Breif Intro into Cyber Security. Basic p

elormsepenu 6 views 29 slides May 25, 2024
Slide 1
Slide 1 of 29
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29

About This Presentation

Cyber secruity


Slide Content

Information available in audio. Data Science PRESENTED BY Cyber security AWARENESS Tech reliance demands cybersecurity. 20TH MAY 2024

3 About Cyber Attack 4 Notable Impacts of Cyber Attacks 5 Types Of Cyber Attacks 7 Advice and Guidance 8 Security Checklist The increasing reliance on technology and the internet has made cybersecurity a critical concern for individuals, businesses, and governments. Agenda

Cyber Attack A set of actions by a third party to gain unauthorized access, steal data or cause damage to computers, computer networks, or other computing systems Attackers try to identify vulnerabilities in computer systems and exploit them

About Cyber Attacks Motivation Social or political cause International warfare, business competition, terrorist groups Self esteem, curiosity, accidental experiment Financial gains

Notable Impacts of Cyber Attacks Microsoft Exchange Remote Code Execution Attack in March 2021 on zero-day vulnerabilities affected 60,000 private businesses in US The WannaCry Ransomware Attack in 2017 affected 150 countries globally

Back to Agenda 1 Kaseya Ransomware Attack on a software update in July 2021 in US carried out by a Russian-based cybercrime group 2 Amazon AWS DDoS Attack in February 2020 had a global effect 3 Twitter Social Engineering Attack in July 2020. Attackers earned over $100,000.

Types of Cyber Attacks Ransomware Malware DOS & DDoS Attack Social Engineering Phishing Attack MITM{Man in the Middle)

Ransomware Attacker uses encryption to deny access to resources (especially files) and would ask for a ransom in exchange for the decryption code

Malware Attackers infect a computer system with malicious software. In most cases, the objective is to destroy, steal data or hijack a particular computer to enable further attacks

Types of Malware Worms (clone and infect computer systems) Botnet (zombies) Spyware) Adware attached to free software and browser plugins

Types of Malware Trojan (appear legitimate but carries bad data) Rootkits & Backdoors (enable remote file execution and remote control) M obile malware – Targets mobile devices via Apps or Messaging Services

DOS & DDOS ATTACK (Denial-of-Service). This attack is purely for sabotage purposes. By attacking a large number of systems multiple illegitimate service requests in order to deny users of a service

Social Engineering This attack relies heavily on human interaction and it is used in over 90% of successful attacks.

Phishing Attacks Attacker sends a message that appears to be trusted with the objective of obtaining sensitive information from a target (eg password)

MiTM (Man in the Middle) Attackers intercept data transmitted between networks, computers or users without being detected

Avice and Guidance MULTIFACTOR AUTHENTICATION – STRONG, LONG, COMPLEX PASSWORDS ENCRYPTED MESSAGING APPS DON’T SHARE ACCOUNTS KEEP DEVICES UPDATED BE AWARE OF PHISHING MAILS DON’T USE PERSONAL ACCOUNTS FOR OFFICIAL BUSINESS

Security Checklist

CYBER SECURITY WHAT HAVE YOU LEARNT? (POST TEST)

Question 1 You post a picture of you and your best friend to your favorite social media platform. She doesn’t feel comfortable with the image, so you agree to take it down. Will this ensure that no one else sees the picture?

Answer 1 No. Once an image (or any information) is posted on the internet, it is virtually impossible to remove it from circulation. Taking it off of your social media page will help, but there is no guarantee that others have not already seen it and/or downloaded it to their own machines.

Question 2 You receive an email from an online shopping site claiming that you were incorrectly charged for your last purchase and are due a refund. The email asks you to click a link where you will submit the necessary information. What should you do?

Answer 2 Do NOT click the link! Check the sender’s address and search the document for spelling/grammar mistakes. If you notice anything suspicious, the email is likely a scam. Even if it seems legitimate, navigate to the site yourself rather than clicking any links.

Question 3 You’ve just settled into your new hotel room when you realize you need to transfer some funds from your savings account to your checking account. In order to do this, you will need to connect your laptop to the hotel’s public Wi-Fi and log in to your online bank. Should you risk it?

Answer 3 It depends. In general, it is never safe to transmit PII (Personally Identifiable Information), especially financial information, over a public network. If you find yourself in a situation where you may need to do so, first consider all your options, including using your mobile data or a VPN (Virtual Private Network) to help protect your browsing.

Question 4 You have a long commute. Thankfully, your train just installed public Wi-Fi. Now you can listen to your favorite music or podcast. However, when you check for social media updates around lunch, you find that your account has been hacked. What steps could you take to prevent your mobile device or laptop data from being compromised in the future?

Answer 4 •Turn off Wi-Fi and Bluetooth when not using them. These technologies leave you open to remote attacks. •Make sure the network is legitimate. Hackers love to create fake networks that mimic real ones, enticing unsuspecting users to log on. •Don’t connect. Though perhaps drastic, one near-certain way to circumvent the dangers of public Wi-Fi is simply to avoid using it whenever possible.

Question 5 Passwords often have complex requirements, and most online citizens will need to remember numerous different passwords to access their internet services. What is a way to help you keep track of all these different passwords?

Answer 5 •Use a password manager. These are apps, devices, or cloud services that store your passwords in an encrypted vault that can only be unlocked with a single master password. •Use a password manager. These are apps, devices, or cloud services that store your passwords in an encrypted vault that can only be unlocked with a single master password.

THANK YOU http://kintampo-hrc.org/
Tags