SlideShare uma empresa Scribd logo
1 de 19
CYBER SECURITY
WHAT IS A CYBER SECURITY
• Cyber security is the application of technologies , processes
and controls to protect systems , networks , programs ,
devices and data from cyber attacks.
• Cyber security aims to reduce the risks of cyber attacks and
protect against the unauthorized exploitation of systems ,
networks and technologies.
• It is also known as information technology or electronic
information security
• The term applies in a variety of contexts , from
business to mobile computing , and can be divided
into a few common categories.
1. Network security
2. Application security
3. Information security
4. Operational security
• Network security is the practice of securing a computer
network from intruders , whether targeted attackers or
opportunistic malware.
• Application security focuses on keeping software and
devices free of threats. A compromised application could
provide access to the data its designed to protect. Successful
security begins in the design stage , well before a program or
device is deployed.
• Information security protects the integrity and privacy of
data , both in storage and in transit.
• Operational security includes the processes and decisions
for handling and protecting data assets. The permissions users
have when accessing a network and the producers that
TYPES OF CYBER THREATS
• The threats countered by cyber-security are three-fold:
• 1. Cybercrime includes single actors or groups targeting systems for
financial gain or to cause disruption.
• 2. Cyber-attack often involves politically motivated information
gathering.
• 3. Cyberterrorism is intended to undermine electronic systems to
cause panic or fear.
PHISHING
 Phishing is a type of social engineering where
an attacker sends a fraudulent (e.g., spoofed,
fake, or otherwise deceptive) message
designed to trick a human victim into
revealing sensitive information to the attacker
or to deploy malicious software on the victim's
infrastructure like ransomware.
 It is usually done through email. The goal is to
steal sensitive data like credit card and login
information, or to install malware on the victim's
machine.
PASSWORD
ATTACKS
A password attack refers to any of the
various methods used to maliciously
authenticate into password-protected
accounts
These attacks are typically facilitated through
the use of software that expedites cracking or
guessing passwords.
DISTRIBUTED DENIAL OF
SERVICE
 DDoS (Distributed Denial of Service) is a category
of malicious cyber-attacks that hackers or
cybercriminals employ in order to make an online
service, network resource or host machine
unavailable to its intended users on the Internet.
ROGUE SECURITY
 Rogue security software is a form of malicious
software and internet fraud that misleads users into
believing there is a virus on their computer and aims
to convince them to pay for a fake malware removal
tool that actually installs malware on their computer
 Rogue security software mainly relies on social
engineering (fraud) to defeat the security built into
modern operating system and browser software and
install itself onto victims' computers.
MAN IN THE MIDDLE
 A perpetrator positions himself in a
conversation between a user and an
application—either to eavesdrop or to
impersonate one of the man in the middle
(MITM) attack is a general term for when a
parties, making it appear as if a normal
exchange of information is underway.
DRIVE BY DOWNLOAD
 A drive-by download refers to the unintentional
download of malicious code onto a computer or
mobile device that exposes users to different types
of threats.
 The malicious code is designed to download
malicious files onto the victim's PC without the user
being aware that anything untoward has happened.
MALVERTISING
Malvertising is an attack in which
perpetrators inject malicious code into
legitimate online advertising networks.
The code typically redirects users to
malicious websites.
MALWARE
• Malware means malicious software. One of the most common cyber
threats, malware is software that a cybercriminal or hacker has
created to disrupt or damage a legitimate user’s computer. Often
spread via an unsolicited email attachment or legitimate-looking
download, malware may be used by cybercriminals to make money or
in politically motivated cyber-attacks.
• There are a number of different types of malware, including:
• Virus: A self-replicating program that attaches itself to clean file and
spreads throughout a computer system, infecting files with malicious
code.
• Trojans: A type of malware that is disguised as legitimate software.
Cybercriminals trick users into uploading Trojans onto their computer
• Spyware: A program that secretly records what a user does, so that
cybercriminals can make use of this information. For example,
spyware could capture credit card details.
• Ransomware: Malware which locks down a user’s files and data, with
the threat of erasing it unless a ransom is paid.
• Adware: Advertising software which can be used to spread malware.
• Botnets: Networks of malware infected computers which
cybercriminals use to perform tasks online without the user’s
permission.
BENEFITS FOR CYBER SECURITY
• Valuable information protection.
• Evade loss of crucial data.
• Risk mitigation.
• Privacy of customer and employee is ensured.
• Recovery time is improved.
• It will help us to browse the various websites securely.
• It will defend us from hacks and virus.
DISADVANTAGES OF CYBER SECURITY
• Firewalls can be difficult to configure correctly.
• Incorrectly configured firewalls may block users from
performing certain actions on the internet , until the firewall
configured correctly.
• Makes the system slower than before.
• Need to keep updating the new software in order to keep
security up to date.
• Lack of knowledge and not easy to use.
• To use this special expertise required.
cyber security

Mais conteúdo relacionado

Mais procurados

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityAkash Dhiman
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedProf .Pragati Khade
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation sweetpeace1
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awarenessRishab garg
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 

Mais procurados (20)

Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
cyber security
cyber securitycyber security
cyber security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
cyber security
cyber securitycyber security
cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-convertedCybersecurity 140713064844-phpapp01 (1)-converted
Cybersecurity 140713064844-phpapp01 (1)-converted
 
Cyber security presentation
Cyber security presentation Cyber security presentation
Cyber security presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security & awareness
Cyber security & awarenessCyber security & awareness
Cyber security & awareness
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 

Semelhante a cyber security

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber SecurityBalwantBesra
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfsrtwgwfwwgw
 
презентация1
презентация1презентация1
презентация1sagidullaa01
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 

Semelhante a cyber security (20)

Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdfImplications of Computer Misuse and Cyber Security (Teaching) (1).pdf
Implications of Computer Misuse and Cyber Security (Teaching) (1).pdf
 
презентация1
презентация1презентация1
презентация1
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer security and
Computer security andComputer security and
Computer security and
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Infocrimeppt
InfocrimepptInfocrimeppt
Infocrimeppt
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
IT Security.pdf
IT Security.pdfIT Security.pdf
IT Security.pdf
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 

Último

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 

Último (20)

Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 

cyber security

  • 2.
  • 3. WHAT IS A CYBER SECURITY • Cyber security is the application of technologies , processes and controls to protect systems , networks , programs , devices and data from cyber attacks. • Cyber security aims to reduce the risks of cyber attacks and protect against the unauthorized exploitation of systems , networks and technologies. • It is also known as information technology or electronic information security
  • 4. • The term applies in a variety of contexts , from business to mobile computing , and can be divided into a few common categories. 1. Network security 2. Application security 3. Information security 4. Operational security
  • 5. • Network security is the practice of securing a computer network from intruders , whether targeted attackers or opportunistic malware. • Application security focuses on keeping software and devices free of threats. A compromised application could provide access to the data its designed to protect. Successful security begins in the design stage , well before a program or device is deployed. • Information security protects the integrity and privacy of data , both in storage and in transit. • Operational security includes the processes and decisions for handling and protecting data assets. The permissions users have when accessing a network and the producers that
  • 6. TYPES OF CYBER THREATS • The threats countered by cyber-security are three-fold: • 1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption. • 2. Cyber-attack often involves politically motivated information gathering. • 3. Cyberterrorism is intended to undermine electronic systems to cause panic or fear.
  • 7.
  • 8. PHISHING  Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware.  It is usually done through email. The goal is to steal sensitive data like credit card and login information, or to install malware on the victim's machine.
  • 9. PASSWORD ATTACKS A password attack refers to any of the various methods used to maliciously authenticate into password-protected accounts These attacks are typically facilitated through the use of software that expedites cracking or guessing passwords.
  • 10. DISTRIBUTED DENIAL OF SERVICE  DDoS (Distributed Denial of Service) is a category of malicious cyber-attacks that hackers or cybercriminals employ in order to make an online service, network resource or host machine unavailable to its intended users on the Internet.
  • 11. ROGUE SECURITY  Rogue security software is a form of malicious software and internet fraud that misleads users into believing there is a virus on their computer and aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer  Rogue security software mainly relies on social engineering (fraud) to defeat the security built into modern operating system and browser software and install itself onto victims' computers.
  • 12. MAN IN THE MIDDLE  A perpetrator positions himself in a conversation between a user and an application—either to eavesdrop or to impersonate one of the man in the middle (MITM) attack is a general term for when a parties, making it appear as if a normal exchange of information is underway.
  • 13. DRIVE BY DOWNLOAD  A drive-by download refers to the unintentional download of malicious code onto a computer or mobile device that exposes users to different types of threats.  The malicious code is designed to download malicious files onto the victim's PC without the user being aware that anything untoward has happened.
  • 14. MALVERTISING Malvertising is an attack in which perpetrators inject malicious code into legitimate online advertising networks. The code typically redirects users to malicious websites.
  • 15. MALWARE • Malware means malicious software. One of the most common cyber threats, malware is software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer. Often spread via an unsolicited email attachment or legitimate-looking download, malware may be used by cybercriminals to make money or in politically motivated cyber-attacks. • There are a number of different types of malware, including: • Virus: A self-replicating program that attaches itself to clean file and spreads throughout a computer system, infecting files with malicious code. • Trojans: A type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading Trojans onto their computer
  • 16. • Spyware: A program that secretly records what a user does, so that cybercriminals can make use of this information. For example, spyware could capture credit card details. • Ransomware: Malware which locks down a user’s files and data, with the threat of erasing it unless a ransom is paid. • Adware: Advertising software which can be used to spread malware. • Botnets: Networks of malware infected computers which cybercriminals use to perform tasks online without the user’s permission.
  • 17. BENEFITS FOR CYBER SECURITY • Valuable information protection. • Evade loss of crucial data. • Risk mitigation. • Privacy of customer and employee is ensured. • Recovery time is improved. • It will help us to browse the various websites securely. • It will defend us from hacks and virus.
  • 18. DISADVANTAGES OF CYBER SECURITY • Firewalls can be difficult to configure correctly. • Incorrectly configured firewalls may block users from performing certain actions on the internet , until the firewall configured correctly. • Makes the system slower than before. • Need to keep updating the new software in order to keep security up to date. • Lack of knowledge and not easy to use. • To use this special expertise required.