Cyber Security Fundamentals attack types

AjayTiwari684365 3 views 17 slides Oct 20, 2025
Slide 1
Slide 1 of 17
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17

About This Presentation

Vulnerability
Reasons for Cyber Attacks
Hacker
Types/Techniques of Cyber Attacks
Aspects of Cyber Security
CIA Triad
Framework for Information Security


Slide Content

Cyber Security Basics

2 Agenda Vulnerability Reasons for Cyber Attacks Hacker Types/Techniques of Cyber Attacks Aspects of Cyber Security CIA Triad Framework for Information Security

Cyber Security Protecting computer systems, networks, programs, & data from digital attacks, damage, or unauthorized access. As technology has become integral to daily life for individuals, governments, and businesses, cybersecurity has become critical for safeguarding information and vital infrastructure.  Technologies, processes, and controls used to defend against a wide range of cyber threats.

VULNERABILITY weakness in Information Security system that could be exploited by a threat. weakness may exist in : Network System components Network security process & procedures. Common types errors in design configuration of Network components, Communication Links, OS, Applications Databases, Protocols, Services

5 Reasons for Cyber Attacks

HACKER a person , able to exploit a system or gain unauthorized access through skill & tactics. d elete your files, Read your documents, View your passwords or crash your system. do it by using som e attack technique Types depending upon the capacity & goal of hacking involved: black hat hacker white hats /ethical hackers grey hats

7 Types/Techniques of Cyber Attacks

Types/Techniques of Cyber Attacks DOS attack - aims to make a computer, network, or service unavailable to its legitimate users by overwhelming it with a flood of fake requests, causing it to slow down, crash, or become completely inaccessible. Malware attack - uses malicious software to gain unauthorized access to, or cause harm to, a computer system, network, or server. Man-in-the-Middle (MitM) attack - an attacker secretly intercepts and potentially alters communications between two unsuspecting parties, such as a user and a website

Phishing -  attack resembles as a trusted entity to deceive individuals into revealing sensitive information . Eavesdropping - an attacker secretly intercepts, accesses, or steals data transmitted over an unsecured network. Spoofing - when a cybercriminal impersonates a trusted source—such as a user, device, or organization—by falsifying data to gain an advantage 9 Types/Techniques of Cyber Attacks ……

SQL injection attack - code injection technique used by attackers to manipulate a backend database and retrieve or delete sensitive information.  Password attack - an attempt to gain unauthorized access to a system or network by cracking, guessing, or stealing a user's password. Social engineering attack - a malicious tactic that exploits human psychology to manipulate individuals into revealing confidential information or performing actions that compromise security. 10 Types/Techniques of Cyber Attacks ……

11 Aspects of Cyber Security

Network security - securing a computer network from any type of cyber attack.  Application security - protecting software and programs and is usually inbuilt in the applications.  Information security  - responsible for protecting the integrity and privacy of data everywhere.  Operational security  protecting the data assets by deciding their storage and accessing procedures.  12 Aspects of Cyber Security ……

Disaster recovery and business continuity - response of the cybersecurity accident leading to loss of data. The recovery policies define the procedure to continue operations in the organization. Business is the plan by which this operation takes place.  End-user education - refers to the measures that the user takes on a personal level to protect themselves from these threats.  13 Aspects of Cyber Security ……

INFORMATION SECURITY COMPONENTS – CIA traid Information Security Components : Confidentiality - Preventing disclosure of information to unauthorized individuals or systems Integrity - Data shall not be modified without authorization. Availability - Information must be available when it is needed

TECHNOLOGY AND DEFENSE

FRAMEWORK FOR INFORMATION SECURITY

Free templates for all your presentation needs Ready to use, professional and customizable 100% free for personal or commercial use Blow your audience away with attractive visuals For PowerPoint and Google Slides 17