2. PROBLEM BADED LEARNING.
CYBER SECURITY
PROBLEM BASED LEARNING ON CYBERSECURITY
PPT PRESENTED BY PANCHAL BHAVIN D.
PANCHAL ALOK H.
PATEL PREMAL M.
GAJJAR DHRUV G.
3. Keywords. Problem-based learning, cybersecurity
education, problem-solving skills, critical thinking
u 1. INTRODUCTION
u Cybersecurity instructors combine traditional lectures with hands-on lab exercises
to improve the student learning outcomes. Based on our experience, an
overwhelming majority of the available cybersecurity hands-on exercises fall well
short of what is needed. They typically follow a cookbook approach and consists
series of steps presented to students to follow; they are rarely designed to build
problem solving skills and deep understanding of cybersecurity concepts
4. 1.
Problems
u In a supply chain attack, hackers target elements of an industry that are
comparatively less secure. Generally, this cyberattack takes place with the help of
a third-party partner that has access to a company’s data.
u The recent SolarWinds attack is an excellent example of this growing
cybersecurity challenge. Unfortunately, the ever-increasing dependency of
enterprises on outside providers has increased this risk to the supply chain
elements.
5. 2.
Here are some common industries that face the supply chain attack threat:
u Finance
u Oil and Gas
u Governments
u Information Technology
u Healthcare
6. 3.
u In simple terms, phishing implies harming a company’s system through files from
supposedly trustworthy sources. These files range from simple PDFs to
compressed documents.
u Phishing attacks will become more customized in the near future. Basically,
corporates need to be wary of any suspicious emails and attachments.
7. 4.
Here’s how businesses can identify common phishing threats:
u Shortened URLs
u Replicating JavaScript of a reputed website
u Redirect links
u Utility of brand logos
8. 5.
Social Media Privacy Intrusion
u Social media giants possess information about several individuals across the
globe. Unfortunately, laws to monitor this storage have certain limitations.
u Going forward, privacy on social media platforms will still be a controversial issue.
Thus, data leakage is a trending challenge to the cybersecurity of individuals and
companies.
9. 6. Smart ways to combat cybersecurity challenges
u Individuals and corporates have to function with these inevitable online threats.
One way to stay prepared is by following security and risk management trends.
u For instance, privacy-enhancing computation, cyberattack simulators, and
machine identity management can be potential strategies.
10. 7.
Solutions
In addition, these common methods can help improve cybersecurity immensely.
u Installing a two-step verification process
u Using strong and distinct passwords for different accounts
u Offline engineering software
u Physical backup of organizational data
u Full-proof ransomware and anti-virus tools
Above all, a unique data protection system is the need of the hour to combat rising
cybersecurity threats. Also, smart management of data is a new requirement to combat
these cyber threats.
11. 8.
u However, these solutions will depend on the adaptability of different companies.
Switching between online and offline storage and segregating data has become
more critical than ever.
12. 9. WRAPPING UP
u With a rising number of companies shifting base online, cyber attackers will have high
scope to gain profits. Hence, ransomware, malware, phishing attacks, and privacy
breaches will stay active.
u Notably, most of these cybersecurity challenges aren’t new but can increase in
intensity. In addition, trends like supply chain and cloud computing attacks are
additional risks to cybersecurity.
u Staying aware of these challenges is the key to developing a full-proof security
system. Importantly, companies will need to adapt to better ways of managing the
abundant data. Technologies like deep learning can also prove vital in the fight against
cyber threats.
u Hence, businesses need to stay vigilant of cybersecurity threats and upgrade their IT
strategies.