Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

Cyber Security

Levels of Web
Surface web is only the
part that we can see or
access in our daily life.
Here sites ends
with .com, .net, .edu, .or
4% g etc

Deep web is the part of


96% web that we cannot
access. It is highly
protected by passwords
and complex Hash.

Dark Web was created


by US Army for
Anonymity on
communication and
information transfer.
It needs special kind of
browsers and software
to access it. Here sites
ends with .onion
What is Cyber Security ?
Cyber Security refers to the protection created or provided for safe
guarding online information through the medium of internet.

Cyber security contains all aspects of security via, Physical, Technical,


Environmental, Regulations and Compliance including Third Parties
involved in delivering an objective.

Being Safe is utmost important in this ever evolving digital word as


security threats are increasing rapidly.
What is Cyber Security ?
Cyber security is impossible without the
proper combination of Confidentiality,
Integrity and Availability.
In

y
te

lit
g

a
rit

nti
Confidentiality measures are designed to y

de
nfi
protect against unauthorized disclosure of

Co
information.
Security

Integrity involves protection from


unauthorized modifications (e.g., add,
delete, or change) of data.
Availability
Availability is protecting the functionality of
support systems and ensuring data is fully
available at the point in time or period
requirements by its users.
Cyber Security Threats
1. VIRUS (Vital Information Resources Under Seize)
A computer virus is a computer program or a piece
of code that is loaded onto your computer without
your knowledge and run against your consent. Virus
has a property to replicate itself and spread itself
from one computer to another computer.

They usually transmits from internet and other


infected devices.
Cyber Security Threats

Solutions to be safe from VIRUS

• Downloading files form trusted web pages


• Do not copy medias and files from public
computers
• Install Antivirus and update it regularly
Cyber Security Threats

2. Hackers
In common a hacker is a person who breaks into
computers, usually by gaining access to administrative
controls. They make malicious attempt, using digital
technologies, to cause personal or property loss or damage,
and/or steal or alter confidential personal or organizational
data

Phishing | DDoS | Cookies Theft etc..


Cyber Security Threats

Solutions to be safe from Hackers

• It may be impossible to prevent computer hacking,


however effective security controls including strong
passwords, and the use of firewalls can help.
• Do not use Same or easy passwords.
• Do not store or write passwords.
• Try to memorize or store in safe place.
• Do not share OTPs and CVV online or strangers.
Cyber Security Threats

3. Malwares
The word "malware" comes from the term "MALicious
softWARE." Malware is any software that infects and
damages a computer system without the owner's
knowledge. They are software that we execute. It may hide
and run on background without your notice and transmit
your data over internet. Or even lock your computer and
with complex Hash encryption and demand for money.

It can also capture your key strokes and even access and
take photos, videos and screenshot from your device
Cyber Security Threats

Solutions to be safe from Malwares

• Download an anti-malware program that also helps prevent


infections.
• Do not download from unknown sources
• Install antivirus that has Firewall and internet security built in.
• Scheduled scan of computer using antivirus
• Search of miraculous software on your system and remove it.
Cyber Security Threats

4. Trojan Horse and Spams

Trojan Horse is any malware which misleads users of its


true intent. Trojans are generally spread by some form of
social engineering, for example where a user is duped into
executing an email attachment disguised to appear not
suspicious, (e.g., a routine form to be filled in), or by
clicking on some fake advertisement on social media or
anywhere else.
Cyber Security Threats

Solutions to be safe from Trojan Horse and Spam

• Download an anti-malware program that also helps prevent


infections.
• Do not download from unknown sources
• Install antivirus that has Firewall and internet security built in.
• Scheduled scan of computer using antivirus
• Search of miraculous software on your system and remove it.
Cyber Security Threats

5. Password Cracking
Password cracking is the process of recovering passwords
from data that has been stored in or transmitted by a
computer system. A common approach is to repeatedly try
guesses for the password and to check them against an
available cryptographic hash of the password.
Password cracking is done by specialized software and
algorithm.

Brute Force | Dictionary Attack | Rainbow table attack


Cyber Security Threats

Solutions to be safe from Password Cracking

• Using Strong Password


• Using different Pins for different sites
• Eliminate use of most commonly used password
• Using combination of uppercase, lowercase and symols
• Eliminate uses of own names and phone numbers
Cyber Security Threats

6. Social Engineering Hacking


Social engineering is the art of manipulating people so they give
up confidential information. when individuals are targeted the
criminals are usually trying to trick you into giving them your
passwords or bank information, or access your computer to
secretly install malicious software–that will give them access to
your passwords and bank information as well as giving them
control over your computer. it is usually easier to exploit your
natural inclination to trust than it is to discover ways to hack your
software.
Cyber Security Threats

Solutions to be safe from Social Engineering Hacking

• Reject any request for financial information or passwords


• Reject requests for help or offers of help
• Do not give away any kind of Personally identifiable
information.
• Be aware and take time
Cyber Security threats in Nepal
• NIC Asia swift hacked and transferred around 40 Crore
• FoodMandu data base hacked leaked personal info of 50K
Users
• Vianet data base hacked and leaked 170K Users data
• Chinese hacker hacked different ATMs and looted 35 million
• Rising no of Tech Startup and felling to provide appropriate
service due to competition on cost.
Cyber Security Scenario in Nepal
• NTA (Nepal Telecommunications Authority) has drafted
some rules regarding Cyber Security but its not specific. It
has created a department namely NepCERT (Nepal
Computer Emergency Response Team). They are
responsible for establishing cyber security.
• There has been Cyber Security Meet in Nepal from 2075.
• Nepal Police has a department – Cyber Bureau dedicated
for cyber security
Any Queries ???

The Safest System is one that is offline and is unplugged.


Thank You

2020 May 31

You might also like