INTEGRATED
INFORMATION DEFENSE
Presentation On
Objectives:
 What is cyber threat
 determine the environment .
 Handle the situation carefully.
 Prevention of attack.
What is Cyber Threat
 A cyber threat is an activity intended to
compromise security of an information
system by altering the availability, integrity or
confidentiality of system.
Environment
 In today computerized world, new risks
emerge every hour of every day. Connecting
to the internet open up the possibility of
hacker targeting your organization.
 A “Cyber Security breaches survey 2018”
revealed that over four in ten (43%)
businesses and 19% charities in UK suffered a
cyber attack.
 Monitoring the all activity on the internet is
not possible its very complex task nowadays.
Types of Attack
 Crypto-curreny
 Phishing
 Man –In- Middle
 Denial- of service
 SQL injection
 Ransom-ware.
 Root Kit.
Ransomeware And Their
Prevention
 Ransomeware is a malicious software that, in
many cases , restricts access to a computer
or device and its data by encrypting its
content and demanding that a ransom be
paid, usually via a cryptocurrency such as
bitcoin..
 Ransomware can also lock system in various
ways without the use of encryption,
disrupting device performance.
Target Of Ransomware
 There are the several ways attackers
 Sometimes it’s a matter of opportunity : for
instance,
 Some organizations are tempting target
because they seem more likely t o pay a
ransom quickly.
Prevention of Ransomware
 There are number of defensive steps you can
take to prevent ransomware .
 Use real- time malware detection
 Use backup solutions that provide full
content analytics.
 Deploy forensic analysis with machine
learning.
 Don’t pay ransome.
 Recover Right.
Thank you
Presented By
Kajal Kumari

Integrated cyber defense

  • 1.
  • 2.
    Objectives:  What iscyber threat  determine the environment .  Handle the situation carefully.  Prevention of attack.
  • 3.
    What is CyberThreat  A cyber threat is an activity intended to compromise security of an information system by altering the availability, integrity or confidentiality of system.
  • 4.
    Environment  In todaycomputerized world, new risks emerge every hour of every day. Connecting to the internet open up the possibility of hacker targeting your organization.  A “Cyber Security breaches survey 2018” revealed that over four in ten (43%) businesses and 19% charities in UK suffered a cyber attack.  Monitoring the all activity on the internet is not possible its very complex task nowadays.
  • 5.
    Types of Attack Crypto-curreny  Phishing  Man –In- Middle  Denial- of service  SQL injection  Ransom-ware.  Root Kit.
  • 6.
    Ransomeware And Their Prevention Ransomeware is a malicious software that, in many cases , restricts access to a computer or device and its data by encrypting its content and demanding that a ransom be paid, usually via a cryptocurrency such as bitcoin..  Ransomware can also lock system in various ways without the use of encryption, disrupting device performance.
  • 8.
    Target Of Ransomware There are the several ways attackers  Sometimes it’s a matter of opportunity : for instance,  Some organizations are tempting target because they seem more likely t o pay a ransom quickly.
  • 9.
    Prevention of Ransomware There are number of defensive steps you can take to prevent ransomware .  Use real- time malware detection  Use backup solutions that provide full content analytics.  Deploy forensic analysis with machine learning.  Don’t pay ransome.  Recover Right.
  • 11.