Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

WHAT IS CYBER SECURITY

Cyber security is the practice of defending


computers, servers, mobile devices,
electronic systems, networks, and data
from malicious attacks. It's also known as
information technology security or
electronic information security. The term
applies in a variety of contexts, from
business to mobile computing, and can be
divided into a few common categories.
Types Of Cyber Attacks

• Denial-of-service (DoS) and


distributed denial-of-service (DDoS)
attacks.
• Man-in-the-middle (MitM) attack.
• Phishing and spear phishing attacks.
• Drive-by attack.
• Password attack.
• SQL injection attack.
• Cross-site scripting (XSS) attack.
• Eavesdropping attack.
TYPES OF CYBER SECURITY MANAGEMENT

• Network security
• Application security
• Information
security
• Operational security
• Cloud Security
Network Security
It is the practice of securing a computer network from
intruders, whether targeted attackers or opportunistic
malware.
 Access control.
 Antivirus and anti-
malware software. ...
 Application security. ...
 Behavioral analytics. ...
 Data loss prevention. ...
 Distributed denial of
service prevention. ...
 Email security. ...
 Firewalls.
Application Security
It Focuses on keeping software and devices free
of threats.

Authentication
Authorization
Encryption
Logging
Application security
testing
Information Security
It protects the integrity and privacy of data, both in
storage and in transit.
Various Risks……
 Identifying information and
related assets,potential threats, vulnareb
ilits and impacts
 Evaluating the risks
 Deciding how to address or treat the
risks
 Where risk mitigation is required,
selecting or designing appropriate
security controls.
 Making adjustments as necessary to
address any issues.
Operational Security
It includes the processes and decisions
for handling and protecting data.
Various Securities:-

 Firewalls.
 Network Access Control (NAC)
Devices.
 Routers.
 Switches.
 Web Application Firewalls
(WAFs)
 Proxy Servers.
Cloud Security
Cloud security is a software-based security tool that protects
and monitors the data in your cloud resources.

Various Risks
 Distributed-Denial-of-Service Attacks.
 Shared Cloud Computing Services.
 Employee Negligence.
 Data Loss and Data Backups.
 Social Engineering Attacks.
 System Vulnerabilities.
Types Of Hackers And Attackers

White Hat

Grey Hat

Black Hat
White Hat Hacker (Good One)

White Hat :- These are good hackers


and have genuine licence for hacking.
The hacking performed by them is to
protect government or big companies
and to built a cyber security
infrastructure. They are good hackers.
Grey Hat Hacker (Only Works For Money)

Grey Hat :- They are called by companies


to attack on there companies to test
there company’s security system. They
are also called to hack another company
in the competetion or even make D-Dos
attacks on there compitetive companies
Black Hat Hacker (Bad One)

Black Hat :- These are bad hackers and


perform Unethical hacking to hack big
companies either to hack there bank
account or to blackmail them and to take
the financial advantage. Eg:- “These are
the hackers who hack your bank
accounts, Social Media account”
Need Of Cyber Security
 Cyber security is important because it encompasses
everything to protecting our sensitive data personally
identifiable information personal information, and
governmental information systems from theft and
damage attempted by hackers.
 Cyber Attack risk is increasing due to global
connectivity and usage of cloud services, Eg:-Amazon
Web Services, to store sensitive data and personal
information. Poor security level is serious threat.
 Gone are the days of simple firewalls and antivirus
software being your sole security measures. Business
leaders can no longer leave Information security to
cybersecurity professionals.
How To Keep Yourself Secured From Hackers
There are three simple steps you can take you
increase security and reduce risk of cybercrime:

 Educate all levels of your organization about the


risks of social engineering and common social
engineering scams like phishing emails.
 Invest in tools that limit information loss, monitor
your third-party risk and fourth party risk vendor
risk and continuously scan for data exposure and
leak credentials.
 Use technology to reduce costs like automatically
sending out vendor assessment questionnaires as
part of an overall cyber security risk
assessment strategy

You might also like