[go: up one dir, main page]

0% found this document useful (0 votes)
4 views11 pages

Cyber Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 11

CYBER

SECURITY
CIA | ATTACKS | DEFENCES
Table of
CONTENTS

01 02 03
Introduction CIA Triad Malware

04 05 06
Network attacks Other Attacks 3 A’s

07 08
Wireless Security Defence in Depth
What is Cyber Security

Cybersecurity is the practice of defending


computers, servers, mobile devices, electronic
systems, networks, and data from malicious
attacks. It's also known as information
technology security or electronic information
security.
CIA Triad

Protecting sensitive Ensuring data remains Guaranteeing data and


information from accurate and unaltered. resources are accessible when
unauthorized access. This Techniques like hashing and needed. Redundancy and
includes encryption and checksums are used to disaster recovery plans are
access controls. detect tampering. crucial for maintaining
availability.

.
Trojan
Malware
- Viruses : Programs that attach themselves to legitimate
files and replicate when executed.

- Trojans : Disguised as legitimate software, they perform


unauthorized actions when run.
Ransomware Virus
- Worms : Self-replicating malware that spreads across
networks without user interaction.

- Ransomware : Encrypts data, demanding a ransom for


decryption. Can lead to data loss or financial damage.
Worms
Network Attacks

Utilize multiple
Overwhelm a system, making compromised devices to
it unavailable for legitimate flood a target, causing
users. severe disruption.
Zero-Day
Exploits
Phishing
Other Attacks
- Phishing: Deceptive emails or websites tricking users into revealing sensitive
information, such as login credentials.

- Social Engineering: Manipulating people into divulging confidential


information or performing actions that compromise security.

SQL Social
injection Engineering - Man-in-the-Middle (MitM): Attackers intercept and alter communication
between two parties, potentially accessing confidential data.

- SQL Injection: Exploiting vulnerabilities in web applications to gain


unauthorized access to databases.
Man in the middle

- Zero-Day Exploits: Leveraging unpatched vulnerabilities to launch attacks


before they're discovered and fixed.
3 A’s

Verifying the identity Granting or denying access Monitoring and recording


of users or systems, based on permissions and activities for auditing and
typically through role-based access control compliance purposes.
usernames, passwords, (RBAC).
and multifactor
authentication.
Wireless Security

Emphasizing the critical Utilize advanced Strengthen security with


nature of robust wireless encryption protocols, such two-factor authentication.
security measures. as WPA/WPA2. Enhance protection through
Highlighting the potential Implement strong and strategic network
risks linked with unique passwords to fortify segmentation.
unsecured wireless access.
networks. Regularly update Wi-Fi
access points to address
vulnerabilities.
Defense In Depth

Definition: Strengthening the Definition: Securing software


security of the operating system. applications.
Best Practices: Best Practices:
Regular updates and patch Regularly updating applications and
management. software.
Disabling unnecessary services. Disabling unnecessary features or
Configuring strong access controls. functionalities.
Implementing proper input validation to
thwart common exploits.
THANK YOU
ujjwalrajputofficial.in@gmail.com

+91 7983698800

You might also like