SlideShare a Scribd company logo
1 of 10
CYBER SECURITY AND ITS
CONTROLS
WHAT IS CYBER SECURITY?
• Cybersecurity is the practical method of defending computer systems, servers,
mobile devices, electronic systems, networks, and data from Hacking attacks and
various other attacks.
• It’s also known as information tech security or Network information security in
common.
• The term consists of a variety of contexts, from entrepreneurial to mobile computing,
and can be divided into a few other general parts.
TYPES OF CYBER ATTACKS.
• Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
• Man-in-the-middle (MitM) attack.
• Phishing and spear-phishing attacks.
• Drive-by attack.
• Password attack.
• SQL injection attack.
• Cross-site-scripting (XSS) attack.
• Eaves-dropping attack.
TYPES OF CYBER SECURITY MANAGEMENT
• Network security
• Application security
• Information security
• Operational security
• Cloud Security
HOW TO BE SAFE FROM CYBER ATTACKS:-
• Give knowledge to all levels of your company and
its members related to the risks of social
engineering attacks and common social engineering
scams like phishing emails ETC.
• Invest in the web tools that limit information leaks,
keep an eye on your third-party risk, and fourth-
party risk, and continuously scan for data leak
points and leak credentials.
• Use technical knowledge to reduce costs like
automatically sending out the assessment
questionnaires as part of an overall cybersecurity
risk assessment technique.
TYPES OF HACKERS AND ATTACKERS.
• White Hat:- These are good hackers and have a genuine license for doing the hacking.
The hacking performed by them is to protect the government or big companies and to
build a cybersecurity infrastructure. They are good hackers.
• Grey Hat:- They are called by companies to attack their companies to test their
company’s security system. They are also called to hack another company in the
competition or even make D-Dos attacks on their competitive companies.
• Black Hat:- These are bad hackers and perform Unethical hacking to hack big companies
either to hack their bank account or to blackmail them and to take financial advantage.
Eg:- “These are the hackers and attackers who hack your bank accounts, Social Media
account” and many other things.
NEED OF CYBER SECURITY.
• Cybersecurity is required because it ensures all the things to protect our sensitive
information personally identifiable information personal information and
governmental computer systems from the leak and harms done by hackers.
• Cyber Attack risk is increasing due to global connectivity and usage of cloud
services, Eg:-Amazon Web Services, to store sensitive information and personal
data. The poor security level is a serious threat. Cybersecurity ppt
• Past were are the days of normal firewalls and antivirus services being your main
security measures. Entrepreneurs can no longer leave Information security and
network security to cybersecurity professionals.
IMPORTANCE OF CYBER SECURITY.
• In today’s internet connected world, everyone benefits from advanced cyber defense programs.
• At an individual level, a cybersecurity attack can result in everything from identity theft and hacker, to
attempts, to the loss of important information and media files like family photos. cyber security ppt
• Everyone keeps their shoulders on critical infrastructure like power plants, hospitals, and financial
service companies. Securing these and other organizations is essential to keeping our society functioning
to be secured from digital attacks.
• Everyone also benefits from the work of cyber threat researchers or cyber security experts, like the team
of 250 threat researchers at the USA, who finds new and emerging threats and cyber-attack techniques.
• They reveal new loop holes in their network, educate the public on the importance of cyber security, and
even strengthen open source tools. cybersecurity ppt
• Their work makes the Internet safer for everyone in their countries.
CYBER SAFETY TIPS – PROTECT YOURSELF
AGAINST CYBER ATTACKS.
• Update your software and operating system:
• There is the meaning that you got the benefit from the latest security loops.
• Use anti-virus software:
These Security solutions like will detect and removes threats. Keep your software updated for the best level of protection
regularly. You will also find this point in the above cybersecurity ppt.
• Use strong passwords:
Ensures your passwords are not easily guessable and you will not be hacked.
• Don’t open email attachments from anonymous senders:
They could be infected with malware or any kind of spyware. You will also find this point in the above cybersecurity ppt
• Do not click on links on emails from anonymous mail senders or unknown websites:
This is a common way in which malware is spread across digital devices. You will also find this point in the above
cybersecurity ppt
• Avoid connecting to open WiFi connections in public areas like hotels and station:
Non protected networks keep you vulnerable to be attacked by man-in-the-middle attacks. They are very easy atacks
which can be done on you.
Thank you

More Related Content

Similar to Cyber security and its controls.pptx

Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdfKARANSINGHD
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxRoshni814224
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar26
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxInfosectrain3
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxGauravWankar2
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsBilalMehmood44
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataAccellis Technology Group
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxParthYadav89
 
How to Protect Your Business from Cyberattacks.pptx
How to Protect Your Business from Cyberattacks.pptxHow to Protect Your Business from Cyberattacks.pptx
How to Protect Your Business from Cyberattacks.pptxRohit kumar
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 

Similar to Cyber security and its controls.pptx (20)

Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
How to Protect Your Business from Cyberattacks.pptx
How to Protect Your Business from Cyberattacks.pptxHow to Protect Your Business from Cyberattacks.pptx
How to Protect Your Business from Cyberattacks.pptx
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Cyber security and its controls.pptx

  • 1. CYBER SECURITY AND ITS CONTROLS
  • 2. WHAT IS CYBER SECURITY? • Cybersecurity is the practical method of defending computer systems, servers, mobile devices, electronic systems, networks, and data from Hacking attacks and various other attacks. • It’s also known as information tech security or Network information security in common. • The term consists of a variety of contexts, from entrepreneurial to mobile computing, and can be divided into a few other general parts.
  • 3. TYPES OF CYBER ATTACKS. • Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. • Man-in-the-middle (MitM) attack. • Phishing and spear-phishing attacks. • Drive-by attack. • Password attack. • SQL injection attack. • Cross-site-scripting (XSS) attack. • Eaves-dropping attack.
  • 4. TYPES OF CYBER SECURITY MANAGEMENT • Network security • Application security • Information security • Operational security • Cloud Security
  • 5. HOW TO BE SAFE FROM CYBER ATTACKS:- • Give knowledge to all levels of your company and its members related to the risks of social engineering attacks and common social engineering scams like phishing emails ETC. • Invest in the web tools that limit information leaks, keep an eye on your third-party risk, and fourth- party risk, and continuously scan for data leak points and leak credentials. • Use technical knowledge to reduce costs like automatically sending out the assessment questionnaires as part of an overall cybersecurity risk assessment technique.
  • 6. TYPES OF HACKERS AND ATTACKERS. • White Hat:- These are good hackers and have a genuine license for doing the hacking. The hacking performed by them is to protect the government or big companies and to build a cybersecurity infrastructure. They are good hackers. • Grey Hat:- They are called by companies to attack their companies to test their company’s security system. They are also called to hack another company in the competition or even make D-Dos attacks on their competitive companies. • Black Hat:- These are bad hackers and perform Unethical hacking to hack big companies either to hack their bank account or to blackmail them and to take financial advantage. Eg:- “These are the hackers and attackers who hack your bank accounts, Social Media account” and many other things.
  • 7. NEED OF CYBER SECURITY. • Cybersecurity is required because it ensures all the things to protect our sensitive information personally identifiable information personal information and governmental computer systems from the leak and harms done by hackers. • Cyber Attack risk is increasing due to global connectivity and usage of cloud services, Eg:-Amazon Web Services, to store sensitive information and personal data. The poor security level is a serious threat. Cybersecurity ppt • Past were are the days of normal firewalls and antivirus services being your main security measures. Entrepreneurs can no longer leave Information security and network security to cybersecurity professionals.
  • 8. IMPORTANCE OF CYBER SECURITY. • In today’s internet connected world, everyone benefits from advanced cyber defense programs. • At an individual level, a cybersecurity attack can result in everything from identity theft and hacker, to attempts, to the loss of important information and media files like family photos. cyber security ppt • Everyone keeps their shoulders on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning to be secured from digital attacks. • Everyone also benefits from the work of cyber threat researchers or cyber security experts, like the team of 250 threat researchers at the USA, who finds new and emerging threats and cyber-attack techniques. • They reveal new loop holes in their network, educate the public on the importance of cyber security, and even strengthen open source tools. cybersecurity ppt • Their work makes the Internet safer for everyone in their countries.
  • 9. CYBER SAFETY TIPS – PROTECT YOURSELF AGAINST CYBER ATTACKS. • Update your software and operating system: • There is the meaning that you got the benefit from the latest security loops. • Use anti-virus software: These Security solutions like will detect and removes threats. Keep your software updated for the best level of protection regularly. You will also find this point in the above cybersecurity ppt. • Use strong passwords: Ensures your passwords are not easily guessable and you will not be hacked. • Don’t open email attachments from anonymous senders: They could be infected with malware or any kind of spyware. You will also find this point in the above cybersecurity ppt • Do not click on links on emails from anonymous mail senders or unknown websites: This is a common way in which malware is spread across digital devices. You will also find this point in the above cybersecurity ppt • Avoid connecting to open WiFi connections in public areas like hotels and station: Non protected networks keep you vulnerable to be attacked by man-in-the-middle attacks. They are very easy atacks which can be done on you.