SlideShare a Scribd company logo
USE OF CYBERSECURITY
Critical Infrastructures
• Critical infrastructure is very important to
society and maintaining the basic needs of
human life in modern times.
• Because of this, there is a need for critical
infrastructure cybersecurity to protect it from
threat actors — both foreign and domestic.
• Some of the keys to a successful cybersecurity
setup are to not settle for limited OT security,
approach protection from an OT state of mind,
strive for IT/OT convergence, and think global
and act local.
Critical infrastructure is those physical and
digital systems that provide the essential
services for a country’s economy, therefore
the disruption of these systems would
create significant economic or public health
and safety risk. Critical infrastructure
cybersecurity includes the protection of
those digital systems from potential cyber-
related attacks.
In 2016, an Iranian nation-state committed a cyber-
attack against the United States at the Rye Brook Dam in
New York. The hackers accessed industrial control systems
within the dam but were fortunately unable to release the
water behind the dam due to scheduled maintenance.
However, this could have been a disaster waiting to happen
with just a few clicks.
Electronic Government
(Banking and Finance)
Know the Different Types of Cyber
Threats in the Banking and Finance Sector
HEALTHCARE MANAGEMENT
•Cybersecurity in healthcare involves the
protecting of electronic information and
assets from unauthorized access, use and
disclosure. There are three goals of
cybersecurity: protecting
the confidentiality, integrity and availabilit
y of information, also known as the “CIA
triad.”
TRANSPORTATION
According to Cybertalk.org, between June of 2020 and June of 2021,
the transportation industry witnessed a 186 percent increase in
weekly ransomware attacks. The number of ransomware attacks is
increasing across all sectors, but transportation entities are seemingly
bearing the brunt of this trend. Because transportation companies
have not historically deployed large security teams to protect their
digital assets, they are more acutely affected by the global
cybersecurity skills gap than other businesses.
National ID System
• The government assured the adoption of cybersecurity measures in
the implementation of the Philippine Identification System (PhilSys)
or the national ID system.
• “Hybrid Cloud Solution“- The systems integrator is the core software
and information technology (IT) infrastructure of the PhilSys.
Education
Remote working has become commonplace for
organizations of all sizes and shapes since the
beginning of the COVID-19 pandemic. This
change has created significant work from home
cybersecurity risks. As such, organizations and
employees must understand essential security
tips to successfully adapt to this way of working
and minimize the security risks associated with
remote working.
Work From Home
INTERPOL, in its assessment of COVID-19’s impact
on cyber crime, found a significant increase in the
number of critical infrastructure, governments, and
large organizations targeted by hackers. Between
January and April 2020, it detected 48,000
malicious Uniform Resource Locators (URLs),
907,000 spam messages, and 737 malware incidents
related to COVID.
Work From Home
Top technologies that improve
organization's cybersecurity in
the COVID Era
IDENTITY MANAGEMENT AND AUTHENTICATION
•These tools use various authentication
methods, such as one-time passwords
(OTPs), which verify a user’s identity and
ensure a hacker cannot access an online
account even if they manage to steal the
password
ENDPOINT SECURITY SOLUTION
Endpoint security solutions protect every endpoint connected to an
organization’s IT infrastructure. Actions they perform include:
• Providing organizations with enhanced visibility of all the devices
across their networks
• Enabling advanced protection and dynamic access control
• Detecting and blocking security threats in real time
• Automating and orchestrating timely responses
• Supporting security incident investigation and management
ZERO-TRUST NETWORK ACCESS (ZTNA)
As the hybrid workforce continues to work from
anywhere, the continuous verification of all users
and devices as they access corporate applications
and data is required. Zero Trust Network
Access (ZTNA) protects networks and applications,
network administrators by implementing a zero-trust
access.
DATA LOSS PREVENTION
As the hybrid workforce continues to work from
anywhere, the continuous verification of all users
and devices as they access corporate applications
and data is required. Zero Trust Network
Access (ZTNA) protects networks and applications,
network administrators by implementing a zero-trust
access.
USER BEHAVIORAL ANALYTICS (UBA)
With employees working from disparate locations, it is
more important than ever for organizations to understand
what they are doing. User behavior analytics (UBA) allows
businesses to keep tabs on the applications users launch,
their network activity, the files they access, and the emails
they have sent. UBA also analyzes how frequently users
carry out specific tasks and searches for usage patterns
that can indicate suspicious or malicious behavior.
SECURITY INFORMATION AND EVENT
MANAGEMENT (SIEM)
• SIEM helps organizations mitigate the ever-
increasing volume of threats they face daily. The
technology allows businesses to keep pace with
the growing deluge of malicious activity, as well as
triage and investigate alerts relating to suspicious
behavior. SIEM solutions analyze security events
to enable rapid threat detection and response.
ENCRYPTION
Encryption secures data on corporate networks and
communications between remote-based employees. It
transforms data into a ciphertext that can only be read or
deciphered by the sender and their intended recipient.
This ensures that a cyber-criminal cannot read the original
data, even if they manage to intercept it. Encryption also
helps organizations ensure data authentication and
integrity as it can prove that data has not been altered
from its original state.
Thank you!

More Related Content

Similar to REPORT USE OF CYBERSECURITY.pptx

cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdf
VarinSingh1
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
CBIZ, Inc.
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
KARANSINGHD
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
HateMe9
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
IRJET Journal
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
ChristopherTHyatt
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
Indian Air Force
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
jasonuchiha2
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
wbesse
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
Rainer Mueller
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
AnastaciaShadelb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
ChantellPantoja184
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
IRJET Journal
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
ijtsrd
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
TopCyberNewsMAGAZINE
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
ANA Cyber Security Forensic Pvt. Ltd.
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
cyberprosocial
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
itnewsafrica
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
Margarete McGrath
 

Similar to REPORT USE OF CYBERSECURITY.pptx (20)

cyber security guidelines.pdf
cyber security guidelines.pdfcyber security guidelines.pdf
cyber security guidelines.pdf
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
DIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docxDIGITAL EMPOWERMENT ASSIGNMENT.docx
DIGITAL EMPOWERMENT ASSIGNMENT.docx
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTIONAI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
AI IN CYBERSECURITY: THE NEW FRONTIER OF DIGITAL PROTECTION
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Safeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdfSafeguarding the Digital Realm.pdf
Safeguarding the Digital Realm.pdf
 
Protective Intelligence
Protective IntelligenceProtective Intelligence
Protective Intelligence
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptxGuarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
Guarding Indias Digital Fortress The Vulnerability to Zero Day Attacks.pptx
 
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
Safeguarding the Digital Realm: Understanding CyberAttacks and Their Vital Co...
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 

More from eresavenzon

KATANGIANG PISIKAL ng Asya_Araling Panlipunan Grade 7.pptx
KATANGIANG PISIKAL ng Asya_Araling Panlipunan Grade 7.pptxKATANGIANG PISIKAL ng Asya_Araling Panlipunan Grade 7.pptx
KATANGIANG PISIKAL ng Asya_Araling Panlipunan Grade 7.pptx
eresavenzon
 
Factors Affecting Student Online Learning outcomes Pre and Post Pandemic.pptx
Factors Affecting Student Online Learning outcomes Pre and Post Pandemic.pptxFactors Affecting Student Online Learning outcomes Pre and Post Pandemic.pptx
Factors Affecting Student Online Learning outcomes Pre and Post Pandemic.pptx
eresavenzon
 
3rdQWeek1DLL.docx
3rdQWeek1DLL.docx3rdQWeek1DLL.docx
3rdQWeek1DLL.docx
eresavenzon
 
G7 DLL 011623.docx
G7 DLL 011623.docxG7 DLL 011623.docx
G7 DLL 011623.docx
eresavenzon
 
ppt 3rdQ Week1.pptx
ppt 3rdQ Week1.pptxppt 3rdQ Week1.pptx
ppt 3rdQ Week1.pptx
eresavenzon
 
Grade 7 121222.pptx
Grade 7 121222.pptxGrade 7 121222.pptx
Grade 7 121222.pptx
eresavenzon
 

More from eresavenzon (6)

KATANGIANG PISIKAL ng Asya_Araling Panlipunan Grade 7.pptx
KATANGIANG PISIKAL ng Asya_Araling Panlipunan Grade 7.pptxKATANGIANG PISIKAL ng Asya_Araling Panlipunan Grade 7.pptx
KATANGIANG PISIKAL ng Asya_Araling Panlipunan Grade 7.pptx
 
Factors Affecting Student Online Learning outcomes Pre and Post Pandemic.pptx
Factors Affecting Student Online Learning outcomes Pre and Post Pandemic.pptxFactors Affecting Student Online Learning outcomes Pre and Post Pandemic.pptx
Factors Affecting Student Online Learning outcomes Pre and Post Pandemic.pptx
 
3rdQWeek1DLL.docx
3rdQWeek1DLL.docx3rdQWeek1DLL.docx
3rdQWeek1DLL.docx
 
G7 DLL 011623.docx
G7 DLL 011623.docxG7 DLL 011623.docx
G7 DLL 011623.docx
 
ppt 3rdQ Week1.pptx
ppt 3rdQ Week1.pptxppt 3rdQ Week1.pptx
ppt 3rdQ Week1.pptx
 
Grade 7 121222.pptx
Grade 7 121222.pptxGrade 7 121222.pptx
Grade 7 121222.pptx
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 

REPORT USE OF CYBERSECURITY.pptx

  • 3. • Critical infrastructure is very important to society and maintaining the basic needs of human life in modern times. • Because of this, there is a need for critical infrastructure cybersecurity to protect it from threat actors — both foreign and domestic. • Some of the keys to a successful cybersecurity setup are to not settle for limited OT security, approach protection from an OT state of mind, strive for IT/OT convergence, and think global and act local.
  • 4. Critical infrastructure is those physical and digital systems that provide the essential services for a country’s economy, therefore the disruption of these systems would create significant economic or public health and safety risk. Critical infrastructure cybersecurity includes the protection of those digital systems from potential cyber- related attacks.
  • 5. In 2016, an Iranian nation-state committed a cyber- attack against the United States at the Rye Brook Dam in New York. The hackers accessed industrial control systems within the dam but were fortunately unable to release the water behind the dam due to scheduled maintenance. However, this could have been a disaster waiting to happen with just a few clicks.
  • 7.
  • 8. Know the Different Types of Cyber Threats in the Banking and Finance Sector
  • 9. HEALTHCARE MANAGEMENT •Cybersecurity in healthcare involves the protecting of electronic information and assets from unauthorized access, use and disclosure. There are three goals of cybersecurity: protecting the confidentiality, integrity and availabilit y of information, also known as the “CIA triad.”
  • 10. TRANSPORTATION According to Cybertalk.org, between June of 2020 and June of 2021, the transportation industry witnessed a 186 percent increase in weekly ransomware attacks. The number of ransomware attacks is increasing across all sectors, but transportation entities are seemingly bearing the brunt of this trend. Because transportation companies have not historically deployed large security teams to protect their digital assets, they are more acutely affected by the global cybersecurity skills gap than other businesses.
  • 11. National ID System • The government assured the adoption of cybersecurity measures in the implementation of the Philippine Identification System (PhilSys) or the national ID system. • “Hybrid Cloud Solution“- The systems integrator is the core software and information technology (IT) infrastructure of the PhilSys.
  • 13.
  • 14.
  • 15. Remote working has become commonplace for organizations of all sizes and shapes since the beginning of the COVID-19 pandemic. This change has created significant work from home cybersecurity risks. As such, organizations and employees must understand essential security tips to successfully adapt to this way of working and minimize the security risks associated with remote working. Work From Home
  • 16. INTERPOL, in its assessment of COVID-19’s impact on cyber crime, found a significant increase in the number of critical infrastructure, governments, and large organizations targeted by hackers. Between January and April 2020, it detected 48,000 malicious Uniform Resource Locators (URLs), 907,000 spam messages, and 737 malware incidents related to COVID. Work From Home
  • 17. Top technologies that improve organization's cybersecurity in the COVID Era
  • 18. IDENTITY MANAGEMENT AND AUTHENTICATION •These tools use various authentication methods, such as one-time passwords (OTPs), which verify a user’s identity and ensure a hacker cannot access an online account even if they manage to steal the password
  • 19. ENDPOINT SECURITY SOLUTION Endpoint security solutions protect every endpoint connected to an organization’s IT infrastructure. Actions they perform include: • Providing organizations with enhanced visibility of all the devices across their networks • Enabling advanced protection and dynamic access control • Detecting and blocking security threats in real time • Automating and orchestrating timely responses • Supporting security incident investigation and management
  • 20. ZERO-TRUST NETWORK ACCESS (ZTNA) As the hybrid workforce continues to work from anywhere, the continuous verification of all users and devices as they access corporate applications and data is required. Zero Trust Network Access (ZTNA) protects networks and applications, network administrators by implementing a zero-trust access.
  • 21. DATA LOSS PREVENTION As the hybrid workforce continues to work from anywhere, the continuous verification of all users and devices as they access corporate applications and data is required. Zero Trust Network Access (ZTNA) protects networks and applications, network administrators by implementing a zero-trust access.
  • 22. USER BEHAVIORAL ANALYTICS (UBA) With employees working from disparate locations, it is more important than ever for organizations to understand what they are doing. User behavior analytics (UBA) allows businesses to keep tabs on the applications users launch, their network activity, the files they access, and the emails they have sent. UBA also analyzes how frequently users carry out specific tasks and searches for usage patterns that can indicate suspicious or malicious behavior.
  • 23. SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) • SIEM helps organizations mitigate the ever- increasing volume of threats they face daily. The technology allows businesses to keep pace with the growing deluge of malicious activity, as well as triage and investigate alerts relating to suspicious behavior. SIEM solutions analyze security events to enable rapid threat detection and response.
  • 24. ENCRYPTION Encryption secures data on corporate networks and communications between remote-based employees. It transforms data into a ciphertext that can only be read or deciphered by the sender and their intended recipient. This ensures that a cyber-criminal cannot read the original data, even if they manage to intercept it. Encryption also helps organizations ensure data authentication and integrity as it can prove that data has not been altered from its original state.