ppt rf
ppt rf
ppt rf
—Bruce Schneier
TABLE OF CONTENTS
01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES
04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
01
INTRODUCTION
To Cyber Security
INTRODUCTION TO CYBER SECURITY
System-
based
attacks
TABLE OF CONTENTS
01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES
04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
02
WAYS TO PROTECT
Yourself and Your
Organization
WAYS TO PROTECT YOURSELF
Install reputable
antivirus software and
keep it up to date to
protect against malware
INSTALL and other cyber threats.
ANTIVIRUS
SOFTWARE
WAYS TO PROTECT YOURSELF
Implement multi-factor
authentication on all
accounts to provide an
IMPLEMENT extra
MULTI-FACTOR layer of security.
AUTHENTICATION
TABLE OF CONTENTS
01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES
04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
03
THREATS AND
TYPES
OF Cyber Security
TYPES OF CYBER THREATS
MALWARE FORMJACKING
Ransomware, Botnet Inserts malicious
Software, Rats, code into online
Spyware, Trojans, forms.
Viruses, And Worms.
DNS name
(Domain DDoS
(Distributed denial-of-
system) poisoning service) attacks, which
attacks, which flood servers, systems,
compromise the DNS and networks with
to redirect traffic traffic to knock them
to malicious sites. offline.
WHAT ARE THE FIVE TYPES OF CYBER SECURITY?
CYBER SECURITY
Critical
Infrastructure
01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES
04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
04
LEGAL RIGHTS &
DIFFERENCE
DIFFECENCE
Information
Cyber security
security
● Cyber security is often ● Information security
confused with is a broader category
information security. that protects all
● Cyber security focuses information assets,
on protecting computer whether in hard copy
systems from or digital form.
unauthorized access or
being otherwise damaged
or made inaccessible.
The legal
requirement
for cyber
security
The GDPR and DPA 2018
require organizations to
implement appropriate
security measures to
protect personal data.
TABLE OF CONTENTS
01 02 03
WAYS TO THREATS AND
INTRODUCTION
PROTECT TYPES
04 05
LEGAL RIGHTS CONSEQUENCES &
& DIFFERENCE CHALLENGES
05
CONSEQUENCES
& CHALLENGES
OF Cyber Security
WHAT ARE THE CONSEQUENCES OF A CYBER ATTACK?
• Damage to IT
infrastructure or hardware
• Potential harm to
individuals
• Increased insurance
premiums and security costs
WHAT ARE THE CONSEQUENCES OF A CYBER ATTACK?
• Damage to IT
infrastructure or hardware
• Potential harm to
individuals
• Increased insurance
premiums and security costs
WHAT ARE THE CONSEQUENCES OF A CYBER ATTACK?
• Damage to IT
infrastructure or hardware
• Potential harm to
individuals
• Increased insurance
premiums and security costs
CHALLENGES OF CYBER SECURITY
• Legacy systems
and software that
may not be • Complexity of
• Rapidly evolving modern IT
properly patched
and sophisticated environments,
or updated,
cyber threats and including cloud,
creating
attack techniques mobile, and IoT
vulnerabilities
devices
• Shortage of
• Business
skilled cyber • Growing volume
priorities
security and diversity of
leading to
professionals and data, making it
inadequate
resources harder to protect
investment in
cyber security sensitive
measures information
Referenc
e 1. GFG (www.gfg.com)
2. JavaTpoint (javatpoint.com)
3. Tutorianpoint (tutorialpoint.com)