Cyber Security
Cyber Security
Cyber Security
SECURITY
CIA | ATTACKS | DEFENCES
Table of
CONTENTS
01 02 03
Introduction CIA Triad Malware
04 05 06
Network attacks Other Attacks 3 A’s
07 08
Wireless Security Defence in Depth
What is Cyber Security
.
Trojan
Malware
- Viruses : Programs that attach themselves to legitimate
files and replicate when executed.
Utilize multiple
Overwhelm a system, making compromised devices to
it unavailable for legitimate flood a target, causing
users. severe disruption.
Zero-Day
Exploits
Phishing
Other Attacks
- Phishing: Deceptive emails or websites tricking users into revealing sensitive
information, such as login credentials.
SQL Social
injection Engineering - Man-in-the-Middle (MitM): Attackers intercept and alter communication
between two parties, potentially accessing confidential data.
+91 7983698800