Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

CYBER S E C U R IT Y

TEAM COMPUTERS
ROHIT GADPALE
THERE ARE FIVE TYPES OF NETWORK SECURITY

NETWORK SECURITY
APPLICATION SECURITY
END-POINTS SECURITY
EMAIL SECURITY
CLOUD SECURITY
WHAT IS CYBER SECURITY
• CYBER SECURITY IS THE PRACTICE OF DEFENDING COMPUTER, SERVERS, MOBILE DEVICES , ELECTRONIC
SYSTEMS, NETWORKS AND DATA FOR MALICIOUS ATTACKS

TYPES OF CYBER ATTACK


1. WEB-BASED ATTACK
2. SYSTEM BASED ATTACK
WEB-BASED ATTACK

• INJECTION ATTACKS
• DNS spoofing
• SESSION HIJACKING
• PHISHING
• BRUTE FORCE
SYSTEM BASED ATTACK

• VIRUS
• WORM-EMAIL
• TROJAN HORSE
• BACK DOORS
• BOTS
ARTIFICIAL INTELLIGENCE
• THE ABILITY OF A COMPUTER OR A ROBOT CONTROLLED BY A COMPUTER TO DO TASKS THAT ARE USUALLY
DONE BY HUMANS BECAUSE THEY REQUIRE HUMAN INTELLIGENCE AND DISCERNMENT.APPS FOR AI
App used :

• CORTANA
• SIRI
• REPLIKA
• DATA BOT
NETWORK SECURITY SOLUTION

• FIREWALL
• DDOS ( DISTRIBUTED DENIAL OF SERVICE )
• IPS/IDS
• WAF
• ADC ( APPLICATION DELIVERY CONTROLLERS )
COMPLIANCE
• COMPANIES HAVE TO FOLLOW A CERTAIN SET OF
RULES

• NOT COMPLYING CAN LEAD TO PUNISHMENT AND FEES


• DONE TO ENSURE COMPANIES FOLLOW DIFFERENT
STANDARDS
RANSOM WARE
• WHEN VICTIMS MISTAKENLY DOWNLOAD
MALWARE THROUGH EMAIL ATTACHMENTS OR
LINKS FROM UNKNOWN SOURCES 

• A RANSOM WARE ATTACK IS A TYPE OF


MALWARE ATTACK THAT ENCRYPTS A VICTIM'S
DATA AND PREVENTS ACCESS UNTIL A RANSOM
PAYMENT IS MADE.
THANK YOU

You might also like