SlideShare una empresa de Scribd logo
1 de 13
DETECTING AND MITIGATING CYBER THREATS AND ATTACKS
NAME: N Dhruva Theja
Roll No:321710301040
SUMMER INTERNSHIP
1
CONTENTS:
I. INTRODUCTION
II. THREATS
III. TYPES OF THREATS
IV. ATTACKS
V. TYPES OF ATTACKS
VI. DETCTION TECHONOLOGIES
VII. MITIGATING THREATS AND ATTACKS
2
Detecting and Mitigating threats and attacks means:
 Threat detection is the practice of analyzing the entirety of a security ecosystem
to identify any malicious activity that could compromise the network. If a threat is
detected, then mitigation efforts must be enacted to properly neutralize the
threat before it can exploit any present vulnerabilities.
3
THREATS:
 A cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt
digital life in general.
 TYPES OF THREATS
 Ransomware
 Phishing
 Data Leakage
 Insider Threat
4
RANSOMWARE:
 Ransomware is a malicious software that infects your
computer and display messages demanding a fee to be
paid in order for your system to work again.
 This class of malware is a moneymaking scheme that
can be installed through links in a e-mail messages.
PHISHING:
Phishing is the fraudulent attempt to obtain sensitive information or data,
such as usernames, passwords and credit card details,
by disguising oneself as a trustworthy entity in an
electronic communication.
5
DATA LEAKAGE:
 Data leakage threats usually occur via the web and email,
but can also occur via mobile data storage devices such
as optical media, USB keys, and laptops.
INSIDER THREAT:
An insider threat is a security risk that originates from within the targeted organization.
It typically involves a current or former employee or
business associate who has access to sensitive information
or privileged accounts within the network of an organization,
and who misuses this access
6
ATTACKS:
 A cyber attack can maliciously disable computers, steal data, or use a breached computer
as a launch point for other attacks.
 TYPES OF ATTACKS
 Password Attack
 Malware Attack
7
PASSWORD ATTACK:
 A password attack is exactly what it sounds like: a third party trying to gain access to your
systems by cracking a user's password.
 HOW DO HACKERS KNOW YOUR PASSWORD ?
 Your passwords are stored in secure systems by using some
 special algorithms known as "hashing."
 Hackers try to access these passwords using different techniques,
the most popular one is called a "Dictionary attack,“
where the computer tries over and over again.
8
MALWARE:
 Malware is intrusive software that is designed to damage and destroy computers and computer
systems. Malware is a contraction for “malicious software.”
 TYPES OF MALWARE
 VIRUSES
 BOTS&BOTNETS
How does Malware Occurs?
 Malware infection occurs when malware, or malicious
software,infiltrates your computer.stealing private information
or spying on a computer without the consent of the user.
9
DETECTING THEREATS AND ATTACKS:
 WHAT IS THREAT DETECTION ?
 Threat detection is the process by which you find threats on your network, your systems
or your applications. The idea is to detect threats before they are exploited as attacks.
 HOW TO DETECT THREATS?
 DETECTION TECHONOLOGIES
Intrusion detection systems
 Network firewalls
 Honeypots
10
Intrusion detection
systems: An appliance or service that monitors network traffic for malicious activity.
 Pros: Good for detecting threats introduced via the network itself.
 Cons: Limited in scope and will not detect endpoint or cloud threats. Requires an
intrusion prevention system (IPS) to block threats.
 NETWORK FIREWALLS:
 A physical or virtual appliance that monitors traffic for malicious activity or access and
takes appropriate action.
 Pros: Good for detecting and blocking threats via the network itself.
 Cons: Limited in scope and will not detect endpoint or cloud threats.
11
HONEYPOTS:
 A network-attached system set up as a decoy to expose threats against an
organization.
 Pros: Advanced visibility of threats against applications or resources.
 Cons: Limited in scope the specific honeypots that are deployed. If
discovered by an attacker, honeypots can be circumvented.
MITIGATING CYBER THREATS:
 Keep Software Up-to-Date
Install Anti-Virus Protection Software
Back Up Critical Data
Implement Multi-Factor Authentication
12
THANK
YOU!!
13

Más contenido relacionado

La actualidad más candente

What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?AariyaRathi
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Securitypadmeshagrekar
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomwareOsirium Limited
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?EC-Council
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Break the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent ThreatsBreak the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent ThreatsInspirisys Solutions Limited
 

La actualidad más candente (19)

What is threat intelligence ?
What is threat intelligence ?What is threat intelligence ?
What is threat intelligence ?
 
Cyber security
Cyber securityCyber security
Cyber security
 
Portfolio 7
Portfolio 7Portfolio 7
Portfolio 7
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Types of Attack in Information and Network Security
Types of Attack in Information and Network SecurityTypes of Attack in Information and Network Security
Types of Attack in Information and Network Security
 
Computer security
Computer securityComputer security
Computer security
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomware
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Windows network security
Windows network securityWindows network security
Windows network security
 
What's new in​ CEHv11?
What's new in​  CEHv11?What's new in​  CEHv11?
What's new in​ CEHv11?
 
Spyware
SpywareSpyware
Spyware
 
Malware
MalwareMalware
Malware
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Break the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent ThreatsBreak the chain - 7 phases of Advanced Persistent Threats
Break the chain - 7 phases of Advanced Persistent Threats
 
Online safety
Online safety Online safety
Online safety
 

Similar a Detecting and mitigating cyber threats and attacks1

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measuresshraddhazad
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Debabrata Singh
 

Similar a Detecting and mitigating cyber threats and attacks1 (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber crime , threats and their security measures
Cyber crime , threats and their security measuresCyber crime , threats and their security measures
Cyber crime , threats and their security measures
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Malware
MalwareMalware
Malware
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber security
Cyber security Cyber security
Cyber security
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 
Computer security
Computer securityComputer security
Computer security
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 

Último

Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...gynedubai
 
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...ZurliaSoop
 
Complete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul WarshauerComplete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul WarshauerPaul Warshauer
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxsportsworldproductio
 
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfMiletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfGabrielaMiletti
 
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证eqaqen
 
drug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstingsdrug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstingsKarishma7720
 
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制yynod
 
B.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak KumarB.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak KumarDeepak15CivilEngg
 
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证eqaqen
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfKen Fuller
 
Launch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's GuideLaunch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's GuideKaziFaisalAlam
 
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfB.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfDeepak15CivilEngg
 
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制yynod
 
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime MalegaonVip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaonmeghakumariji156
 

Último (20)

Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Sagar [ 7014168258 ] Call Me For Genuine Models We ...
 
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Shimla [ 7014168258 ] Call Me For Genuine Models We...
 
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
<DUBAI>Abortion pills IN UAE {{+971561686603*^Mifepristone & Misoprostol in D...
 
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
Jual obat aborsi Jakarta ( 085657271886 )Cytote pil telat bulan penggugur kan...
 
Complete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul WarshauerComplete Curriculum Vita for Paul Warshauer
Complete Curriculum Vita for Paul Warshauer
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Shillong [ 7014168258 ] Call Me For Genuine Models ...
 
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdfMiletti Gabriela_Vision Plan for artist Jahzel.pdf
Miletti Gabriela_Vision Plan for artist Jahzel.pdf
 
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Rampur [ 7014168258 ] Call Me For Genuine Models We...
 
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
一比一定(购)中央昆士兰大学毕业证(CQU毕业证)成绩单学位证
 
drug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstingsdrug book file on obs. and gynae clinical pstings
drug book file on obs. and gynae clinical pstings
 
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制
怎样办理伊利诺伊大学厄巴纳-香槟分校毕业证(UIUC毕业证书)成绩单学校原版复制
 
B.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak KumarB.tech civil major project by Deepak Kumar
B.tech civil major project by Deepak Kumar
 
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
一比一定(购)堪培拉大学毕业证(UC毕业证)成绩单学位证
 
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdfreStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
reStartEvents 5:9 DC metro & Beyond V-Career Fair Employer Directory.pdf
 
Launch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's GuideLaunch Your Research Career: A Beginner's Guide
Launch Your Research Career: A Beginner's Guide
 
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdfB.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
B.tech Civil Engineering Major Project by Deepak Kumar ppt.pdf
 
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
Cara Gugurkan Kandungan Awal Kehamilan 1 bulan (087776558899)
 
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制
怎样办理宾夕法尼亚大学毕业证(UPenn毕业证书)成绩单学校原版复制
 
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime MalegaonVip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
Vip Malegaon Escorts Service Girl ^ 9332606886, WhatsApp Anytime Malegaon
 

Detecting and mitigating cyber threats and attacks1

  • 1. DETECTING AND MITIGATING CYBER THREATS AND ATTACKS NAME: N Dhruva Theja Roll No:321710301040 SUMMER INTERNSHIP 1
  • 2. CONTENTS: I. INTRODUCTION II. THREATS III. TYPES OF THREATS IV. ATTACKS V. TYPES OF ATTACKS VI. DETCTION TECHONOLOGIES VII. MITIGATING THREATS AND ATTACKS 2
  • 3. Detecting and Mitigating threats and attacks means:  Threat detection is the practice of analyzing the entirety of a security ecosystem to identify any malicious activity that could compromise the network. If a threat is detected, then mitigation efforts must be enacted to properly neutralize the threat before it can exploit any present vulnerabilities. 3
  • 4. THREATS:  A cyber security threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general.  TYPES OF THREATS  Ransomware  Phishing  Data Leakage  Insider Threat 4
  • 5. RANSOMWARE:  Ransomware is a malicious software that infects your computer and display messages demanding a fee to be paid in order for your system to work again.  This class of malware is a moneymaking scheme that can be installed through links in a e-mail messages. PHISHING: Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. 5
  • 6. DATA LEAKAGE:  Data leakage threats usually occur via the web and email, but can also occur via mobile data storage devices such as optical media, USB keys, and laptops. INSIDER THREAT: An insider threat is a security risk that originates from within the targeted organization. It typically involves a current or former employee or business associate who has access to sensitive information or privileged accounts within the network of an organization, and who misuses this access 6
  • 7. ATTACKS:  A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks.  TYPES OF ATTACKS  Password Attack  Malware Attack 7
  • 8. PASSWORD ATTACK:  A password attack is exactly what it sounds like: a third party trying to gain access to your systems by cracking a user's password.  HOW DO HACKERS KNOW YOUR PASSWORD ?  Your passwords are stored in secure systems by using some  special algorithms known as "hashing."  Hackers try to access these passwords using different techniques, the most popular one is called a "Dictionary attack,“ where the computer tries over and over again. 8
  • 9. MALWARE:  Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.”  TYPES OF MALWARE  VIRUSES  BOTS&BOTNETS How does Malware Occurs?  Malware infection occurs when malware, or malicious software,infiltrates your computer.stealing private information or spying on a computer without the consent of the user. 9
  • 10. DETECTING THEREATS AND ATTACKS:  WHAT IS THREAT DETECTION ?  Threat detection is the process by which you find threats on your network, your systems or your applications. The idea is to detect threats before they are exploited as attacks.  HOW TO DETECT THREATS?  DETECTION TECHONOLOGIES Intrusion detection systems  Network firewalls  Honeypots 10
  • 11. Intrusion detection systems: An appliance or service that monitors network traffic for malicious activity.  Pros: Good for detecting threats introduced via the network itself.  Cons: Limited in scope and will not detect endpoint or cloud threats. Requires an intrusion prevention system (IPS) to block threats.  NETWORK FIREWALLS:  A physical or virtual appliance that monitors traffic for malicious activity or access and takes appropriate action.  Pros: Good for detecting and blocking threats via the network itself.  Cons: Limited in scope and will not detect endpoint or cloud threats. 11
  • 12. HONEYPOTS:  A network-attached system set up as a decoy to expose threats against an organization.  Pros: Advanced visibility of threats against applications or resources.  Cons: Limited in scope the specific honeypots that are deployed. If discovered by an attacker, honeypots can be circumvented. MITIGATING CYBER THREATS:  Keep Software Up-to-Date Install Anti-Virus Protection Software Back Up Critical Data Implement Multi-Factor Authentication 12