SlideShare una empresa de Scribd logo
1 de 11
CYBERSECURITY
By- Ronik Mehra
What is Cybersecurity?
Cybersecurity is the practice of protecting systems,
networks, and programs from digital attacks.
These cyberattacks are usually aimed at accessing,
changing, or destroying sensitive information; extorting
money from users; or interrupting normal business
processes.
Implementing effective cybersecurity measures is
particularly challenging today because there are more
devices than people, and attackers are becoming more
innovative.
Need for
Cybersecurity
Cybersecurity is important because it
encompasses everything that pertains to
protecting our sensitive data, personally
identifiable information (PII), protected health
information (PHI), personal information,
intellectual property, data, and governmental
and industry information systems from theft
and damage attempted by criminals and
adversaries.
Data leaks that could result in identity theft are
now publicly posted on social media accounts.
Sensitive information like social security
numbers, credit card information and bank
account details are now stored in cloud storage
services like Dropbox or Google Drive.
Impact of
Cybercrime
A lack of focus on cybersecurity can
damage your business in range of ways
including:
Economic costs: Theft of intellectual
property, corporate information, disruption
in trading and the cost of repairing
damaged systems
Reputational costs: Loss of consumer
trust, loss of current and future customers
to competitors and poor media coverage
Regulatory costs: GDPR and other data
breach laws mean that your organization
could suffer from regulatory fines or
sanctions as a result of cybercrimes
Confidentiality
,Integrity And
Availability (CIA)
Confidentiality, integrity and
availability, known as the CIA triad , is a
guideline for information security for an
organization.
• Confidentiality ensures the privacy
of data by restricting access through
authentication encryption.
• Integrity assures that the
information is accurate and
trustworthy.
• Availability ensures that the
information is accessible to
authorized people.
Availability Integrity
Confidentiality
CIATriad
Types Of Attackers
■ Amateurs –These people are sometimes called Script Kiddies.They are usually
attackers with little or no skill, often using existing tools or instructions found on the
Internet to launch attacks. Some of them are just curious, while others are trying to
demonstrate their skills and cause harm.They may be using basic tools, but the results
can still be devastating.
■ Hackers –This group of attackers break into computers or networks to gain access.
Depending on the intent of the break-in, these attackers are classified as white, gray,
or black hats.The white hat attackers break into networks or computer systems to
discover weaknesses so that the security of these systems can be improved. On the
other hand, black hat attackers take advantage of any vulnerability for illegal personal,
financial or political gain.Gray hat attackers are somewhere between white and black
hat attackers.The gray hat attackers may find a vulnerability in a system.
■ Organized Hackers –These hackers include organizations of cyber criminals,
hacktivists, terrorists, and state-sponsored hackers. Cyber criminals are usually groups
of professional criminals focused on control, power, and wealth.
Types Of Attacks
■ Social engineering – Social engineering is an access attack that attempts to manipulate individuals into
performing actions or divulging confidential information .The attacker manipulates a person who knows the
password into providing it.
■ Brute-force attacks –The attacker tries several possible passwords in an attempt to guess the password. If
the password is a 4-digit number, for example, the attacker would have to try every one of the 10000
combinations. Brute-force attacks usually involve a word-list file.This is a text file containing a list of words
taken from a dictionary. A few password brute-force tools include Ophcrack, L0phtCrack,THC Hydra,
RainbowCrack, and Medusa.
■ Network sniffing – By listening and capturing packets sent on the network, an attacker may be able to
discover the password if the password is being sent unencrypted (in plain text). If the password is encrypted,
the attacker may still be able to reveal it by using a password cracking tool.
■ Phishing – it is when a malicious party sends a fraudulent email disguised as being from a legitimate,
trusted source.The message intent is to trick the recipient into installing malware on their device, or into
sharing personal or financial information.
■ SEO - Search Engine Optimization, is a set of techniques used to improve a website’s ranking by a search
engine. While many legitimate companies specialize in optimizing websites to better position them, a
malicious user could use SEO to make a malicious website appear higher in search results.This technique is
called SEO poisoning.
Types Of Malware
■ Spyware –This malware is design to track and spy on the user. Spyware often includes activity trackers, keystroke
collection, and data capture.
■ Adware -- Adware is often installed with some versions of software. Some adware is designed to only deliver
advertisements but it is also common for adware to come with spyware.
■ Bot - A bot is malware designed to automatically perform action, usually online. Several computers are infected with bots
which are programmed to quietly wait for commands provided by the attacker.
■ Ransomware – This malware is designed to hold a computer system or the data it contains captive until a payment is made.
Ransomware usually works by encrypting data in the computer with a key unknown to the user.
■ Scareware – This is a type of malware designed to persuade the user to take a specific action based on fear.
■ Rootkit –This malware is designed to modify the operating system to create a backdoor. Attackers then use the backdoor
to access the computer remotely
■ Virus - A virus is malicious executable code that is attached to other executable files, often legitimate programs
■ Trojan horse - ATrojan horse is malware that carries out malicious operations under the guise of a desired operation. A
Trojan horse differs from a virus because it binds itself to non-executable files.
■ Worms – Worms are malicious code that replicate themselves by independently exploiting vulnerabilities in networks.
Worms usually slow down networks.
■ Man-In-The-Middle (MitM) – MitM allows the attacker to take control over a device without the user’s knowledge.
■ Man-In-The-Mobile (MitMo) – A variation of man-in-middle, MitMo is a type of attack used to take control over a mobile
device.
The Kill Chain in
Cyberdefense
Stage 1. Reconnaissance -The attacker gathers
information about the target.
Stage 2. Weaponization -The attacker creates an
exploit and malicious payload to send to the
target.
Stage 3. Delivery -The attacker sends the exploit
and malicious payload to the target by email or
other method.
Stage 4. Exploitation -The exploit is executed.
Stage 5 Installation - Malware and backdoors are
installed on the target.
Stage 6. Command and Control - Remote control
of the target is gained through a command and
control channel or server.
Stage 7. Action -The attacker performs malicious
actions like information theft, or executes
additional attacks on other devices from within
the network by working through the Kill Chain
stages again.
Action
Command and Control
Installation
Exploitation
Delivery
Weaponization
Reconnaissance
Cyber Kill Chain
Increased effort
and cost to inhibit
and remediate
HowTo Protect Our
Computing Devices
• Keep the firewall on.
• Use antivirus and antispyware.
• Manage your operating system and
browser.
• Protect all your devices with a
password.
• Use unique passwords for each online
account.
• Always backup your data..
• Always use two-factor authentication.
• Do not share too much on social
media.
CYBERSECURITY | Why it is important?

Más contenido relacionado

La actualidad más candente

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee TrainingPaige Rasid
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsToño Herrera
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityAdri Jovin
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep BadgujarVishwadeep Badgujar
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 

La actualidad más candente (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cybersecurity Employee Training
Cybersecurity Employee TrainingCybersecurity Employee Training
Cybersecurity Employee Training
 
Information security
Information securityInformation security
Information security
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)
 
Introduction to Cybersecurity Fundamentals
Introduction to Cybersecurity FundamentalsIntroduction to Cybersecurity Fundamentals
Introduction to Cybersecurity Fundamentals
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Database security
Database securityDatabase security
Database security
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber security government ppt By Vishwadeep Badgujar
Cyber security government  ppt By Vishwadeep BadgujarCyber security government  ppt By Vishwadeep Badgujar
Cyber security government ppt By Vishwadeep Badgujar
 
Ransomware
RansomwareRansomware
Ransomware
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Information security
Information securityInformation security
Information security
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 

Similar a CYBERSECURITY | Why it is important?

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxBernad Bear
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityA. Shamel
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxRavinderSingh172970
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxprosunghosh7
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
basics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attackbasics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attackPILAMPIRAYAsstProfes
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With GflixacademyGaurav Mishra
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 

Similar a CYBERSECURITY | Why it is important? (20)

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptxMateri Keamanan Siber Prinsip Keamanan Jaringan.pptx
Materi Keamanan Siber Prinsip Keamanan Jaringan.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptxCyber Crime And Cyber Safety Project.pptx
Cyber Crime And Cyber Safety Project.pptx
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Engineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptxEngineering report ca2_Kritakbiswas.pptx
Engineering report ca2_Kritakbiswas.pptx
 
E Commerce security
E Commerce securityE Commerce security
E Commerce security
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Security Threats in E-Commerce
Security Threats in E-CommerceSecurity Threats in E-Commerce
Security Threats in E-Commerce
 
Computer security
Computer securityComputer security
Computer security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
cyber security
cyber security cyber security
cyber security
 
basics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attackbasics of hacking- threat basics, types of attack
basics of hacking- threat basics, types of attack
 
Cyber Security.docx
Cyber Security.docxCyber Security.docx
Cyber Security.docx
 
Learn Hacking With Gflixacademy
Learn Hacking With GflixacademyLearn Hacking With Gflixacademy
Learn Hacking With Gflixacademy
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 

Último

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 

Último (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

CYBERSECURITY | Why it is important?

  • 2. What is Cybersecurity? Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes. Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.
  • 3. Need for Cybersecurity Cybersecurity is important because it encompasses everything that pertains to protecting our sensitive data, personally identifiable information (PII), protected health information (PHI), personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. Data leaks that could result in identity theft are now publicly posted on social media accounts. Sensitive information like social security numbers, credit card information and bank account details are now stored in cloud storage services like Dropbox or Google Drive.
  • 4. Impact of Cybercrime A lack of focus on cybersecurity can damage your business in range of ways including: Economic costs: Theft of intellectual property, corporate information, disruption in trading and the cost of repairing damaged systems Reputational costs: Loss of consumer trust, loss of current and future customers to competitors and poor media coverage Regulatory costs: GDPR and other data breach laws mean that your organization could suffer from regulatory fines or sanctions as a result of cybercrimes
  • 5. Confidentiality ,Integrity And Availability (CIA) Confidentiality, integrity and availability, known as the CIA triad , is a guideline for information security for an organization. • Confidentiality ensures the privacy of data by restricting access through authentication encryption. • Integrity assures that the information is accurate and trustworthy. • Availability ensures that the information is accessible to authorized people. Availability Integrity Confidentiality CIATriad
  • 6. Types Of Attackers ■ Amateurs –These people are sometimes called Script Kiddies.They are usually attackers with little or no skill, often using existing tools or instructions found on the Internet to launch attacks. Some of them are just curious, while others are trying to demonstrate their skills and cause harm.They may be using basic tools, but the results can still be devastating. ■ Hackers –This group of attackers break into computers or networks to gain access. Depending on the intent of the break-in, these attackers are classified as white, gray, or black hats.The white hat attackers break into networks or computer systems to discover weaknesses so that the security of these systems can be improved. On the other hand, black hat attackers take advantage of any vulnerability for illegal personal, financial or political gain.Gray hat attackers are somewhere between white and black hat attackers.The gray hat attackers may find a vulnerability in a system. ■ Organized Hackers –These hackers include organizations of cyber criminals, hacktivists, terrorists, and state-sponsored hackers. Cyber criminals are usually groups of professional criminals focused on control, power, and wealth.
  • 7. Types Of Attacks ■ Social engineering – Social engineering is an access attack that attempts to manipulate individuals into performing actions or divulging confidential information .The attacker manipulates a person who knows the password into providing it. ■ Brute-force attacks –The attacker tries several possible passwords in an attempt to guess the password. If the password is a 4-digit number, for example, the attacker would have to try every one of the 10000 combinations. Brute-force attacks usually involve a word-list file.This is a text file containing a list of words taken from a dictionary. A few password brute-force tools include Ophcrack, L0phtCrack,THC Hydra, RainbowCrack, and Medusa. ■ Network sniffing – By listening and capturing packets sent on the network, an attacker may be able to discover the password if the password is being sent unencrypted (in plain text). If the password is encrypted, the attacker may still be able to reveal it by using a password cracking tool. ■ Phishing – it is when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.The message intent is to trick the recipient into installing malware on their device, or into sharing personal or financial information. ■ SEO - Search Engine Optimization, is a set of techniques used to improve a website’s ranking by a search engine. While many legitimate companies specialize in optimizing websites to better position them, a malicious user could use SEO to make a malicious website appear higher in search results.This technique is called SEO poisoning.
  • 8. Types Of Malware ■ Spyware –This malware is design to track and spy on the user. Spyware often includes activity trackers, keystroke collection, and data capture. ■ Adware -- Adware is often installed with some versions of software. Some adware is designed to only deliver advertisements but it is also common for adware to come with spyware. ■ Bot - A bot is malware designed to automatically perform action, usually online. Several computers are infected with bots which are programmed to quietly wait for commands provided by the attacker. ■ Ransomware – This malware is designed to hold a computer system or the data it contains captive until a payment is made. Ransomware usually works by encrypting data in the computer with a key unknown to the user. ■ Scareware – This is a type of malware designed to persuade the user to take a specific action based on fear. ■ Rootkit –This malware is designed to modify the operating system to create a backdoor. Attackers then use the backdoor to access the computer remotely ■ Virus - A virus is malicious executable code that is attached to other executable files, often legitimate programs ■ Trojan horse - ATrojan horse is malware that carries out malicious operations under the guise of a desired operation. A Trojan horse differs from a virus because it binds itself to non-executable files. ■ Worms – Worms are malicious code that replicate themselves by independently exploiting vulnerabilities in networks. Worms usually slow down networks. ■ Man-In-The-Middle (MitM) – MitM allows the attacker to take control over a device without the user’s knowledge. ■ Man-In-The-Mobile (MitMo) – A variation of man-in-middle, MitMo is a type of attack used to take control over a mobile device.
  • 9. The Kill Chain in Cyberdefense Stage 1. Reconnaissance -The attacker gathers information about the target. Stage 2. Weaponization -The attacker creates an exploit and malicious payload to send to the target. Stage 3. Delivery -The attacker sends the exploit and malicious payload to the target by email or other method. Stage 4. Exploitation -The exploit is executed. Stage 5 Installation - Malware and backdoors are installed on the target. Stage 6. Command and Control - Remote control of the target is gained through a command and control channel or server. Stage 7. Action -The attacker performs malicious actions like information theft, or executes additional attacks on other devices from within the network by working through the Kill Chain stages again. Action Command and Control Installation Exploitation Delivery Weaponization Reconnaissance Cyber Kill Chain Increased effort and cost to inhibit and remediate
  • 10. HowTo Protect Our Computing Devices • Keep the firewall on. • Use antivirus and antispyware. • Manage your operating system and browser. • Protect all your devices with a password. • Use unique passwords for each online account. • Always backup your data.. • Always use two-factor authentication. • Do not share too much on social media.