Cyber Security

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 10

Click to edit Master title style

Cyber Security
Chapter 5.5

1
Click to edit Master title style

What is cyber security


Cyber security is the practice of defending
computers, servers, mobile devices, electronic
systems, networks, and data from malicious
attacks. It's also known as information
technology security or electronic information
security 2 2
Click to edit Master title style

Brute-force attack
A type of cyber threat that involves
repeatedly inputting a password until
the correct one is found , to try and
break into an account or device

3 3
Click to edit
Security Master
Solution fortitle style
brute force attack

a limited
Two step
Strong number of
Biometric verification
password attempts at password
entering a
password

4 4
Click to edit Master title style

Data interception

5 5
Click to edit Master title style


Data interception and theft. Where data is
intercepted during transmission. This is done
using software called a packet sniffer, which
examines data packets as they are sent around
a network, or across the internet. The
information gathered is sent back to a hacker.

6 6
Click to edit Master title style
Data interception

7 7
Click to edit
Security Master
Solution fortitle
Datastyle
interception

A website that implements SSL/TLS has


"HTTPS" in its URL instead of "HTTP."
8 8
Click
SSL, ortoSecure
edit Master
Socketstitle style
Layer, is an encryption-based Internet security
protocol.
How does SSL/TLS work?
•In order to provide a high degree of privacy, SSL encrypts data
that is transmitted across the web. This means that anyone who
tries to intercept this data will only see a garbled mix of characters
that is nearly impossible to decrypt.
•SSL initiates an authentication process called a handshake
between two communicating devices to ensure that both devices
are really who they claim to be.
•SSL also digitally signs data in order to provide data integrity,
verifying that the data is not tampered with before reaching its
intended recipient. 9 9
Click to edit Master title style

Thank You

10

You might also like