cyber threats introduction and cyber threats types

nupura1726 27 views 19 slides Mar 02, 2025
Slide 1
Slide 1 of 19
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19

About This Presentation

threats and its types


Slide Content

CYBER THREATS

What is a cyber threat ? A cyber or cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber-attacks include threats like computer viruses, data breaches, and Denial of Service ( DoS ) attacks. Cyber threats also refer to the possibility of a successful cyber attack that aims to gain unauthorized access, damage, disrupt or steal an information technology asset , computer network , intellectual property or any other form of sensitive data. Cyber threats can come from within an organization by trusted users or from remote locations by unknown parties.

Where do cyber threats come from ?

TERRORIST GROUPS HOSTILE NATION-STATES HACKTIVISTS HACKERS NATURAL DISASTERS

TERRORIST GROUPS Terrorist groups are increasingly using cyber attacks to damage national interests. They are less developed in cyber attacks and have a lower propensity to pursue cyber means than nation-states. It is likely that terrorist groups will present substantial cyber threats as more technically competent generations join their ranks.

Hostile nation-states National cyber warfare programs provide emerging cyber threats ranging from website defacement, propaganda, disruption of key infrastructure to loss of life. Government sponsored programs are increasingly sophisticated and pose advanced threats when compared to other threats. Their developing capabilities could cause widespread long term damages to the national security of many countries. HACKTIVISTS Hacktivists activities range across political ideas and issues. Most hacktivists groups are concerned with spreading propaganda rather than damaging infrastructure or disrupting services. Their goal is to support their political agenda rather than cause maximum damage to an organization.

hackers Malicious intruders could take advantage to gain unauthorized access to data. Hackers may break into information systems for a challenge. In the past, this required a high level of skill. Today, automated attack scripts and protocols can be downloaded from the internet , making sophisticated attacks simple. NATURAL DISASTERS Natural disasters represent cyber threat because they can disrupt your key infrastructure just like a cyber attack could

What are examples of cyber threats ? MALWARE SPYWARE PHISHING ATTACKS DISTRIBUTED DENIAL OF SERVICE (DOD) ATTACKS RANSOMWARE ZERO- DAY EXPLOITS TROJANS THEFT OF MONEY DATA DESTRUCTION DATA MANIPULATION

MALWARE Malware is a software that does malicious tasks on a device or network such as corrupting data or taking control of a system. SPYWARE Spyware is a form of malware that hides on a device providing real-time information sharing to it’s host, enabling them to steal data like bank details and passwords. PHISHING ATTACKS Phishing is when a cyber criminal attempts to asks individuals into providing sensitive data such as personally identifiable in formation , banking and credit card details and passwords.

Distributes denial of service ( ddos ) attacks DDoS aim to disrupt a computer network by flooding the network with superfluous requests to overload the system and prevent legitimate requests being fulfilled. RANSOMWARE Ransomware is a type of malware that denies access to a computer system or data until a rannsom is paid. ZERO DAY EXPLOITS A zero day exploits is a flaw in software , hardware or firmware that is unknown to the party or parties responsible for patching the flaw.

trojans A trojan creates a backdoor in your system, allowing the attacker to gain control of your computer or access confidential information. THEFT OF MONEY Cyber attacks may gain access to credit card numbers or bank accounts to steal money. DATA DESTRUCTION Data destruction is when a cyber attacker attempts to delete the users data. DATA MANIPULATION Data manipulation is a form of cyber threat that doesn’t steal data but aims to change the data to make it harder for an organization to operate.

Biggest cyber threats in 2021

Covid themed phishing attacks During a phishing attack, victims are presented with seemingly innocuous emails and websites that are infected with malicious links. Interacting with these links initiates a credential theft process. The attackers have the highest success rates when fear is used as a motivator for interaction. INSIDER THREATS According to a verizon report from 2021, 57% of all databases breaches involved insider threats. Unlike phishing attacks, this type of security bypassing cyber threat cannot be mitigated with a control strategy. DDoS ATTACKS As the adoption rate of devices in home and office continues to rise, the risk of DDoS attacks rise accordingly. During this threat, cyber criminals direct a high concentration of network requests from multiple compromised IoT devices at a targeted website. This causes the victim’s server to overload, forcing them offline. All form of this threat are illegal.

malvertising Malvertising (malicious advertising) is the process of embedding malicious codes into advertisement links. Malvertising can occur on websites that permits third-party advertising networks and even in social media feeds. Example:- Latin American banking trojan known as Mispadu . ZERO-DAY EXPLOITS Zero-day exploits are security vulnerabilities that are exploited by cyber criminals before a patch is released for them. A recent example is a zero-day exploit impacting Microsoft Exchange servers. Defending against such threats is difficult because they are usually not discovered until the cyber attacks abusing them have been discovered.

Why is it necessary to protect against cyber threats ?

It Could Save Millions Of Dollars According to recent studies, the average cost of cybercrimes for an organization was about USD$13 million last year. Research also revealed a sharp increase in information breaches, including financial information, health records, trade secrets, personal data, and intellectual property. You’d rather pay a little for cyber security and save big on your organization’s protection than lose a fortune through industrial espionage. Enables Credibility Cyber attacks often make online platforms, like websites, unpleasant or inaccessible. That could result in a bad reputation, which might be difficult to undo. Cyber security is, hence, important for the protection of your platform from such risks. It could also help protect customers from potential hackers. Viruses Can Harm You Or Business Computer viruses can spread like wildfire. These could cause severe problems for you and your business if not controlled. Computer viruses are capable of corrupting your files and systems. It’s essential, therefore, to take cyber security seriously as it could save your computer systems from viruses.

How to protect against cyber threats ? TRUST NO ONE (ON EMAILS) Don't open email from unknown email addresses, trash attachments in unexpected emails and avoid risky clicks – instead type the address into your browser SECURE YOUR DEVICE If your device is unsecured, lost or stolen, it could be used to access your info, your money or steal your identity and irreplaceable data like photos or messages. Secure by setting a password, gesture or fingerprint that must be entered to unlock. Secure your devices by Installing anti-virus software.

How to identify cyber threats ? One of the most important tools to invest in is antivirus software. Most antivirus mechanisms can detect malware, spyware, ransomware , and malicious email attachments. Then, when you're alerted about a high-risk incident, you can quickly identify the threat and mitigate it before it causes any significant damage.

Done by :- nupura adithya gopika chandana sreelakshmi (I bca )