SlideShare una empresa de Scribd logo
1 de 16
Understanding
CyberThreats
 Possibility of or attempt of gaining unauthorized "access to a
device or system or network using a data communication
pathway
The 10 most common Cyber Threats
 Malware
 malicious software
 computer viruses, worms, Trojan horses, dishonest
spyware, and malicious rootkits
 Computer virus
 small piece of software that can spread from one
infected computer to another
 corrupt, steal, or delete data on your computer
 Rogue security software
 pop-up window that advertises a security update or
alert on your computer screen
 Trojan horse
 infect their computers with Trojan horse software
simply by downloading an application they thought
was legitimate but was in fact malicious
 Malicious spyware
 used to describe the Trojan application that was
created by cybercriminals to spy on their victims
 Computer worm
 software program that can copy itself from one
computer to another, without human interaction
 replicate in great volume and with great speed
 Botnet
 Group of computers connected to the Internet that
have been compromised by a hacker using a
computer virus or Trojan horse
 Spam
 security context is primarily used to describe email
spam
 unwanted messages in your email inbox
 clutter your mailbox as well as potentially take up
space on your mail server
 Phishing
 Fraudulent attempts by cybercriminals to obtain private
information
 Often appear in the guise of email messages designed to
appear as though they are from legitimate sources
 Rootkit
 collection of tools that are used to obtain
administrator-level access to a computer or a
network of computers
Who Are the Culprits Behind
Cyberthreats?
 How Do Cyberattacks Affect your Organization?
 When your Organization is robbed digitally … the pool of
suspects is limited to the number of people on the face of the
earth that have a laptop and an Internet connection, because
anybody with an Internet connection potentially can attack any
other computer that's tied to the network.
 So the barrier of entry is relatively low.
 Your organization not only suffer direct financial losses due to
cyberattacks but they also face enormous costs when they are
victimized by large-scale data breaches following these attacks.
 These costs include but are not limited to:
 Investigation and forensic costs
 Customer and partner communications costs
 Public relations costs
 Lost revenue due to a damaged reputation
 Regulatory fines
 Civil claims and legal fees

Más contenido relacionado

La actualidad más candente

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsB R SOFTECH PVT LTD
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 
3rd party information security assessment guideline
3rd party information security assessment guideline3rd party information security assessment guideline
3rd party information security assessment guidelinePriyanka Aash
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsKrishna Srikanth Manda
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptxkishore golla
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03Home
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides SlideTeam
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 

La actualidad más candente (20)

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Latest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security ThreatsLatest Top 10 Types of Cyber Security Threats
Latest Top 10 Types of Cyber Security Threats
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
3rd party information security assessment guideline
3rd party information security assessment guideline3rd party information security assessment guideline
3rd party information security assessment guideline
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Cyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionalsCyber Security Awareness Session for Executives and Non-IT professionals
Cyber Security Awareness Session for Executives and Non-IT professionals
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Cyber Security 03
Cyber Security 03Cyber Security 03
Cyber Security 03
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
cyber security
cyber security cyber security
cyber security
 

Destacado

ВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕ
ВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕ
ВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕДаниил Силантьев
 
Быстрый старт.последняя
Быстрый старт.последняяБыстрый старт.последняя
Быстрый старт.последняяPartnerSB
 
Attestato delle competenze. Olivia Ramonda
Attestato delle competenze.  Olivia RamondaAttestato delle competenze.  Olivia Ramonda
Attestato delle competenze. Olivia RamondaDigital-Coach.it
 
недобросовестное поведение сторон в MKA и распределение расходов
недобросовестное поведение сторон в MKA и распределение расходовнедобросовестное поведение сторон в MKA и распределение расходов
недобросовестное поведение сторон в MKA и распределение расходовRussian Arbitration Day
 
Cowen 2015 Tech Conference (05-15)
Cowen 2015 Tech Conference (05-15) Cowen 2015 Tech Conference (05-15)
Cowen 2015 Tech Conference (05-15) Brent Chudoba
 
Kelas ii sd bahasa indonesia_ismoyo
Kelas ii sd bahasa indonesia_ismoyoKelas ii sd bahasa indonesia_ismoyo
Kelas ii sd bahasa indonesia_ismoyoisty-alkhawarizmi
 
kagami_comput2015_8
kagami_comput2015_8kagami_comput2015_8
kagami_comput2015_8swkagami
 
βιωματική εργασία
βιωματική εργασία βιωματική εργασία
βιωματική εργασία dimkom
 
Huong dan hoan thien ho so 2014
Huong dan hoan thien ho so 2014Huong dan hoan thien ho so 2014
Huong dan hoan thien ho so 2014hahahehe88
 
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...rorbic
 
Cách Trị Viêm Khớp Gối
Cách Trị Viêm Khớp GốiCách Trị Viêm Khớp Gối
Cách Trị Viêm Khớp Gốikristopher829
 

Destacado (19)

ВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕ
ВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕ
ВЕЧЕР EMAIL-МАРКЕТИНГА В ЕКАТЕРИНБУРГЕ
 
Быстрый старт.последняя
Быстрый старт.последняяБыстрый старт.последняя
Быстрый старт.последняя
 
Attestato delle competenze. Olivia Ramonda
Attestato delle competenze.  Olivia RamondaAttestato delle competenze.  Olivia Ramonda
Attestato delle competenze. Olivia Ramonda
 
CARTA DE RECOMENDACION ALEJANDRO DIAZ LEON EN
CARTA DE RECOMENDACION ALEJANDRO DIAZ LEON ENCARTA DE RECOMENDACION ALEJANDRO DIAZ LEON EN
CARTA DE RECOMENDACION ALEJANDRO DIAZ LEON EN
 
недобросовестное поведение сторон в MKA и распределение расходов
недобросовестное поведение сторон в MKA и распределение расходовнедобросовестное поведение сторон в MKA и распределение расходов
недобросовестное поведение сторон в MKA и распределение расходов
 
tik multimedia Yessi Trifani
tik multimedia Yessi Trifanitik multimedia Yessi Trifani
tik multimedia Yessi Trifani
 
GMBA concept 2015
GMBA concept 2015GMBA concept 2015
GMBA concept 2015
 
Cowen 2015 Tech Conference (05-15)
Cowen 2015 Tech Conference (05-15) Cowen 2015 Tech Conference (05-15)
Cowen 2015 Tech Conference (05-15)
 
1
11
1
 
Jodoh Rajawali_Kho Ping Hoo
Jodoh Rajawali_Kho Ping HooJodoh Rajawali_Kho Ping Hoo
Jodoh Rajawali_Kho Ping Hoo
 
Kelas ii sd bahasa indonesia_ismoyo
Kelas ii sd bahasa indonesia_ismoyoKelas ii sd bahasa indonesia_ismoyo
Kelas ii sd bahasa indonesia_ismoyo
 
UpdatedResume
UpdatedResumeUpdatedResume
UpdatedResume
 
Ptdee fituici
Ptdee fituiciPtdee fituici
Ptdee fituici
 
kagami_comput2015_8
kagami_comput2015_8kagami_comput2015_8
kagami_comput2015_8
 
βιωματική εργασία
βιωματική εργασία βιωματική εργασία
βιωματική εργασία
 
Huong dan hoan thien ho so 2014
Huong dan hoan thien ho so 2014Huong dan hoan thien ho so 2014
Huong dan hoan thien ho so 2014
 
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...
Проявление заботы и осмотрительности. Вопросы репродуктивного здоровья. Отнош...
 
Cách Trị Viêm Khớp Gối
Cách Trị Viêm Khớp GốiCách Trị Viêm Khớp Gối
Cách Trị Viêm Khớp Gối
 
AROTZGI SL
AROTZGI SLAROTZGI SL
AROTZGI SL
 

Similar a 1 understanding cyber threats

Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfMArshad35
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptxSibyJames1
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapanTapan Khilar
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.pptSeniorGaming
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxMuhammadKashif584561
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptJatinRajput67
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptvisik2
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptAnoop Mishra
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptfaadu1
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptHArshMangasuli
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptmohan jena
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.pptmabiratu
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptssuser77bda9
 

Similar a 1 understanding cyber threats (20)

Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
E-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptxE-commerce Security and Payment Systems.pptx
E-commerce Security and Payment Systems.pptx
 
presentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.pptpresentation_cybercrime_1486105587_257582.ppt
presentation_cybercrime_1486105587_257582.ppt
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
cyber crime
cyber crimecyber crime
cyber crime
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
cs0123.ppt
cs0123.pptcs0123.ppt
cs0123.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security-.ppt
Cyber-Security-.pptCyber-Security-.ppt
Cyber-Security-.ppt
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 

Más de mohamad Hamizi

7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats mohamad Hamizi
 
6 protecting your computer
6   protecting your computer 6   protecting your computer
6 protecting your computer mohamad Hamizi
 
5 instant messaging and email
5   instant messaging and email 5   instant messaging and email
5 instant messaging and email mohamad Hamizi
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices mohamad Hamizi
 
3 ensuring physical and data security
3   ensuring physical and data security 3   ensuring physical and data security
3 ensuring physical and data security mohamad Hamizi
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices mohamad Hamizi
 

Más de mohamad Hamizi (7)

8 login passwords
8   login passwords 8   login passwords
8 login passwords
 
7 social engineering and insider threats
7   social engineering and insider threats 7   social engineering and insider threats
7 social engineering and insider threats
 
6 protecting your computer
6   protecting your computer 6   protecting your computer
6 protecting your computer
 
5 instant messaging and email
5   instant messaging and email 5   instant messaging and email
5 instant messaging and email
 
4 mobile and remote best practices
4   mobile and remote best practices 4   mobile and remote best practices
4 mobile and remote best practices
 
3 ensuring physical and data security
3   ensuring physical and data security 3   ensuring physical and data security
3 ensuring physical and data security
 
2 cybersecurity best practices
2   cybersecurity best practices 2   cybersecurity best practices
2 cybersecurity best practices
 

Último

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 

Último (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

1 understanding cyber threats

  • 2.  Possibility of or attempt of gaining unauthorized "access to a device or system or network using a data communication pathway
  • 3. The 10 most common Cyber Threats  Malware  malicious software  computer viruses, worms, Trojan horses, dishonest spyware, and malicious rootkits
  • 4.  Computer virus  small piece of software that can spread from one infected computer to another  corrupt, steal, or delete data on your computer
  • 5.  Rogue security software  pop-up window that advertises a security update or alert on your computer screen
  • 6.  Trojan horse  infect their computers with Trojan horse software simply by downloading an application they thought was legitimate but was in fact malicious
  • 7.  Malicious spyware  used to describe the Trojan application that was created by cybercriminals to spy on their victims
  • 8.  Computer worm  software program that can copy itself from one computer to another, without human interaction  replicate in great volume and with great speed
  • 9.  Botnet  Group of computers connected to the Internet that have been compromised by a hacker using a computer virus or Trojan horse
  • 10.  Spam  security context is primarily used to describe email spam  unwanted messages in your email inbox  clutter your mailbox as well as potentially take up space on your mail server
  • 11.  Phishing  Fraudulent attempts by cybercriminals to obtain private information  Often appear in the guise of email messages designed to appear as though they are from legitimate sources
  • 12.  Rootkit  collection of tools that are used to obtain administrator-level access to a computer or a network of computers
  • 13. Who Are the Culprits Behind Cyberthreats?
  • 14.
  • 15.  How Do Cyberattacks Affect your Organization?  When your Organization is robbed digitally … the pool of suspects is limited to the number of people on the face of the earth that have a laptop and an Internet connection, because anybody with an Internet connection potentially can attack any other computer that's tied to the network.  So the barrier of entry is relatively low.
  • 16.  Your organization not only suffer direct financial losses due to cyberattacks but they also face enormous costs when they are victimized by large-scale data breaches following these attacks.  These costs include but are not limited to:  Investigation and forensic costs  Customer and partner communications costs  Public relations costs  Lost revenue due to a damaged reputation  Regulatory fines  Civil claims and legal fees