Cyber security

12,463 views 41 slides May 05, 2021
Slide 1
Slide 1 of 41
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41

About This Presentation

CYBER SECURITY ,CYBER ATTACK,CYBER ATTACK IN INDIA ,CYBER SECURITY AS PROFESSION ,CYBER SECURITY TIPS


Slide Content

CYBER SECURITY 1 CYBER ATTACK and

O u t line Introduction to Cyber Security CIA in Cyber Security Major Security Problem - Cyber Attack Types of Cyber Attack Major Cyber attacks in INDIA Cyber Security as Profession 2

What is the meaning of the word CYBER What is the need of Cyber Security What are the security problems in Cyber field How to implement and maintain Security of a Cyber field around us.

It is a combining form relating to information technology, the Internet, and virtual reality. Meaning of the Word CYBER

Introduction to Cyber Security The term Cyber Security is used to refer to the security offered through on-line services to protect your information. Cyber Security is protection against the criminal or unauthorized use of electronic data 5

Why Cyber Security is important? 6 C y ber Securi t y is not a on e - t i m e p r ocess to achieve I t i s a n e v er gro w ing c halle n ge en c ountered from time to time When old problems are fixed and rectified, new targeted attacks challenge the Cyberspace Cyber security is a process by itself and not the end

CIA in Cyber Security

Top Five Risks- Global Instability According to the World Economic Forum’s Global Risk Report 2018, Cyber-attacks are 3 rd threat the World is facing today after natural disasters Top 5 R i sk s Natural disaster Extreme weather c ond i t io n s C y be r - A tt a ck s Data frauds Failure to address climate change 8

Definition of Cyber Attack 9 C I A o f t he I n t ernet or It refers to compromise in the resources or data stored in a Intranet connected computer Deliberate exploitation of computer system resources, networks and technology connected through WWW Compromises data by injecting malicious code into the actual code

First- Major Cyber Attack 10 T he M orris w orm (1988) is the f ir s t k no w n major cyber-attack It was used as a weakness in the UNIX system and it replicated itself T he w orm w as de v eloped b y R ob e rt T apan Morris H e w as t he f ir s t p er s on e v er t o b e c on v i ct ed under the US computer fraud and abuse act

Purpose and Motivation for Cyber Attacks Money Curiosity Revenge Fun Praise Seekers 11

Major security problems Virus Hacker Malware Trojan horses

Viruses and Worms A Virus is a “program that is loaded onto your computer without your knowledge and runs against your wishes

Solution Install a security suite that protects the computer against threats such as viruses and worms.

H ac k er s In common a hacker is a person who breaks into computers, usually by gaining access to administrative controls.

H o w T o p r eve n t h ac k i n g It may be impossible to prevent computer hacking, however effective security controls including strong passwords, and the use of firewalls can helps.

M al w a r e The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects and damages a computer system without the owner's knowledge or permission.

T o St o p M al w a r e Download a nti-malware program that also helps prevent infections . Activate Network Threat Protection , Firewall, Antivirus.

Trojan Horses Trojan horses are email viruses that can duplicate themselves, steal information, or harm the computer system. These viruses are the most serious threats to computers

How to Avoid Trojans Security suites, such as Avast Internet Security, will prevent you from downloading Trojan Horses.

Most Common types of Cyber-attacks Cyber Attack types DoS and DDoS attack XSS attack SQL Injection attack Man-in-the-Middle attack Birthday attack Password attack Eavesdropping attack Phishing and spear phishing attack Drive-by download attack 21

DOS ATTACK

MAN IN THE MIDDEL ATTACK

IP SPOOFING

SQL INJECTION ATTACK

XSS ATTACK

Major Cyber attacks in india Cosmos Bank Cyber Attack in Pune UIDAI Aadhaar Software Hacked ATM System Hacked Bib B Amitabh Bachchan ‘s Twitter Account Hacked! --Social media hack Facebook database leak data of 419 million users Personal Data Exposed from JustDial Database Data Breach in BIGBASKET 

Cyber Security Measures for Organizations to Prevent Cyber Attacks 1)Educate employees on the emerging cyber attacks with  security awareness training . 2) Keep all software and systems updated from time to time with the latest security patches. 3)Get regular  Vulnerability Assessment and Penetration Testing  to patch and remove the existing vulnerabilities in the network and web application . 4)Limit employee access to sensitive data or confidential information and limit their authority to install the software. 5)Use highly strong passwords for accounts and make sure to update them at long intervals. 6)Avoid the practice of openly  password sharing at work .

Network Attackers Tool(Penetration Testing Tool) Metasploit Framework

Ettercap sqlmap Kali Linux Social Engineering Tool Kit Cain and Able

Network Attack Prevention Tips Install Software Updates Use Unique Password Use Two Factor AUTHENTICATION USE STRONG PASSSWORD and PASSWORD MANAGER Use a firewall for your Internet connection . Browse Safely Online and Clear Browser after Leaving Computer

Tools used for Cyber Security Common tools used to prevent Data Leakage Passwords Anti-Virus/ Anti-Malware Software Software Patches Firewalls Authentication Encryption 33

CYBER SECURITY AS PROFESSION

JOB ROLES IN CYBER SECURITY

CYBER SECURITY ENGINEER SKILLS

Cyber Security Engineer career pathway

Cyber Security- Salary

Conclusion 39 We are living in digital era and digital technology has transformed our lives promoting the need for Cyber Security Cyber Attacks have started affecting most of the systems today because of the dependency on technology It is very important to know what are Cyber Attacks and how the Cyber Attacks affect the system

Cyber Security Is Everyone’s Responsibility

Thank you 41