1 / 37

Types of Cyber Attacks | 8 Most Common Cybersecurity Threats | Edureka

** CyberSecurity Certification Training: https://www.edureka.co/cybersecurity-certification-training **<br><br>This Edureka tutorial on "Cybersecurity Threats" will help you understand the types of cyber attacks that commonly plague businesses and how to tackle them and prevent them. Below are the topics covered in this tutorial: <br><br>1. 8 Most Common Cyber Threats <br>2. What the particular threat is <br>3. How the threat works <br>4. How to protect yourself <br><br>Cybersecurity Training Playlist: https://bit.ly/2NqcTQV

EdurekaIN
Télécharger la présentation

Types of Cyber Attacks | 8 Most Common Cybersecurity Threats | Edureka

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  2. Agenda 8 Common Cyber Threats What the particular threat is How the threat works How to Protect Yourself Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  3. Cybersecurity Threats Everywhere Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  4. Types of Cyberattacks Malware DDoS Phishing Password Attacks 02 01 03 04 Drive-By Download Man in the Middle Rogue Software Malvertising 06 05 07 08 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  5. Malware MALWARE Computer Virus Worms Spyware Trojan Horse Adware Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  6. How Malware Email Attachments Software Downloads OS Vulnerabilities Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  7. Stop Malware Suspicious Links Updated Firewall Updated OS o It’s also important to make sure your computer’s operating system (e.g. Windows, Mac OS X, Linux) uses the most up-to-date security updates o Updating your firewall constantly is a great idea o Stop clicking suspicious links o Firewalls prevent the transfer of large data files over the network in a hope to weed out attachments that may contain malware. oAlways study the URL consciously and make sure you are not on a counterfeit site o Software programmers update programs frequently to address any holes or weak points. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  8. Types of Cyberattacks Malware DDoS Phishing Password Attacks 02 01 03 04 Drive-By Download Man in the Middle Rogue Software Malvertising 06 05 07 08 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  9. Phishing Most of the attacks on financial institutions the past 3 years have NOT been through brute force attacks on firewall appliances, it has been through acquiring users’ passwords, this technique is called “Phishing” Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  10. What is phishing used for Stealing Confidential Data Harvesting Login Credential Impersonating Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  11. Phishing Awareness Always check the sender email address From Amazon<management@mazoncanada.ca> Account Detail Compromised Subject Dear client, Look out for common generalised addressing We have strong reasons to believe that your credentials may have been compromised and might have been used by someone else. We have locked your amazon account please click here to unlock. click here Always hover over links to check the redirect address Sincerely, Amazon Associate Team Reply Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  12. It’s time for a demo Copyright © 2018, edureka and/or its affiliates. All rights reserved.

  13. Types of Cyberattacks Malware DDoS Phishing Password Attacks 02 01 03 04 Drive-By Download Man in the Middle Rogue Software Malvertising 06 05 07 08 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  14. Password Attacks An attempt to obtain or decrypt a user's password for illegal use. Hackers can use cracking programs, dictionary attacks, and password sniffers in password attacks. Defence against password attacks is rather limited but usually consists of a password policy including a minimum length, unrecognizable words, and frequent changes. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  15. Types of Password Attacks Brute Force Attacks Dictionary Attacks Keylogger Attacks Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  16. Stop Password Attacks Update Password Use Alpha-Numeric NO Dictionary o It’s always a great idea to use a password that only makes sense to you o When setting a password general best practices should be followed o It’s always a great idea to keep changing essential passwords in regular intervals o Passwords which use actual words that make sense are much more susceptible to dictionary attacks o A password should contain a multitude of characters with a generous use of alpha numeric o Passwords shouldn’t be the same for everything Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  17. Types of Cyberattacks Malware DDoS Phishing Password Attacks 02 01 03 04 Drive-By Download Man in the Middle Rogue Software Malvertising 06 05 07 08 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  18. Distributed Denial of Service Distributed denial of service (DDoS) attacks are a subclass of denial of service (DoS) attacks. A DDoS attack involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  19. Packet Flooding Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  20. Prevention Traffic Analysis Traffic Control Recovery Management Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  21. Types of Cyberattacks Malware DDoS Phishing Password Attacks 02 01 03 04 Drive-By Download Man in the Middle Rogue Software Malvertising 06 05 07 08 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  22. Man in the Middle Man in the Middle Le You Banks Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  23. Prevent MITM Use encrypted WAP Always check the security of you connection(HSTS/HTTPS) Invest in a VPN Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  24. Types of Cyberattacks Malware DDoS Phishing Password Attacks 02 01 03 04 Drive-By Download Man in the Middle Rogue Software Malvertising 06 05 07 08 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  25. What is a Drive-by Download Drive-by download attacks occur when vulnerable computers get infected by just visiting a website. Findings from latest Microsoft Security Intelligence Report and many of its previous volumes reveal that Drive-by Exploits have become the top web security threat to worry about. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  26. Visiting a Site https://wordpress.myfashionblog.co Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  27. How it Works Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  28. Types of Cyberattacks Malware DDoS Phishing Password Attacks 02 01 03 04 Drive-By Download Man in the Middle Rogue Software Malvertising 06 05 07 08 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  29. Malvertising Malvertising is the name we in the security industry give to criminally-controlled adverts which intentionally infect people and businesses. These can be any ad on any site – often ones which you use as part of your everyday Internet usage. It is a growing problem, as is evidenced by a recent US Senate report, and the establishment of bodies like Trust In Ads. Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  30. How does it work https://www.fakesite.co Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  31. How does it work Redirect Malware Injection Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  32. Prevention Adblocker Regular Software Updates Common Sense Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  33. Types of Cyberattacks Malware DDoS Phishing Password Attacks 02 01 03 04 Drive-By Download Man in the Middle Rogue Software Malvertising 06 05 07 08 Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  34. Rogue Software Also called smitfraud, scareware, or rogue security software, this type of software is defined as malware - it is designed specifically to damage or disrupt a computer system. In this case, not only is the software going to disrupt your system, it's going to try and trick you into making a purchase using your credit card Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  35. Propogation Please update your software to protect yourself from unknown access! Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

  36. Prevention Updated Firewall Use Efficient Antivirus General Distrust Cybersecurity Certification Course www.edureka.co/cybersecurity-certification-training

More Related