cyber security - PowerPoint PPT Presentation

About This Presentation
Title:

cyber security

Description:

cyber security – PowerPoint PPT presentation

Number of Views:38
Slides: 13
Provided by: cybersecurity02
Category:
Tags:

less

Transcript and Presenter's Notes

Title: cyber security


1
CYBER SECURITY
2
INTRODUCTION
The internet in india is growing rapidly. There
are two sides to a coin. Internet also has it's
own disadvantages i'e is ciber crime which is the
illegal activity committed in the
internet. Cyber Crime is a crime committed
using a computer and the internet to steal a
person's identity or illegal imports and
malicious programs. Cyber security refers to
the technologies and processes designs to protect
computer networks and data from unauthorized
access and attacks delivered via internet by
cyber criminals. Though cyber security is
important for the network, data and application
security.
3
CYBER SECURITY
Cybersecurity is the practice of protecting
systems, networks, and programs from digital
attacks. These cyberattacks are usually aimed at
accessing, changing, or destroying sensitive
information extorting money from users via
ransomware or interrupting normal business
processes. Implementing effective cybersecurity
measures is particularly challenging today
because there are more devices than people, and
attackers are becoming more innovative.
4
TYPES OF CYBER SECURITY
Network Security It is the practice of securing a
computer network from intruders, whether targeted
attackers or opportunistic malware
Application Security It focuses on keeping
software and devices free of threats. A
compromised application could provide access to
the data its designed to protect. Successful
security begins in the design stage, well before
a program or device is deployed Information
Security It protects the integrity and privacy
of data, both in storage and in
transit. Operational Security It includes
the processes and decisions for handling and
protecting data assets. The permissions users
have when accessing a network and the procedures
that determine how and where data may be stored
or shared all fall under this umbrella.
5
Disaster recovery and business continuity It
defines how an organization responds to a
cyber-security incident or any other event that
causes the loss of operations or data. Disaster
recovery policies dictate how the organization
restores its operations and information to return
to the same operating capacity as before the
event. Business continuity is the plan the
organization falls back on while trying to
operate without certain resources.
End-user education addresses It the most
unpredictable cyber-security factor people.
Anyone can accidentally introduce a virus to an
otherwise secure system by failing to follow good
security practices. Teaching users to delete
suspicious email attachments, not plug in
unidentified USB drives, and various other
important lessons is vital for the security of
any organization.
6
  • Economy of mechanism
  • Fail-safe defaults
  • Least Privilege
  • Open Design
  • Complete mediation
  • Separation of Privilege
  • Least Common Mechanism
  • Psychological acceptability
  • Work Factor
  • Compromise Recording

PRINCIPLES OF CYBER SECURITY
7
How to ensure your security?
PHISHING
  • Be careful when going to any website by clicking
    on the link included in E-mail nor SMS.
  • Enter your Sensitive Data(like login credentials,
    Bank details, Personal details etc.) in secure
    website only.
  • Immediately respond to any unusual activity.

SNIFFING
  • Always use 'https' website URL instead of 'http'
  • Always see padlock sign in URL bar of browsing
    while visiting any website.
  • Connect to trusted network(wi-fi)

8
MALWARE ( MALICIOUS SOFTWARE)
  • Use good Anti-malware
  • Do not install application from untrusted
    publisher
  • Download software from official website
  • Use Ad-blocker while surfing the internet.
  • Never miss any update of your Operating system
    and Anti-virus software.

9
PASSWORD ATTACK
  • Make alpha numeric symbolic password.
  • Do not keep same password.
  • 8-Character string password can be hacked in less
    than 2.5 hours.
  • It is impossible to crack 25character string
    password.

DENIAL OF SERVICE ATTACK
  • This can be prevented by using strong firewall.
  • By using IP's and ID's.
  • By increasing your bandwidhth size

10
TYPES OF CYBER ATTACKS BY PERCENTAGE
11
TYPES OF SECURITY TOOLS
  • CVE, CWE, CVSS,OSWAP TOP 10, SANS TOP 25.
  • WIRESHARK DEMONSTARTION
  • NMAP DEMONSTARATION
  • NESSUS- VULNERABILITY ASESSMENT SCANNING TOOL

12
THANK YOU
Write a Comment
User Comments (0)
About PowerShow.com