CYBER SECURITY
Presented by
M. Lakshana
R. Pooja
What is Cyber Security
Cyber Security is the
technology and process
that is designed to
protect networks and
devices from attack,
damage, or
unauthorized access
Motives behind cybercrime
Industrial
Espionage
Asking company for
Ransom
Selling the information to
criminals
Importance of Cyber Security
In today's interconnected world, cybersecurity is paramount for
individuals and organizations alike. It safeguards sensitive data,
ensures operational continuity, protects financial assets, and
maintains public trust.
1 Data Protection 2 Business Continuity
Cybersecurity safeguards By preventing
sensitive information, like cyberattacks and data
personal data, financial breaches, cybersecurity
records, and intellectual ensures that businesses
property, from can operate smoothly and
unauthorized access and without disruption.
theft.
3 Financial Security 4 Reputation Management
Cybersecurity protects A strong cybersecurity
against financial fraud, posture helps maintain
identity theft, and other public trust and protects
financial losses that can an organization's
result from cyberattacks. reputation in the face of
potential cyberattacks.
Common Cyber Threats
Cybercriminals employ a variety of methods to target
individuals and organizations. Understanding
common cyber threats is crucial for building effective
defenses.
Malware Phishing
Malicious software, Phishing attacks
such as viruses, attempt to trick users
worms, and into revealing sensitive
ransomware, can information, such as
damage systems, steal login credentials or
data, and disrupt credit card details,
operations. through deceptive
emails or websites.
Denial-of-Service AttacksSocial Engineering
DoS attacks Social engineering
overwhelm a system exploits human
with traffic, making it psychology to
unavailable to manipulate individuals
legitimate users. into granting access to
sensitive data or
systems.
How cyber security works ?
• Enabling two-factor authentication for added account
2-Way Authentication security.
Secure Passwords • Using strong, unique passwords for each account.
•
Regular Updates Keeping software and operating systems up-to-date to
patch vulnerabilities.
•
Antivirus Employing antivirus software to detect and remove
malware.
Firewall • Using a firewall to block unauthorized network access.
•
No Phishing Recognizing and avoiding phishing attempts like
suspicious emails.
• Implementing encryption methods to protect data
Cryptography (encryption) confidentiality.
•
Secure DNS Utilizing a secure DNS service to prevent DNS spoofing
and protect privacy.
Network Security Strategies
Securing your network infrastructure is essential to protect your data and systems from cyberattacks. Implementing a multi-layered approach strengthen
1 Firewalls
Firewalls act as barriers between your network and the external world, blocking unauthorized access and malicious traffic.
2 Intrusion Detection Systems (IDS)
IDS monitor network traffic for suspicious activity and alert administrators to potential threats.
3 Intrusion Prevention Systems (IPS)
IPS go beyond detection and take active steps to block malicious traffic and prevent attacks.
4 Virtual Private Networks (VPNs)
VPNs create a secure and encrypted connection over a public network, protecting data transmitted between devices.
5 Network Segmentation
Dividing a network into smaller segments can limit the impact of a breach, preventing attackers from gaining access to sensitive data.
Access Control and Identity Management
Access control and identity management are crucial for ensuring that only authorized users can access sensitive da
Authentication
Verifies the identity of users before granting access to systems and resources.
Authorization
Determines which actions a user is allowed to perform within a system or network.
Account Management
Encompasses the creation, modification, and termination of user accounts, ensuring proper access levels an
Password Policies
Establish rules for creating strong passwords, ensuring their complexity and regular rotation.
Multi-Factor Authentication (MFA)
Requires users to provide multiple forms of identification, such as a password and a security token, to gain
Benefits of Cyber Security
Protection of Increase Inspires customer
your business Productivity confidence
Stops your website Protection for your
from crashing customers or clients
Types of Hackers
White hat
Script Kiddie
hacker
Types of
hackers
Black hat
Hacktivist
hacker
Red hat Gray hat
hacker hacker
Emerging Cyber Threats and
Trends
The cyber threat landscape is constantly evolving,
with new technologies and vulnerabilities emerging
regularly. Staying informed about emerging threats is
crucial for adapting security practices.
Artificial Intelligence (AI) Cloud Computing
AI can be used by both The increasing adoption
attackers and defenders of cloud services creates
to automate tasks and new challenges for
enhance cyberattacks. security, as data is stored
and processed in remote
environments.
Internet of Things (IoT) Ransomware Attacks
The proliferation of Ransomware attacks have
connected devices become increasingly
increases the attack sophisticated and target
surface, as IoT devices critical infrastructure and
often lack robust security businesses.
measures.
Cybersecurity Careers and
Certifications
A career in cybersecurity offers a wide range of opportunities
for individuals with technical skills and an interest in protecting
digital assets.
1 Security Analyst 2 Ethical Hacker
Ethical hackers use their
Security analysts monitor
skills to test systems for
networks and systems for
vulnerabilities and identify
suspicious activity, investigate
security weaknesses before
security incidents, and
malicious actors exploit
implement security controls.
them.
3 Penetration Tester 4 Security Engineer
Penetration testers simulate real-world Security engineers design,
attacks to assess an organization's implement, and maintain
security posture and identify potential security systems and
vulnerabilities. infrastructure.