CYBER SECURITY ,CYBER ATTACK,CYBER ATTACK IN INDIA ,CYBER SECURITY AS PROFESSION ,CYBER SECURITY TIPS
Size: 3.72 MB
Language: en
Added: May 05, 2021
Slides: 41 pages
Slide Content
CYBER SECURITY 1 CYBER ATTACK and
O u t line Introduction to Cyber Security CIA in Cyber Security Major Security Problem - Cyber Attack Types of Cyber Attack Major Cyber attacks in INDIA Cyber Security as Profession 2
What is the meaning of the word CYBER What is the need of Cyber Security What are the security problems in Cyber field How to implement and maintain Security of a Cyber field around us.
It is a combining form relating to information technology, the Internet, and virtual reality. Meaning of the Word CYBER
Introduction to Cyber Security The term Cyber Security is used to refer to the security offered through on-line services to protect your information. Cyber Security is protection against the criminal or unauthorized use of electronic data 5
Why Cyber Security is important? 6 C y ber Securi t y is not a on e - t i m e p r ocess to achieve I t i s a n e v er gro w ing c halle n ge en c ountered from time to time When old problems are fixed and rectified, new targeted attacks challenge the Cyberspace Cyber security is a process by itself and not the end
CIA in Cyber Security
Top Five Risks- Global Instability According to the World Economic Forum’s Global Risk Report 2018, Cyber-attacks are 3 rd threat the World is facing today after natural disasters Top 5 R i sk s Natural disaster Extreme weather c ond i t io n s C y be r - A tt a ck s Data frauds Failure to address climate change 8
Definition of Cyber Attack 9 C I A o f t he I n t ernet or It refers to compromise in the resources or data stored in a Intranet connected computer Deliberate exploitation of computer system resources, networks and technology connected through WWW Compromises data by injecting malicious code into the actual code
First- Major Cyber Attack 10 T he M orris w orm (1988) is the f ir s t k no w n major cyber-attack It was used as a weakness in the UNIX system and it replicated itself T he w orm w as de v eloped b y R ob e rt T apan Morris H e w as t he f ir s t p er s on e v er t o b e c on v i ct ed under the US computer fraud and abuse act
Purpose and Motivation for Cyber Attacks Money Curiosity Revenge Fun Praise Seekers 11
Major security problems Virus Hacker Malware Trojan horses
Viruses and Worms A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes
Solution Install a security suite that protects the computer against threats such as viruses and worms.
H ac k er s In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.
H o w T o p r eve n t h ac k i n g It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.
M al w a r e The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.
T o St o p M al w a r e Download a nti-malware program that also helps prevent infections . Activate Network Threat Protection , Firewall, Antivirus.
Trojan Horses Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers
How to Avoid Trojans Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.
Most Common types of Cyber-attacks Cyber Attack types DoS and DDoS attack XSS attack SQL Injection attack Man-in-the-Middle attack Birthday attack Password attack Eavesdropping attack Phishing and spear phishing attack Drive-by download attack 21
DOS ATTACK
MAN IN THE MIDDEL ATTACK
IP SPOOFING
SQL INJECTION ATTACK
XSS ATTACK
Major Cyber attacks in india Cosmos Bank Cyber Attack in Pune UIDAI Aadhaar Software Hacked ATM System Hacked Bib B Amitabh Bachchan ‘s Twitter Account Hacked! --Social media hack Facebook database leak data of 419 million users Personal Data Exposed from JustDial Database Data Breach in BIGBASKET
Cyber Security Measures for Organizations to Prevent Cyber Attacks 1)Educate employees on the emerging cyber attacks with security awareness training . 2) Keep all software and systems updated from time to time with the latest security patches. 3)Get regular Vulnerability Assessment and Penetration Testing to patch and remove the existing vulnerabilities in the network and web application . 4)Limit employee access to sensitive data or confidential information and limit their authority to install the software. 5)Use highly strong passwords for accounts and make sure to update them at long intervals. 6)Avoid the practice of openly password sharing at work .
Ettercap sqlmap Kali Linux Social Engineering Tool Kit Cain and Able
Network Attack Prevention Tips Install Software Updates Use Unique Password Use Two Factor AUTHENTICATION USE STRONG PASSSWORD and PASSWORD MANAGER Use a firewall for your Internet connection . Browse Safely Online and Clear Browser after Leaving Computer
Tools used for Cyber Security Common tools used to prevent Data Leakage Passwords Anti-Virus/ Anti-Malware Software Software Patches Firewalls Authentication Encryption 33
CYBER SECURITY AS PROFESSION
JOB ROLES IN CYBER SECURITY
CYBER SECURITY ENGINEER SKILLS
Cyber Security Engineer career pathway
Cyber Security- Salary
Conclusion 39 We are living in digital era and digital technology has transformed our lives promoting the need for Cyber Security Cyber Attacks have started affecting most of the systems today because of the dependency on technology It is very important to know what are Cyber Attacks and how the Cyber Attacks affect the system