Cyber Security - PowerPoint PPT Presentation

About This Presentation
Title:

Cyber Security

Description:

The presentation is all about cyber security. It covers its threats, precautions and measures. – PowerPoint PPT presentation

Number of Views:45859
Slides: 11
Provided by: Vartika123

less

Transcript and Presenter's Notes

Title: Cyber Security


1
CYBER SECURITY
  • ALL ABOUT IT THAT ONE SHOULD KNOW

2
INTRODUCTION
  • Cyber attacks are increasing day by day so to
    protect the system and the data form this attacks
    some cyber security measures are taken. The need
    of cyber security was felt when cyber attacks
    were increasing and people were getting problems
    from it.Cyber security needs dedication. The
    multinational companies and industries are having
    a great amount of possessive data, so there
    protection is important as well as. The details
    of clients and there contracts are very sensitive
    so that every company needs cyber security. When
    the data is protected by means of technical
    security we can say it cyber security.

3
THREATS OF CYBER SECURITY
  • SQL Injection-When an attacker inserts a
    complicated SQL statement in order to get the
    information from a particular website ,it is
    known as SQL injection.
  • Malwares-When malware software are used to get
    the information related to someones company then
    it is called as malware attack.
  • Social Engineering- It is the way of getting user
    name,password,card numbers etc.for impersonating
    a contractor or customer.
  • Password attacks are another type of cyber
    security hacks .Generally password attacks
    happens in getting sensitive information of
    credit cards.

4
The illegal attackers generally attack retail
shops online, as there websites are outdated and
can be hacked easily.Hence one should know all
the security threats for protecting their website.
5
PRECAUTIONS OF CYBER SECURITY
  • Pre-evaluation-In this the security system is
    checked in advance before any attack.
  • Strategic planning- A planning in advance should
    be planned in order to protect the data of our
    system.
  • Implementation-There are stages for this process-
  • Commitment of the employees
  • Commitment of management
  • Commitment with organizational members
  • Post evaluation-Here the success of the process
    is determined from Pre-evaluation to
    implementation.

6
SYSTEM WHICH ARE AT MAJOR RISKS
  • The systems which are at major risks by cyber
    crime are goverment ,large corporation,consumer
    devices,financial systems etc.
  • Government -The government and military systems
    and sites are generally attacked by an authorised
    member or foreign powers in order to get
    information about a countrys security
    information and to get information about its
    people.
  • Large corporation-Commonly large corporations are
    targeted for financial gain of the hacker. It can
    be done by any person or Foreign power.
  • Consumer devices-The consumer devices are
    targeted by means of getting basic information,
    Card numbers,sensitive health information etc.

7
MOTIVE OF ATTACKERS
  • The motive of attackers can be different in every
    case. Some are criminals which are willing for
    financial gain, some are willing for someones
    basic information for their use. The military
    security is also targeted by the foreigners some
    time. The military security and banks are
    targeted mostly by hackers.

8
SECURITY MEASURES
  • There are some security measures which can be
    taken to protect data, information etc of a
    company or a personal computer.
  • Firewall is the common step that is taken
    nowadays for protecting the system for external
    agents.
  • User access account controls can protect the
    data and information of a system.
  • Intrusion Detection System is designed
    particularly for detecting any cyber attack in
    advance.

9
MAJOR CYBER ATTACKS
  • The South Korean nightmare
  • Alteryx data leak
  • Marriott Hotels privacy of customers
    compromised
  • Adult Friend Finder Exposed
  • Panic at Sony

10
The conclusion depicts that a large corporation,
government sites, military systems and personal
systems must be secured in order to protect the
information and data related to a customer,
military operation and basic information. For
more information visit Technology moon
Write a Comment
User Comments (0)
About PowerShow.com