insecure development processes in designing, coding, and publishing software or a website.
  • 12. EXAMPLES: LATEST TRENDS Examples of Network Security includes: • Antivirus and Antispyware programs, • Firewall that block unauthorized access to a network and • VPNs (Virtual Private Networks) used for secure
  • 13. EXAMPLES: LATEST TRENDS Latest Trends: 1. Rise of Automotive Hacking 2. Potential of Artificial Intelligence (AI) 3. Mobile is the New Target 4. Cloud is Also Potentially Vulnerable 5. Data Breaches: Prime target 6. IoT with 5G Network: The New Era of Technology and Risks 7. Automation and Integration 8. Targeted Ransomware 9. State-Sponsored Cyber Warfare
  • 14. NEWS RELATED ARTICLES ◆ Kimsuky Updates its Tactics to Target South Korean Experts Threat Actors (March 24, 2023) Cyware Alerts - Hacker News ◆ Black Magic APT Targets Ukraine with CommonMagic and PowerMagic Breaches and Incidents (March 24, 2023) Cyware Alerts - Hacker News
  • 15. NEWS RELATED ARTICLES ◆ Hacktivists Increasingly Claim to Target and Impact OT ◆ NETWORK SECURITYCisco Patches High-Severity Vulnerabilities in IOS Software ◆ Hackers inject credit card stealers into payment processing modules
  • 16. ADVANTAGES 1. Protects sensitive personal information -Cyber Security can prevent such attacks in the first place as it is a proactive approach. 2. Protect private and Business data -Cyber Security is a complete security package that can protect businesses and organisations from various threats. 3. Improves productivity -An effective Cyber Security strategy can give an early warning on when to expect attacks and give suggestions on how to respond.
  • 17. ADVANTAGES 4. Provides a business continuity plan -Cyber Security uses Artificial Intelligence (AI) and machine learning to create a business continuity plan. 5. Improve the overall security of an organisation -Cyber Security is a one-stop solution for all security issues for businesses and organisations.
  • 18. DISADVANTAGES 1. Regular Update -Businesses need to regularly update their software, hardware, and security strategy to be one step ahead of the attackers. 2. Needs Continuous learning -The threats are new and never-ending, and so is the learning process to keep up with the threats. 3. Complex to Setup -Setting up security architectures and tools like a firewall can be complicated and could take a long time.
  • 19. DISADVANTAGES 4. Slower Systems -Over time, Systems tend to become sluggish as running these security applications takes up a lot of resources. 5. Constant Monitoring -An effective Cyber Security strategy involves continuous monitoring of new threats. 6. Talent Shortage -Cyber Security is vast, and there's a significant talent shortage in this field. 7. Expensive -Implementing Cyber Security can be very expensive as it is an ongoing process that requires consistent learning and spending.
  • 20. SUMMARY Over the years, the term Cyber Security has gained much importance and become a common part of each one’s life who is associated with a computer or a smartphone device. When people submit their data online, it becomes vulnerable to cyber-attacks or cyber-crimes. Moreover, cyber-attacks can happen over an external facing DNS server or an internal firewall, which in turn effects the data and infrastructure within the enterprise that inherently causes significant damage to the business of the associated organization. Cyber Security offers security, from unauthorized access or exploitation, through online services to the massive data, associated appliances and network that is used for communication.
  • 21. CONCLUSION In conclusion, information is a critical part of any organization and investing on the right service provider keeps your business in safe hands in the ever-expanding IoT (Internet of Things) world. A scalable and customized cyber security-driven business model includes disaster-recovery capabilities and secures data and the underlying infrastructure of the organization, thus building a safe barrier for the information even before it is attacked and saving the organization from a loss of billions of dollars that could result from the security threat.
  • 22. REFERENCES: https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.edureka.co/blog/what-is- cybersecurity/amp/&ved=2ahUKEwiB4q-ugfL9AhWhR2wGHa5UB- IQFnoECC4QAQ&usg=AOvVaw2yLUdOD9SfH9hRhZjwGftQ https://cybermagazine.com/cyber-security/history-cybersecurity https://www.theknowledgeacademy.com/blog/advantages-and-disadvantages-of-cybersecurity/ https://www.knowledgehut.com/blog/security/cyber-security-trends https://images.app.goo.gl/NHZWwbcFrrUVACNL7 https://images.app.goo.gl/m8sbTYQHH6HLEosLA https://www.google.com/imgres?imgurl=https%3A%2F%2Fexecutiveacademy.at%2Ffileadmin_synced_asset s%2F_processed_%2Fc%2Fc%2Fcsm_filler-news-cyber-security-best-practices- verordnung1_32070b9668.jpg&tbnid=xfXUl0zmLStxrM&vet=1&imgrefurl=https%3A%2F%2Fexecutiveaca demy.at%2Fen%2Fnews%2Fdetail%2Fcybersecurity-from-best-practice-to- regulation&docid=UJ06Rniw2aHKyM&w=1200&h=632&hl=en-US&source=sh%2Fx%2Fim