SlideShare una empresa de Scribd logo
1 de 31
Introduction to
Cyber Security
Hello!
I am Priyanshu Ratnakar
I am a Cyber Security Researcher
I am also an entrepreneur
Founder of a startup Protocol X.
2
Before we start
Understanding the term CYBER
It is a combining form
relating to information
technology, the internet
and virtual reality
relating to or characteristic of the
culture of computers, information
technology, and virtual reality -
Google
Cyber came from cybernetics
In the late 1940s, cybernetics arose
as the study of control systems and
communications between people
and machines. Today, it has
evolved into a transdisciplinary
approach to regulatory systems.
3
Before we start
Understanding the need of CYBER
SECURITY
Cyber Security is necessary
since it helps in securing data
from threats such as data theft
or misuse also safeguards your
system from viruses and
attacks
relating to or characteristic of the
culture of computers, information
technology, and virtual reality -
Google
Cyber came from cybernetics
In the late 1940s, cybernetics arose
as the study of control systems and
communications between people
and machines. Today, it has
evolved into a transdisciplinary
approach to regulatory systems.
4
Major security problems
⬡ Virus.
⬡ Malware.
⬡ Trojan Horses
⬡ Password Cracking
⬡ Hacker.
Your audience will listen to you or read the
content, but won’t do both.
5
1.Virus
program that loaded onto computer
without one's knowledge and runs
against/without user permission
“
A computer virus is a type
of computer program that, when
executed, replicates itself by modifying
other computer programs and inserting
its own code. When this replication
succeeds, the affected areas are then
said to be "infected" with a computer
virus..
7
Solution
8
 Removing a computer virus or spyware can be difficult without the
help of malicious software removal tools. Some computer viruses and
other unwanted software reinstall themselves after the viruses and
spyware are detected and removed. Fortunately, by updating the
computer and by using malicious software removal tools, you can
help permanently remove unwanted software.
 Install a security suite that protects the computer against threats such
as viruses and worms
 Install latest update of OS and Antivirus
Some
Antivirus
Software's
9
2. Malware
software that is specifically designed to
disrupt, damage, or gain unauthorized
access to a computer system.
“
Malware is the collective name for a
number of malicious software variants,
including viruses, ransomware and
spyware. Shorthand for malicious
software, malware typically consists of
code developed by cyber attackers,
designed to cause extensive damage to
data and systems or to gain unauthorized
access to a network. 11
Types of Malware
12
 Spyware: No surprise here — spyware is malware designed to spy on you. It hides in the
background and takes notes on what you do online, including your passwords, credit card
numbers, surfing habits, and more.
 Worms: Worms infect entire networks of devices, either local or across the internet, by
using network interfaces. It uses each consecutively infected machine to infect others.
 Ransomware: This kind of malware typically locks down your computer and your files,
and threatens to erase everything unless you pay a ransom.
 Adware: Though not always malicious in nature, aggressive advertising software can
undermine your security just to serve you ads — which can give other malware an easy
way in. Plus, let’s face it: pop-ups are really annoying.
 Botnets: Botnets are networks of infected computers that are made to work together
under the control of an attacker.
How to protect against malware
13
 Don’t trust strangers online! “Social engineering”, which can include strange emails,
abrupt alerts, fake profiles, and curiosity-tickling offers, are the #1 method of delivering
malware. If you don’t know exactly what it is, don’t click on it.
 Double-check your downloads! From pirating sites to official storefronts, malware is often
lurking just around the corner. So before downloading, always double-check that the
provider is trustworthy by carefully reading reviews and comments.
 Get an ad-blocker! Malvertising – where hackers use infected banners or pop-up ads to
infect your device – is on the rise. You can’t know which ads are bad: so it’s safer to just
block them all with a reliable ad-blocker.
 Careful where you browse! Malware can be found anywhere, but it’s most common in
websites with poor backend security, like small, local websites. If you stick to large,
reputable sites, you severely reduce your risk of encountering malware.
3. Trojan Virus
is any malware which misleads users of
its true intent.
“A Trojan horse or Trojan is a type of malware that
is often disguised as legitimate software. Trojans
can be employed by cyber-thieves and hackers
trying to gain access to users' systems. Users are
typically tricked by some form of social
engineering into loading and executing Trojans on
their systems. Once activated, Trojans can enable
cyber-criminals to spy on you, steal your sensitive
data, and gain backdoor access to your system.
15
These actions can include:
16
 Deleting data
 Blocking data
 Modifying data
 Copying data
 Disrupting the performance of
computers or computer networks
5. Hacker
a person who uses computers to gain
unauthorized access to data.
“
A hacker is an individual who uses computer,
networking or other skills to overcome a technical
problem. The term hacker may refer to anyone
with technical skills, but it often refers to a person
who uses his or her abilities to gain unauthorized
access to systems or networks in order to commit
crimes. A hacker may, for example, steal
information to hurt people via identity theft,
damage or bring down systems and, often, hold
those systems hostage to collect ransom.
18
White
A hacker who uses hacking
skills to protect organizations
from threat actors is called as a
“white hat hacker.” They
actively search for
vulnerabilities in a security
system so that the flaws can be
patched before a cybercriminal
can take advantage of them to
penetrate the system
Types of Hackers
Black
black hat hackers usually have
extensive knowledge about
breaking into computer
networks and bypassing
security protocols. They are
also responsible for
writing malware, which is a
method used to gain access to
these systems.
19
Grey
These types of hackers are
not inherently malicious with
their intentions; they’re just
looking to get something out
of their discoveries for
themselves. Usually, grey hat
hackers will not exploit the
found vulnerabilities.
However, this type of hacking
is still considered illegal
because the hacker did not
receive permission from the
owner prior to attempting to
attack the system.
Role of a White Hat Hacker
⬡ Scanning ports to identify flaws – White hat hackers use port scanning tools (such
as Nessus or Nmap) to find whether there are any open ports. They study these
ports in detail to come up with countermeasures to defend them against
cyberattacks.
⬡ Examine patch installations – They also examine patch installations so that threat
actors can’t exploit them.
⬡ Social engineering methods – They use social engineering methods, such as
shoulder surfing, to collect crucial information. The steps that can help any
cybercriminal to gain access to sensitive data.
⬡ Dodge honeypots, IDS, or other systems – White hat hackers also try different
methodologies and approaches to evade honeypots set up by the organization.
They look for loopholes that can give black hats the access to avoid firewalls,
IDS/IPS ((Intrusion Detection Systems/Intrusion Prevention Systems), or
honeypots.
⬡ Sniffing – They also perform network sniffing, hijacking web servers, and other
network-related loopholes.
20
3,67,249
In India on an average a certified ethical hacker earns an
average salary of Rs 3,67,249 per year
21
“We can never stop a
Hacker to hack something
the only thing we can do to
protect computers is
Creating HURDLES for the
Hacker. 22
Why are we and organizations are
hiring hacking to hack our own
systems?
23
To catch a thief, you must think like a thief. That’s the basis for ethical hacking. Knowing
your enemy is absolutely critical and very important. This may help you in creating the
strategy for catching the hackers in the system. We try to hack our own systems so that we
will be able to know the loop holes in the administration. This will help you in making
precautions. You don’t have to protect your systems from everything. You can’t. The only
protection against everything is to unplug your computer systems and lock them away so no
one can touch them — not even you. But doing so is not the best approach to information
security, and it’s certainly not good for business. What’s important is to protect your systems
from known vulnerabilities and common attacks, which happen to be some of the most
overlooked weaknesses in many organizations.
Your overall goals as an ethical
hacker are to
24
 Prioritize your systems so you can focus your efforts on what
matters.
 Hack your systems in a nondestructive fashion.
 Enumerate vulnerabilities and, if necessary, prove to
management that vulnerabilities exist and can be exploited.
 Apply results to remove the vulnerabilities and better secure
your systems.
Why Is
Cybersecurity
Important for
New
Entrepreneurs?
25
As we move forward in the
digital age, cybersecurity
should be a core business
objective, no matter how
large or small your business
is — and being proactive can
only protect you. Make it a
priority today.
26
“
If you know the enemy and know yourself, you need
not to fear the results of a hundred battles. If you
know yourself but not the enemy , for every victory
gained you will also suffer a defeat. If you know
neither the enemy nor yourself, you will succumb in
every battle.”
In the world of cyber – You Neither Know Your Enemy
Nor Yourself!
27
3,73,62,350.00
According to a CISCO Annual Cyber Security Report, 53% of all cyber attacks led to financial
damages
21%
n 2018 there were 80,000 cyber attacks per day or over 30 million attacks per year.
44,83,48,20,00,00,000.00
Cybersecurity Ventures predicts cybercrime damages will cost the world $6 trillion annually by
2021,
28
Maps
India
29
https://cybermap.kaspersky.com/
My Project
Su-Rakshit app URL Legtimacy detectar
https://www.youtube.com/watch?v=hjuRk
KfCwWc
30
31
Thanks!
Any questions?
You can contact me at:
priyanshuratnakar@protonmail.com
itzzzpriyanshu@gmail.com
facebook.com/ratnakarpriyanshu
instagram.com/priyanshu_ratnakar
twitter.com/heyypriyanshu

Más contenido relacionado

La actualidad más candente

Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxDinesh582831
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingDhruv Majumdar
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber SecurityLeon Fouche
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 

La actualidad más candente (20)

Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Cyber security
Cyber securityCyber security
Cyber security
 
What is Ransomware
What is RansomwareWhat is Ransomware
What is Ransomware
 
Bsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat HuntingBsides 2019 - Intelligent Threat Hunting
Bsides 2019 - Intelligent Threat Hunting
 
Cyber security
Cyber security Cyber security
Cyber security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Social engineering
Social engineering Social engineering
Social engineering
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Board and Cyber Security
Board and Cyber SecurityBoard and Cyber Security
Board and Cyber Security
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
cyber security
cyber security cyber security
cyber security
 

Similar a Introduction to Cyber Security

Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docxArindamGhosal6
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologiesyusifagalar
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptxmuskaangoel15
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxVishnuVarma47
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityAliyuMuhammadButu
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hackDharmesh Makwana
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 

Similar a Introduction to Cyber Security (20)

THESIS-2(2)
THESIS-2(2)THESIS-2(2)
THESIS-2(2)
 
Cyber Security Company.docx
Cyber Security Company.docxCyber Security Company.docx
Cyber Security Company.docx
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Ceferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual TechnologiesCeferov Cefer Intelectual Technologies
Ceferov Cefer Intelectual Technologies
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
ppt on securities.pptx
ppt on securities.pptxppt on securities.pptx
ppt on securities.pptx
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Seminar
SeminarSeminar
Seminar
 
CSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptxCSE-Ethical-Hacking-ppt.pptx
CSE-Ethical-Hacking-ppt.pptx
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 

Último

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Último (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Introduction to Cyber Security

  • 2. Hello! I am Priyanshu Ratnakar I am a Cyber Security Researcher I am also an entrepreneur Founder of a startup Protocol X. 2
  • 3. Before we start Understanding the term CYBER It is a combining form relating to information technology, the internet and virtual reality relating to or characteristic of the culture of computers, information technology, and virtual reality - Google Cyber came from cybernetics In the late 1940s, cybernetics arose as the study of control systems and communications between people and machines. Today, it has evolved into a transdisciplinary approach to regulatory systems. 3
  • 4. Before we start Understanding the need of CYBER SECURITY Cyber Security is necessary since it helps in securing data from threats such as data theft or misuse also safeguards your system from viruses and attacks relating to or characteristic of the culture of computers, information technology, and virtual reality - Google Cyber came from cybernetics In the late 1940s, cybernetics arose as the study of control systems and communications between people and machines. Today, it has evolved into a transdisciplinary approach to regulatory systems. 4
  • 5. Major security problems ⬡ Virus. ⬡ Malware. ⬡ Trojan Horses ⬡ Password Cracking ⬡ Hacker. Your audience will listen to you or read the content, but won’t do both. 5
  • 6. 1.Virus program that loaded onto computer without one's knowledge and runs against/without user permission
  • 7. “ A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. When this replication succeeds, the affected areas are then said to be "infected" with a computer virus.. 7
  • 8. Solution 8  Removing a computer virus or spyware can be difficult without the help of malicious software removal tools. Some computer viruses and other unwanted software reinstall themselves after the viruses and spyware are detected and removed. Fortunately, by updating the computer and by using malicious software removal tools, you can help permanently remove unwanted software.  Install a security suite that protects the computer against threats such as viruses and worms  Install latest update of OS and Antivirus
  • 10. 2. Malware software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  • 11. “ Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware. Shorthand for malicious software, malware typically consists of code developed by cyber attackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network. 11
  • 12. Types of Malware 12  Spyware: No surprise here — spyware is malware designed to spy on you. It hides in the background and takes notes on what you do online, including your passwords, credit card numbers, surfing habits, and more.  Worms: Worms infect entire networks of devices, either local or across the internet, by using network interfaces. It uses each consecutively infected machine to infect others.  Ransomware: This kind of malware typically locks down your computer and your files, and threatens to erase everything unless you pay a ransom.  Adware: Though not always malicious in nature, aggressive advertising software can undermine your security just to serve you ads — which can give other malware an easy way in. Plus, let’s face it: pop-ups are really annoying.  Botnets: Botnets are networks of infected computers that are made to work together under the control of an attacker.
  • 13. How to protect against malware 13  Don’t trust strangers online! “Social engineering”, which can include strange emails, abrupt alerts, fake profiles, and curiosity-tickling offers, are the #1 method of delivering malware. If you don’t know exactly what it is, don’t click on it.  Double-check your downloads! From pirating sites to official storefronts, malware is often lurking just around the corner. So before downloading, always double-check that the provider is trustworthy by carefully reading reviews and comments.  Get an ad-blocker! Malvertising – where hackers use infected banners or pop-up ads to infect your device – is on the rise. You can’t know which ads are bad: so it’s safer to just block them all with a reliable ad-blocker.  Careful where you browse! Malware can be found anywhere, but it’s most common in websites with poor backend security, like small, local websites. If you stick to large, reputable sites, you severely reduce your risk of encountering malware.
  • 14. 3. Trojan Virus is any malware which misleads users of its true intent.
  • 15. “A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. 15
  • 16. These actions can include: 16  Deleting data  Blocking data  Modifying data  Copying data  Disrupting the performance of computers or computer networks
  • 17. 5. Hacker a person who uses computers to gain unauthorized access to data.
  • 18. “ A hacker is an individual who uses computer, networking or other skills to overcome a technical problem. The term hacker may refer to anyone with technical skills, but it often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes. A hacker may, for example, steal information to hurt people via identity theft, damage or bring down systems and, often, hold those systems hostage to collect ransom. 18
  • 19. White A hacker who uses hacking skills to protect organizations from threat actors is called as a “white hat hacker.” They actively search for vulnerabilities in a security system so that the flaws can be patched before a cybercriminal can take advantage of them to penetrate the system Types of Hackers Black black hat hackers usually have extensive knowledge about breaking into computer networks and bypassing security protocols. They are also responsible for writing malware, which is a method used to gain access to these systems. 19 Grey These types of hackers are not inherently malicious with their intentions; they’re just looking to get something out of their discoveries for themselves. Usually, grey hat hackers will not exploit the found vulnerabilities. However, this type of hacking is still considered illegal because the hacker did not receive permission from the owner prior to attempting to attack the system.
  • 20. Role of a White Hat Hacker ⬡ Scanning ports to identify flaws – White hat hackers use port scanning tools (such as Nessus or Nmap) to find whether there are any open ports. They study these ports in detail to come up with countermeasures to defend them against cyberattacks. ⬡ Examine patch installations – They also examine patch installations so that threat actors can’t exploit them. ⬡ Social engineering methods – They use social engineering methods, such as shoulder surfing, to collect crucial information. The steps that can help any cybercriminal to gain access to sensitive data. ⬡ Dodge honeypots, IDS, or other systems – White hat hackers also try different methodologies and approaches to evade honeypots set up by the organization. They look for loopholes that can give black hats the access to avoid firewalls, IDS/IPS ((Intrusion Detection Systems/Intrusion Prevention Systems), or honeypots. ⬡ Sniffing – They also perform network sniffing, hijacking web servers, and other network-related loopholes. 20
  • 21. 3,67,249 In India on an average a certified ethical hacker earns an average salary of Rs 3,67,249 per year 21
  • 22. “We can never stop a Hacker to hack something the only thing we can do to protect computers is Creating HURDLES for the Hacker. 22
  • 23. Why are we and organizations are hiring hacking to hack our own systems? 23 To catch a thief, you must think like a thief. That’s the basis for ethical hacking. Knowing your enemy is absolutely critical and very important. This may help you in creating the strategy for catching the hackers in the system. We try to hack our own systems so that we will be able to know the loop holes in the administration. This will help you in making precautions. You don’t have to protect your systems from everything. You can’t. The only protection against everything is to unplug your computer systems and lock them away so no one can touch them — not even you. But doing so is not the best approach to information security, and it’s certainly not good for business. What’s important is to protect your systems from known vulnerabilities and common attacks, which happen to be some of the most overlooked weaknesses in many organizations.
  • 24. Your overall goals as an ethical hacker are to 24  Prioritize your systems so you can focus your efforts on what matters.  Hack your systems in a nondestructive fashion.  Enumerate vulnerabilities and, if necessary, prove to management that vulnerabilities exist and can be exploited.  Apply results to remove the vulnerabilities and better secure your systems.
  • 26. As we move forward in the digital age, cybersecurity should be a core business objective, no matter how large or small your business is — and being proactive can only protect you. Make it a priority today. 26
  • 27. “ If you know the enemy and know yourself, you need not to fear the results of a hundred battles. If you know yourself but not the enemy , for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” In the world of cyber – You Neither Know Your Enemy Nor Yourself! 27
  • 28. 3,73,62,350.00 According to a CISCO Annual Cyber Security Report, 53% of all cyber attacks led to financial damages 21% n 2018 there were 80,000 cyber attacks per day or over 30 million attacks per year. 44,83,48,20,00,00,000.00 Cybersecurity Ventures predicts cybercrime damages will cost the world $6 trillion annually by 2021, 28
  • 30. My Project Su-Rakshit app URL Legtimacy detectar https://www.youtube.com/watch?v=hjuRk KfCwWc 30
  • 31. 31 Thanks! Any questions? You can contact me at: priyanshuratnakar@protonmail.com itzzzpriyanshu@gmail.com facebook.com/ratnakarpriyanshu instagram.com/priyanshu_ratnakar twitter.com/heyypriyanshu