Title: cyber security
1CYBER SECURITY
2INTRODUCTION
The internet in india is growing rapidly. There
are two sides to a coin. Internet also has it's
own disadvantages i'e is ciber crime which is the
illegal activity committed in the
internet. Cyber Crime is a crime committed
using a computer and the internet to steal a
person's identity or illegal imports and
malicious programs. Cyber security refers to
the technologies and processes designs to protect
computer networks and data from unauthorized
access and attacks delivered via internet by
cyber criminals. Though cyber security is
important for the network, data and application
security.
3CYBER SECURITY
Cybersecurity is the practice of protecting
systems, networks, and programs from digital
attacks. These cyberattacks are usually aimed at
accessing, changing, or destroying sensitive
information extorting money from users via
ransomware or interrupting normal business
processes. Implementing effective cybersecurity
measures is particularly challenging today
because there are more devices than people, and
attackers are becoming more innovative.
4TYPES OF CYBER SECURITY
Network Security It is the practice of securing a
computer network from intruders, whether targeted
attackers or opportunistic malware
Application Security It focuses on keeping
software and devices free of threats. A
compromised application could provide access to
the data its designed to protect. Successful
security begins in the design stage, well before
a program or device is deployed Information
Security It protects the integrity and privacy
of data, both in storage and in
transit. Operational Security It includes
the processes and decisions for handling and
protecting data assets. The permissions users
have when accessing a network and the procedures
that determine how and where data may be stored
or shared all fall under this umbrella.
5Disaster recovery and business continuity It
defines how an organization responds to a
cyber-security incident or any other event that
causes the loss of operations or data. Disaster
recovery policies dictate how the organization
restores its operations and information to return
to the same operating capacity as before the
event. Business continuity is the plan the
organization falls back on while trying to
operate without certain resources.
End-user education addresses It the most
unpredictable cyber-security factor people.
Anyone can accidentally introduce a virus to an
otherwise secure system by failing to follow good
security practices. Teaching users to delete
suspicious email attachments, not plug in
unidentified USB drives, and various other
important lessons is vital for the security of
any organization.
6- Economy of mechanism
- Fail-safe defaults
- Least Privilege
- Open Design
- Complete mediation
- Separation of Privilege
- Least Common Mechanism
- Psychological acceptability
- Work Factor
- Compromise Recording
PRINCIPLES OF CYBER SECURITY
7How to ensure your security?
PHISHING
- Be careful when going to any website by clicking
on the link included in E-mail nor SMS. - Enter your Sensitive Data(like login credentials,
Bank details, Personal details etc.) in secure
website only. - Immediately respond to any unusual activity.
SNIFFING
- Always use 'https' website URL instead of 'http'
- Always see padlock sign in URL bar of browsing
while visiting any website. - Connect to trusted network(wi-fi)
8MALWARE ( MALICIOUS SOFTWARE)
- Use good Anti-malware
- Do not install application from untrusted
publisher - Download software from official website
- Use Ad-blocker while surfing the internet.
- Never miss any update of your Operating system
and Anti-virus software.
9PASSWORD ATTACK
- Make alpha numeric symbolic password.
- Do not keep same password.
- 8-Character string password can be hacked in less
than 2.5 hours. - It is impossible to crack 25character string
password.
DENIAL OF SERVICE ATTACK
- This can be prevented by using strong firewall.
- By using IP's and ID's.
- By increasing your bandwidhth size
10TYPES OF CYBER ATTACKS BY PERCENTAGE
11TYPES OF SECURITY TOOLS
- CVE, CWE, CVSS,OSWAP TOP 10, SANS TOP 25.
- WIRESHARK DEMONSTARTION
- NMAP DEMONSTARATION
- NESSUS- VULNERABILITY ASESSMENT SCANNING TOOL
12THANK YOU