SlideShare una empresa de Scribd logo
1 de 22
CYBERSECURITY
TRAINING
Windstone Health Services
2021
WHAT IS CYBER SECURITY?
• Cyber Security is the practice of protecting systems, networks, and programs from
digital attacks.
• These cyberattacks are usually aimed at accessing, changing, or destroying sensitive
information; extorting money from users; or interrupting normal business
procedures.
WHY IS CYBER SECURITY
IMPORTANT?
• Cyberattacks are a serious risk for all businesses
• Out of 1,045 small and medium-sized businesses that contributed to this cyber
security survey conducted in 2018 by the Ponemon Institute:
1. 67% of respondents suffered a cyberattack in 2018 (compared to 61% the previous
year)
2. 60% of survey respondents that had a data breach said the cause was a negligent
employee or independent contractor
3. A significant majority of respondents experienced an exploit or malware that evaded
their company’s intrusion detection or antivirus software
4. Mobile devices were the most vulnerable entry points to companies’ computer
networks
WHAT IS CYBER SECURITY ALL
ABOUT?
• Users must understand and
comply with basic data security
principles such as choosing
strong passwords, being wary of
attachments in email, and
backing up data.
• Organizations must have a framework
for how they deal with both
attempted and successful cyber
attacks.
• One well-respected framework can
guide you. It explains how you can
identify attacks, protect systems,
detect and respond to threats, and
recover from successful attacks.
• Technology is essential to giving
organizations and individuals the
computer security tools needed to
protect themselves from cyber
attacks.
• Three main entities must be
protected: endpoint devices like
computers, smart devices, and
routers; networks; and the cloud.
COMMON CYBER SECURITY
THREATS
Types of Malware:
• Virus
• Worm
• Trojan Horse
• Adware
• Spyware
• Ransomware
Threats:
• Malware
• Phishing
• Spamming
• Man-in-the-middle
Attack
• Denial-of-service Attack
• SQL Injection
• Zero-day Exploit
Malware
A malware attack is a piece of malicious
software which takes over a person’s
computer in order to spread the bug
onto other people’s devices and profiles.
It can also infect a computer and turn it
into a botnet, which means the cyber
criminal can control the computer and
use it to send malware to others.
Phishing
Phishing attacks are designed to steal login
and password details so that the cyber
criminal can assume control of the victim’s
social network, email and online bank
accounts.
70% of internet users choose the same
password for almost every web service they
use. This is why phishing is so effective, as
the criminal, by using the same login details,
can access multiple private accounts and
manipulate them for their own good.
Spamming
Spamming is when a cyber criminal sends
emails designed to make a victim spend
money on counterfeit or fake goods.
Often advertising pharmaceutical
products or security software, which
people believe they need to solve
security issues which do not actually
exist.
Virus
A computer virus attaches itself to a
program or file enabling it to spread
from one computer to another, leaving
infections as it travels.
Worm
A worm is similar to a virus by design and
is considered to be a sub-class of a virus.
Worms spread from computer to
computer, but unlike a virus, it has the
capability to travel without any human
action.
A worm takes advantage of file or
information transport features on your
system, which is what allows it to travel
unaided.
Trojan Horse
A Trojan Horse is full of as much trickery
as the mythological Trojan Horse it was
named after.
The Trojan Horse, at first glance will
appear to be useful software but will
actually do damage once installed or run
on your computer.
Types of Malware
Adware
Adware is also known as advertising-supported
software. It is software which renders
advertisements for the purpose of generating
revenue for its author. The advertisements are
published on the screen presented to the user at
the time of installation. Adware is programmed
to examine which Internet sites, the user visits
frequently and to present and feature related
advertisements. Not all adware has malicious
intent, but it becomes a problem anyway
because it harms computer performance and
can be annoying.
Spyware
This type of malicious software, spies on you,
tracks your internet activities. It helps the
hacker in gathering information about the
victim’s system, without the consent of the
victim. This spyware’s presence is typically
hidden from the host and it is very difficult
to detect. Some spyware like keyloggers may
be installed intentionally in an organization
to monitor activities of employees.
Ransomware
Ransomware is an advanced type of malware
that restricts access to the computer system
until the user pays a fee. Your screen might
show a pop-up warning that your have been
locked out of your computer and that you
can access only after paying the
cybercriminal. The cybercriminal demands a
ransom to be paid in order for the restriction
to be removed.
Types of Malware
MAN-IN-THE-MIDDLE ATTACK
• A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves
between a user and a website. This kind of attack comes in several forms.
• For example, a fake banking website may be used to capture financial login
information. The fake site is “in the middle” between the user and the actual bank
website.
DENIAL-OF-SERVICE ATTACK
• Refers to events that render systems on a computer network temporarily unusable.
• Denials of service can happen accidentally as the result of actions taken by network users or
administrators, but often they are malicious DoS attacks.
• They may target servers, network routers or network communication links.
• They can cause computers and routers to shut down ("crash") and links to bog down.
• They usually do not cause permanent damage.
SQL INJECTION
• SQL query is one way an application talks
to the database
• SQL injection occurs when an application
fails to sanitize untrusted data (such as
data in web form fields) in a database
query
• An attacker can use specially-crafted SQL
commands to trick the application into
asking the database to execute
unexpected commands
ZERO-DAY EXPLOIT
• “Zero-day” is a loose term for a recently
discovered vulnerability or exploit for a
vulnerability that hackers can use to attack
systems.
• These threats are incredibly dangerous
because only the attacker is aware of their
existence.
• Exploits can go unnoticed for years and are
often sold on the black market for large
sums of money.
CONSEQUENCES OF INACTION
• Loss or damage of electronic data
• Extra expenses to keep your business operating
• You may suffer a loss of income (i.e. a denial of
service attack forces you to shut down your business,
causing you to lose both income and customers)
• Loss of confidentiality, integrity and/or availability of
valuable patient information
• Network security and privacy lawsuits (i.e. if a cyber
thief steals data from your computer system and the
data belongs to another party, that party may sue
you)
• Allows attackers to covertly gather personal data,
including financial information and
usernames/passwords
WHAT CAN YOU DO?
RESPONSIBLE BROWSING
• Do not download/install/open
programs/executables without
consulting/reviewing with IT support.
• Beware of cloned websites that may appear
to be legitimate. Note that secure websites
start with https, not http.
• Beware of suspicious websites, even if they
are https://. Here is an example.
• https://www.bankofamerica.com
and https://www.bankofarnerica.com are
two different sites, one of them is trying to
steal your identity. (Please note how
cleverly ‘m’ was replaced by ‘rn’).
RESPONSIBLE EMAIL ACTIONS
• Do not click on suspicious links embedded
in emails. Hover over questionable links to
reveal the true destination before clicking.
• Don’t open attachments or click on URLs in
unsolicited emails, even from users you
know.
• Alert IT support immediately upon receiving
suspicious emails.
• Do not act on email-based requests for
sensitive personal information, money
movements, or trading. Directly verify all
requests with the clients and ask questions.
RESPONSIBLE USE OF EXTERNAL MEDIA
• Do not insert any USB drive or
CDs/DVDs that you’ve received from an
unknown/unreliable source.
• Do not install programs that was copied
from a USB drive, external drive and/or
found over the internet.
PASSWORDS
• Do not share your passwords at any cause.
They must not be shared with colleagues,
vendors and IT support.
• Change your passwords every 90 days.
When choosing a password:
• Make new passwords difficult to guess by
avoiding dictionary words, and mixing
letters, numbers and punctuation.
• Use a unique long and strong password for
each account to prevent a quick and
invasive attack on all of your accounts.
SOFTWARE UPDATES
• Updates - sometimes called patches - fix
problems and glitches with your operating
system (OS) (e.g., Windows) and software
programs (e.g., Microsoft Office
applications). Anti-virus software removes
viruses, quarantines and repairs infected
files, and can help prevent future viruses.
• Please ensure all software patches are
installed and kept up-to-date by your IT
department.
• To avoid computer problems caused by
viruses, please ensure that an anti-virus
program like Sophos is installed and kept
up to date.
WHAT CAN YOUR COMPANY DO?
• Use a Virtual Private Network (VPN) to encrypt your
web traffic. An encrypted VPN severely limits a
hacker’s ability to read or modify web traffic.
• Ensure your operating system is up-to-date.
• Must have anti-virus software installed onto your
system to scan the entire system at boot along with e-
mails and files as they are downloaded from the
Internet
• Network should have strong firewalls and protocols to
prevent unauthorized access.
• Secure your communications through encryption.
• Regularly talk to employees about cybersecurity.
COMMON TECHNOLOGY USED TO
PROTECT OUR RESOURCES
• Next-generation firewalls
• DNS filtering
• Malware protection
• Antivirus software
• Email security solutions
WHILE YOU MAKE THE
BEST EFFORT TO SECURE
THE COMPANY’S
INFRASTRUCTURE…
A SYSTEM IS ONLY AS
SECURE AS THE WEAKEST
LINK.

Más contenido relacionado

La actualidad más candente

Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesParsons Behle & Latimer
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxRSAArcher
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesSlideTeam
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتReZa AdineH
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited ResourcesLogRhythm
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceMarlabs
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference Rea & Associates
 

La actualidad más candente (20)

Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data BreachesCyber Security Update: How to Train Your Employees to Prevent Data Breaches
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Analysing Ransomware
Analysing RansomwareAnalysing Ransomware
Analysing Ransomware
 
Cyber Resilience
Cyber ResilienceCyber Resilience
Cyber Resilience
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation SlidesCybersecurity Incident Management Powerpoint Presentation Slides
Cybersecurity Incident Management Powerpoint Presentation Slides
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Zero Trust
Zero TrustZero Trust
Zero Trust
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Blue Team
Blue TeamBlue Team
Blue Team
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 

Similar a Cybersecurity Training

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfAlefya1
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethicssamina khan
 
Cyber security
Cyber security Cyber security
Cyber security ZwebaButt
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityAvani Patel
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attackskanika sharma
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptxJenetSilence
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber securitySumanPramanik7
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineSumanPramanik7
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Cyber security
Cyber securityCyber security
Cyber securitySabir Raja
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016Arish Roy
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 

Similar a Cybersecurity Training (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 

Último

Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableDipal Arora
 
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeTop Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeCall Girls Delhi
 
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...vidya singh
 
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Call Girls in Nagpur High Profile
 
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Top Rated Bangalore Call Girls Richmond Circle ⟟ 9332606886 ⟟ Call Me For Ge...
Top Rated Bangalore Call Girls Richmond Circle ⟟  9332606886 ⟟ Call Me For Ge...Top Rated Bangalore Call Girls Richmond Circle ⟟  9332606886 ⟟ Call Me For Ge...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 9332606886 ⟟ Call Me For Ge...narwatsonia7
 
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...aartirawatdelhi
 
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...Genuine Call Girls
 
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...Taniya Sharma
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Dipal Arora
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Servicevidya singh
 
Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...
Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...
Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...tanya dube
 
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...chandars293
 
Top Rated Bangalore Call Girls Mg Road ⟟ 9332606886 ⟟ Call Me For Genuine S...
Top Rated Bangalore Call Girls Mg Road ⟟   9332606886 ⟟ Call Me For Genuine S...Top Rated Bangalore Call Girls Mg Road ⟟   9332606886 ⟟ Call Me For Genuine S...
Top Rated Bangalore Call Girls Mg Road ⟟ 9332606886 ⟟ Call Me For Genuine S...narwatsonia7
 
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...parulsinha
 

Último (20)

Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Jabalpur Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 8617370543 Top Class Call Girl Service Available
 
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeTop Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
 
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
 
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
Book Paid Powai Call Girls Mumbai 𖠋 9930245274 𖠋Low Budget Full Independent H...
 
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Dehradun Just Call 9907093804 Top Class Call Girl Service Available
 
Top Rated Bangalore Call Girls Richmond Circle ⟟ 9332606886 ⟟ Call Me For Ge...
Top Rated Bangalore Call Girls Richmond Circle ⟟  9332606886 ⟟ Call Me For Ge...Top Rated Bangalore Call Girls Richmond Circle ⟟  9332606886 ⟟ Call Me For Ge...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 9332606886 ⟟ Call Me For Ge...
 
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
Night 7k to 12k Navi Mumbai Call Girl Photo 👉 BOOK NOW 9833363713 👈 ♀️ night ...
 
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...
Pondicherry Call Girls Book Now 9630942363 Top Class Pondicherry Escort Servi...
 
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Faridabad Just Call 9907093804 Top Class Call Girl Service Available
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
 
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 9907093804 Top Class Call Girl Service Ava...
 
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort ServicePremium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
Premium Call Girls Cottonpet Whatsapp 7001035870 Independent Escort Service
 
Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...
Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...
Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...
 
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Gwalior Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Gwalior Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Bhubaneswar Just Call 9907093804 Top Class Call Girl Service Avail...
 
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
 
Top Rated Bangalore Call Girls Mg Road ⟟ 9332606886 ⟟ Call Me For Genuine S...
Top Rated Bangalore Call Girls Mg Road ⟟   9332606886 ⟟ Call Me For Genuine S...Top Rated Bangalore Call Girls Mg Road ⟟   9332606886 ⟟ Call Me For Genuine S...
Top Rated Bangalore Call Girls Mg Road ⟟ 9332606886 ⟟ Call Me For Genuine S...
 
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
 

Cybersecurity Training

  • 2. WHAT IS CYBER SECURITY? • Cyber Security is the practice of protecting systems, networks, and programs from digital attacks. • These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business procedures.
  • 3. WHY IS CYBER SECURITY IMPORTANT? • Cyberattacks are a serious risk for all businesses • Out of 1,045 small and medium-sized businesses that contributed to this cyber security survey conducted in 2018 by the Ponemon Institute: 1. 67% of respondents suffered a cyberattack in 2018 (compared to 61% the previous year) 2. 60% of survey respondents that had a data breach said the cause was a negligent employee or independent contractor 3. A significant majority of respondents experienced an exploit or malware that evaded their company’s intrusion detection or antivirus software 4. Mobile devices were the most vulnerable entry points to companies’ computer networks
  • 4. WHAT IS CYBER SECURITY ALL ABOUT? • Users must understand and comply with basic data security principles such as choosing strong passwords, being wary of attachments in email, and backing up data. • Organizations must have a framework for how they deal with both attempted and successful cyber attacks. • One well-respected framework can guide you. It explains how you can identify attacks, protect systems, detect and respond to threats, and recover from successful attacks. • Technology is essential to giving organizations and individuals the computer security tools needed to protect themselves from cyber attacks. • Three main entities must be protected: endpoint devices like computers, smart devices, and routers; networks; and the cloud.
  • 5. COMMON CYBER SECURITY THREATS Types of Malware: • Virus • Worm • Trojan Horse • Adware • Spyware • Ransomware Threats: • Malware • Phishing • Spamming • Man-in-the-middle Attack • Denial-of-service Attack • SQL Injection • Zero-day Exploit
  • 6. Malware A malware attack is a piece of malicious software which takes over a person’s computer in order to spread the bug onto other people’s devices and profiles. It can also infect a computer and turn it into a botnet, which means the cyber criminal can control the computer and use it to send malware to others. Phishing Phishing attacks are designed to steal login and password details so that the cyber criminal can assume control of the victim’s social network, email and online bank accounts. 70% of internet users choose the same password for almost every web service they use. This is why phishing is so effective, as the criminal, by using the same login details, can access multiple private accounts and manipulate them for their own good. Spamming Spamming is when a cyber criminal sends emails designed to make a victim spend money on counterfeit or fake goods. Often advertising pharmaceutical products or security software, which people believe they need to solve security issues which do not actually exist.
  • 7. Virus A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Worm A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. Trojan Horse A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Types of Malware
  • 8. Adware Adware is also known as advertising-supported software. It is software which renders advertisements for the purpose of generating revenue for its author. The advertisements are published on the screen presented to the user at the time of installation. Adware is programmed to examine which Internet sites, the user visits frequently and to present and feature related advertisements. Not all adware has malicious intent, but it becomes a problem anyway because it harms computer performance and can be annoying. Spyware This type of malicious software, spies on you, tracks your internet activities. It helps the hacker in gathering information about the victim’s system, without the consent of the victim. This spyware’s presence is typically hidden from the host and it is very difficult to detect. Some spyware like keyloggers may be installed intentionally in an organization to monitor activities of employees. Ransomware Ransomware is an advanced type of malware that restricts access to the computer system until the user pays a fee. Your screen might show a pop-up warning that your have been locked out of your computer and that you can access only after paying the cybercriminal. The cybercriminal demands a ransom to be paid in order for the restriction to be removed. Types of Malware
  • 9. MAN-IN-THE-MIDDLE ATTACK • A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website. This kind of attack comes in several forms. • For example, a fake banking website may be used to capture financial login information. The fake site is “in the middle” between the user and the actual bank website.
  • 10. DENIAL-OF-SERVICE ATTACK • Refers to events that render systems on a computer network temporarily unusable. • Denials of service can happen accidentally as the result of actions taken by network users or administrators, but often they are malicious DoS attacks. • They may target servers, network routers or network communication links. • They can cause computers and routers to shut down ("crash") and links to bog down. • They usually do not cause permanent damage.
  • 11. SQL INJECTION • SQL query is one way an application talks to the database • SQL injection occurs when an application fails to sanitize untrusted data (such as data in web form fields) in a database query • An attacker can use specially-crafted SQL commands to trick the application into asking the database to execute unexpected commands
  • 12. ZERO-DAY EXPLOIT • “Zero-day” is a loose term for a recently discovered vulnerability or exploit for a vulnerability that hackers can use to attack systems. • These threats are incredibly dangerous because only the attacker is aware of their existence. • Exploits can go unnoticed for years and are often sold on the black market for large sums of money.
  • 13. CONSEQUENCES OF INACTION • Loss or damage of electronic data • Extra expenses to keep your business operating • You may suffer a loss of income (i.e. a denial of service attack forces you to shut down your business, causing you to lose both income and customers) • Loss of confidentiality, integrity and/or availability of valuable patient information • Network security and privacy lawsuits (i.e. if a cyber thief steals data from your computer system and the data belongs to another party, that party may sue you) • Allows attackers to covertly gather personal data, including financial information and usernames/passwords
  • 15. RESPONSIBLE BROWSING • Do not download/install/open programs/executables without consulting/reviewing with IT support. • Beware of cloned websites that may appear to be legitimate. Note that secure websites start with https, not http. • Beware of suspicious websites, even if they are https://. Here is an example. • https://www.bankofamerica.com and https://www.bankofarnerica.com are two different sites, one of them is trying to steal your identity. (Please note how cleverly ‘m’ was replaced by ‘rn’).
  • 16. RESPONSIBLE EMAIL ACTIONS • Do not click on suspicious links embedded in emails. Hover over questionable links to reveal the true destination before clicking. • Don’t open attachments or click on URLs in unsolicited emails, even from users you know. • Alert IT support immediately upon receiving suspicious emails. • Do not act on email-based requests for sensitive personal information, money movements, or trading. Directly verify all requests with the clients and ask questions.
  • 17. RESPONSIBLE USE OF EXTERNAL MEDIA • Do not insert any USB drive or CDs/DVDs that you’ve received from an unknown/unreliable source. • Do not install programs that was copied from a USB drive, external drive and/or found over the internet.
  • 18. PASSWORDS • Do not share your passwords at any cause. They must not be shared with colleagues, vendors and IT support. • Change your passwords every 90 days. When choosing a password: • Make new passwords difficult to guess by avoiding dictionary words, and mixing letters, numbers and punctuation. • Use a unique long and strong password for each account to prevent a quick and invasive attack on all of your accounts.
  • 19. SOFTWARE UPDATES • Updates - sometimes called patches - fix problems and glitches with your operating system (OS) (e.g., Windows) and software programs (e.g., Microsoft Office applications). Anti-virus software removes viruses, quarantines and repairs infected files, and can help prevent future viruses. • Please ensure all software patches are installed and kept up-to-date by your IT department. • To avoid computer problems caused by viruses, please ensure that an anti-virus program like Sophos is installed and kept up to date.
  • 20. WHAT CAN YOUR COMPANY DO? • Use a Virtual Private Network (VPN) to encrypt your web traffic. An encrypted VPN severely limits a hacker’s ability to read or modify web traffic. • Ensure your operating system is up-to-date. • Must have anti-virus software installed onto your system to scan the entire system at boot along with e- mails and files as they are downloaded from the Internet • Network should have strong firewalls and protocols to prevent unauthorized access. • Secure your communications through encryption. • Regularly talk to employees about cybersecurity.
  • 21. COMMON TECHNOLOGY USED TO PROTECT OUR RESOURCES • Next-generation firewalls • DNS filtering • Malware protection • Antivirus software • Email security solutions
  • 22. WHILE YOU MAKE THE BEST EFFORT TO SECURE THE COMPANY’S INFRASTRUCTURE… A SYSTEM IS ONLY AS SECURE AS THE WEAKEST LINK.

Notas del editor

  1. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html https://fthmb.tqn.com/ht65ckVNmtzO0TmLuzmas6vSQU4=/1500x1000/filters:fill(auto,1)/antivirus-5a72401a8e1b6e0037eca70b.jpg
  2. https://www.thebalancesmb.com/dangers-of-cyber-attacks-462537
  3. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html https://www.bing.com/images/search?view=detailV2&ccid=wIf5MzXI&id=3142055A4D46FB796117D51611F237BFA84D0A6E&thid=OIP.wIf5MzXI4cFVROcRha_ScwHaDh&mediaurl=http%3a%2f%2fwww-qa.es3.com%2fwp-content%2fuploads%2f2015%2f06%2fpeople-process-technology.png&exph=475&expw=1000&q=people%2c+process+and+technology+icon&simid=607989079640378120&selectedIndex=7&ajaxhist=0
  4. https://www.telegraph.co.uk/technology/8267578/What-is-the-difference-between-spam-malware-and-phishing.html
  5. https://fossbytes.com/difference-viruses-worms-ransomware-trojans-bots-malware-spyware-etc/
  6. https://www.telegraph.co.uk/technology/8267578/What-is-the-difference-between-spam-malware-and-phishing.html https://nerdcrossing.com/malware-vs-adware-vs-spyware-vs-viruses/ https://fossbytes.com/difference-viruses-worms-ransomware-trojans-bots-malware-spyware-etc/ https://antivirus.comodo.com/blog/malware-vs-viruses-whats-difference/
  7. https://phoenixnap.com/blog/man-in-the-middle-attacks-prevention
  8. https://www.lifewire.com/denial-of-service-dos-and-ddos-817997
  9. https://searchsoftwarequality.techtarget.com/definition/SQL-injection https://www.malwarebytes.com/sql-injection/ https://www.hungred.com/useful-information/solutions-sql-injection-attack/ https://www.bing.com/images/search?view=detailV2&ccid=fp%2broyNV&id=D8BE98CC271607E8090CC1A6DE726657CDB2F8A1&thid=OIP.fp-royNVoUodEHecBi8QHQHaEN&mediaurl=https%3a%2f%2fwww.veracode.com%2fsites%2fdefault%2ffiles%2fstyles%2fmedia_responsive_widest%2fpublic%2fwhat-is-sql-injection_0.png&exph=471&expw=829&q=sql+injection+attack&simid=608023800158093620&selectedIndex=0&qft=+filterui%3aimagesize-large&ajaxhist=0
  10. https://www.forcepoint.com/cyber-edu/zero-day-exploit
  11. https://www.thebalancesmb.com/dangers-of-cyber-attacks-462537
  12. https://azprioritycare.com/wp-content/uploads/2019/06/2019-AZPC-Cyber-Security-Compliance-Training.pdf https://www.webopedia.com/DidYouKnow/Internet/virus.asp DO’S: Keep a backup of your data in a safe place so that no hacker attack can cause you to lose your data. Always consult with IT support if you are suspicious of any emails, links or attachments. DON’T’S: Do not click on suspicious links embedded in emails or open files attached in an email from unknown sources. Do not download programs/executables from untrusty websites and from external media. Do not save your passwords on your computer. Do not visit websites that are not intended for work
  13. https://kirkpatrickprice.com/blog/top-5-cyber-security-awareness-tips-employees/
  14. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html http://antiviruscoupon.net/wp-content/uploads/2015/07/best-antivirus-software.jpg
  15. http://go.kaspersky.com/rs/kaspersky1/images/Top_10_Tips_For_Educating_Employees_About_Cybersecurity_eBook.pdf?mkt_tok=3RkMMJWWfF9wsRonuKXNcO%2FhmjTEU5z16OglWa%2BzlMI%2F0ER3fOvrPUfGjI4ITMZjI%2BSLDwEYGJlv6SgFQrDHMalq1LgPXxE%3D