1 / 31

Introduction to Cyber Security

Cyber Security,Hackers etc

Sethi
Télécharger la présentation

Introduction to Cyber Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Presented by: Sumayya Shafiq

  2. What is Cyber Security? • Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. • It's also known as information technology security or electronic information security.

  3. To Understand What is the meaning of word “CYBER” What is the need of Cyber Security Why we learn Cyber Security? What are the security problems in cyber field?

  4. Meaning of the word ‘’CYBER’’ • Cyber came from cybernetics • relating to or characteristic of the culture of computers, information technology, and virtual reality. • It is combining form relating to information technology, the internet and virtual reality.

  5. Why we need Cyber Security? Cyber Security is necessary since it helps in securing data from threats such as data theft or misuse, also safeguards your system from viruses.

  6. Major security problems • Virus (A computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and performs malicious actions) • Hacker • Malware (is any piece of software that was written with the intent of damaging devices.) • Trojan Horse (is any malware which misleads users of its true intent) • Password cracking

  7. Why we should learn Cyber Security? • An Evergreen Industry • Increase in cyber crimes • Lack of Cyber professionals • A chance to work with secret agencies • Unlimited Potential for Personal Growth

  8. How Cyber Security work? Securing Computer Firewall 2-way Authentication No phishing Secure Passwords Regular Updates Cryptography Securing DNS Antivirus

  9. 2-way Authentication • Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication, is a security process in which users provide two different authentication factors to verify themselves.

  10. Secure password

  11. Regular updates • Regularly updating the software on your computer and other devices is one of the easiest ways to protect yourself from cyber threats. • Operating systems have many built-in functions to help prevent attacks. •  Cyber threats are constantly changing. That’s why operating system providers regularly offer operating system updates.

  12. Antivirus • Antivirus software is a vital component of your overall online and computer security strategy in its protection against data and security breaches along with other threats.

  13. Firewall • A firewall is a type of cybersecurity tool that is used to filter traffic on a network. • The primary goal of a firewall is to block malicious traffic requests and data packets.

  14. No-phishing • Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need.

  15. Cryptography • Cryptography converts data into a format that is unreadable for an unauthorized user, allowing it to be transmitted without unauthorized entities decoding it back into a readable format, thus compromising the data.

  16. Securing DNS • A secure DNS is the critical link to the IT infrastructure of an organization, and if the DNS is not secure, nothing is. • Companies should protect the DNS with genuinely secure DNS servers. Most of these DNS servers are purpose-built for security, immune to malware, and self-protecting against DDoS attacks.  What is DNS? https://www.cloudflare.com/learning/dns/what-is-dns/

  17. CIA Confidentiality, Integrity, and Availability have served as the industry standard for Computer Security since the time of 1st mainframes.

  18. CIA The principles of confidentiality asserts that information and function can be accessed only by authorized parties. E.g. Military Secrets

  19. CIA The principles of integrity assert that information and functions can be added, altered or removed only by authorized people means. E.g. incorrect data entered by a user in the database.

  20. CIA The principle of availability assert that system, functions and data must be available on demand according to agreed-upon parameters based on levels of service.

  21. Threats to CIA Cybercrime Hacking

  22. Cyber Crime • Global problem. • It is a criminal activity committed on internet. • Where computer is either a tool or target or both. • Most cybercrimes are carried out in order to generate profit for the Cyber criminals.

  23. Types of Cyber Crimes

  24. Hackers • A person who uses computers to gain unauthorized access to data. OR • A person or thing that hacks or cuts roughly.

  25. Types of Hackers Black Hat Hackers Gray Hat Hackers White Hat Hackers

  26. Black Hat Hackers • Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information. • Black Hat hacking is always illegal because of its bad intent which includes stealing corporate data, violating privacy, damaging the system, blocking network communication, etc.

  27. White Hat Hackers • White Hat hackers are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments. • Ethical hacking is not illegal and it is one of the demanding jobs available in the IT industry. There are numerous companies that hire ethical hackers for penetration testing and vulnerability assessments.

  28. Grey Hat Hackers • Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge. • Their intent is to bring the weakness to the attention of the owners and getting appreciation or a little bounty from the owners.

  29. Who is Cyber Security Experts?

  30. Advantages Protection from viruses Protection of your Business Protection from data theft Protection from hackers Reduces computer crashes Gives Privacy to Users

  31. Conclusion I hope that my presentation will be helpful for my audience to improve their knowledge about cyber security and to overcome several security loopholes on their computer operation. Also it helps to spread awareness among normal people about emerging security threats. Thank you!

More Related