Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13

CYBER SECURITY

Submitted to Submitted by
Miss Akansha Kathuria Divyansh Bajpai
ID- 22451108
BSc Animation and Gaming
Registration Screenshot
Contents
• Vulnerability
• Classification of vulnerabilities
• Technology weakness
• Configuration weakness
• Security policy weakness
• Threats
• Types of threats
What is vulnerability
Classification of Vulnerabilities
• Every network consists of vulnerabilities
which can be referred to as “soft spots”
• They might be present in network or can
be created by individual devices

Technology weakness

Vulnerabilities Configuration weakness

Security policy weakness

20
Technology weaknesses

• Fundamental security weaknesses


are common in computer and network
technologies
• It may be due to the following reasons:
• Network equipment weaknesses
• TCP/IP protocol weaknesses and
• Operating system weaknesses

21
Configuration Weaknesses

• This should be learnt by the


network engineers/network administrator
• It is essential to correctly configure the
network devices

22
Security policy weaknesses

• Unexpected security threats are created


due to Security policy weaknesses
• If the users do not follow the security
policy, the network can face security risks

24
What is threat
Types of Threats

Unstructured threats

Structured threats

Threats
External threats

Internal threats

25
Diagrammatic representation of Threat types

26
Conclusion
• Vulnerabilities and threats are major cause or
consequence of a Cyber Attack
• In this presentation we have discussed the important
types of vulnerabilities and threats

28
Thank you

You might also like