Introducing To Cyber Security

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 9

CYBER SECURITY

PROJECT PRESENTATION
HAMZA SHAHANI, BSPD-S22-001
INTRODUCTION

● CYBERSECURITY IS THE PROTECTION OF INTERNET-CONNECTED SYSTEMS SUCH AS HARDWARE,


SOFTWARE AND DATA FROM CYBER THREATS. THE PRACTICE IS USED BY INDIVIDUALS AND
ENTERPRISES TO PROTECT AGAINST UNAUTHORIZED ACCESS TO DATA CENTERS AND OTHER
COMPUTERIZED SYSTEMS. A STRONG CYBERSECURITY STRATEGY CAN PROVIDE A GOOD SECURITY
POSTURE AGAINST MALICIOUS ATTACKS DESIGNED TO ACCESS, ALTER, DELETE, DESTROY OR EXTORT
AN ORGANIZATION'S OR USER'S SYSTEMS AND SENSITIVE DATA. CYBERSECURITY IS ALSO
INSTRUMENTAL IN PREVENTING ATTACKS THAT AIM TO DISABLE OR DISRUPT A SYSTEM'S OR
DEVICE'S OPERATIONS.
ADVANTAGE

○ THERE ARE SEVERAL CYBER SECURITY ADVANTAGES FOR COMPANIES AND INDIVIDUALS ALIKE.
○ IT CAN HELP YOU PROTECT YOUR DIGITAL ASSETS LIKE

✔ EMAILS,

✔ FINANCIAL DATA,

✔ PASSWORDS
○ AND OTHER SENSITIVE INFORMATION FROM FALLING INTO THE WRONG HANDS. DATA PROTECTION FROM UNAUTHORIZED ACCESS,
LOSS OR DELETION. PREVENTING FINANCIAL FRAUD AND EMBEZZLEMENT. PROTECTION OF INTELLECTUAL PROPERTY. PREVENTION
OF CYBER ESPIONAGE.PREVENTION OF FRAUD THROUGH FINANCIAL TRANSACTIONS LIKE WIRE TRANSFERS ETC. IMPROVES
CUSTOMER CONFIDENCE. IT HELPS IN PREVENTING FINANCIAL LOSS.
○ PROTECTS AGAINST VIRUSES, VARIOUS TYPES OF MALWARE AND RANSOM WARE ATTACKS. PROTECTS DATA FROM BEING EXPOSED
THROUGH HACKING OR THEFT ETC. IT PREVENTS DAMAGE TO HARDWARE THAT CAN IMPACT PRODUCTIVITY. CYBER SECURITY WILL
DEFEND US FROM CRITICAL CYBER- ATTACKS. IT HELPS US TO BROWSE THE SAFE WEBSITE. CYBER SECURITY WILL DEFEND US FROM
HACKS & VIRUS. THE APPLICATION OF CYBER SECURITY USED IN OUR PC NEEDS TO UPDATE EVERY WEEK. INTERNET SECURITY
PROCESSES ALL THE INCOMING & OUTGOING DATA ON OUR COMPUTER. IT HELPS TO REDUCE COMPUTER CHILLING & CRASHES. GIVES
US PRIVACY.
DISADVANTAGE
● IT WAS EXPENSIVE;
● MOST OF THE USERS CAN’T AFFORD THIS.
● A NORMAL USER CAN’T USE THIS PROPERLY, REQUIRING SPECIAL EXPERTISE.LACK OF KNOWLEDGE IS THE MAIN PROBLEM.
● IT WAS NOT EASY TO USE.IT MAKES THE SYSTEM SLOWER.
● IT COULD TAKE HOURS TO DAYS TO FIX A BREACH IN SECURITY. CYBERCRIME VIOLATES INDIVIDUALS' PRIVACY AND THE
SECURITY OF THEIR DATA, PARTICULARLY HACKING, MALWARE, IDENTITY THEFT, FINANCIAL FRAUD, MEDICAL FRAUD,
AND CERTAIN OFFENCES AGAINST PERSONS THAT INVOLVE THE REVEALING OF PERSONAL INFORMATION, MESSAGES,
IMAGES, AND VIDEO AND AUDIO RECORDINGS WITHOUT INDIVIDUALS' CONSENT OR PERMISSION.
● DATA IS CONSIDERED A COMMODITY ONLINE AND OFFLINE BY BOTH LEGAL AND ILLEGAL ACTORS (MARAS, 2016).
● FOR THIS REASON, DATA IS A PRIMARY TARGET OF CYBERCRIMINALS.
● DATA ALSO PLAYS AN INTEGRAL ROLE IN THE COMMISSION OF MANY CYBERCRIMES, PRIMARILY BECAUSE IT IS NOT
ADEQUATELY PROTECTED AND CAN BE ILLICITLY ACCESSED AND OBTAINED.
● DATA BREACHES HAVE RESULTED FROM LOST OR STOLEN ENCRYPTED FLASH DRIVES AND OTHER STORAGE DEVICES
(MAINLY LAPTOP AND SMARTPHONES), POOR SYSTEM AND DATA SECURITY, UNAUTHORIZED ACCESS TO THE DATABASE OR
THE EXCEEDING OF AUTHORIZED ACCESS TO A DATABASE, AND ACCIDENTAL DISCLOSURE, RELEASE OR PUBLICATION OF
DATA
USES
● BUSINESS PROTECTION AGAINST CYBER ATTACKS
AND DATA BREACHES. PROTECTION FOR DATA AND
NETWORKS. PREVENTION OF UNAUTHORIZED
USER ACCESS. IMPROVED RECOVERY TIME AFTER
A BREACH. PROTECTION FOR END USERS AND
ENDPOINT DEVICES. REGULATORY COMPLIANCE.
BUSINESS CONTINUITY. IMPROVED CONFIDENCE
IN THE COMPANY’S REPUTATION AND TRUST FOR
DEVELOPERS, PARTNERS, CUSTOMERS,
STAKEHOLDERS AND EMPLOYEES.
EDUCATED EMPLOYEES

● YOUR EMPLOYEES CAN HELP YOU WIN THE WAR AGAINST CYBER CRIME. EDUCATING YOUR PEOPLE
GIVES THEM THE KNOWLEDGE AND AWARENESS TO BECOME YOUR FIRST LINE OF DEFENSE,
EQUIPPED TO IDENTIFY AND REACT TO THREATS AS THEY HAPPEN. KEEP YOUR STAFF UP TO SPEED
WITH THE LATEST ACROSS A RANGE OF SECURITY TOPICS, FROM EMAIL BEST-PRACTISE AND
PHISHING TO RANSOM WARE, PASSWORD MANAGEMENT, AND PHYSICAL SECURITY. PUT SECURITY ON
THE AGENDA FOR EVERY EMPLOYEE AND BOOST ITS PROFILE BY INTEGRATING INTO YOUR
CORPORATE CULTURE FROM THE TOP DOWN. TOO MANY COMPANIES EXPOSE THEMSELVES TO
UNNECESSARY RISK BY FAILING TO GIVE SECURITY TRAINING THE PRIORITY IT DESERVES OR
MISALIGN WITH THEIR WIDER SECURITY MEASURES. SURPRISINGLY, ONLY 45% OF BUSINESSES IN A
MIME CAST STUDY MADE SECURITY TRAINING COMPULSORY FOR ALL EMPLOYEES.
●COMPANIES WILLING TO INVEST
BENEFIT FROM A ‘HUMAN
FIREWALL’ OF EDUCATED STAFF
TO KEEP WATCH, STAY ONE STEP
AHEAD OF ATTACKERS AND
MINIMIZE RISK.
EDUCATING STAFF
ADVANTAGES
A convincing spear-phishing email can be created in
minutes and research shows that 78% of employees will
click on a suspicious link, even when they recognise the
risk.Educating your staff to take simple precautions
makes a big difference. Train them to take
responsibility for everyday tasks like managing their
devices, protecting their passwords and securing their
information. These small steps will significantly shrink
your exposure to cyber attack.
CONCLUSION
● CYBERSECURITY IS A COMPLEX SUBJECT WHOSE UNDERSTANDING REQUIRES KNOWLEDGE AND EXPERTISE
FROM MULTIPLE DISCIPLINES, INCLUDING BUT NOT LIMITED TO COMPUTER SCIENCE AND INFORMATION
TECHNOLOGY, PSYCHOLOGYNOMICS, ORGANIZATIONAL BEHAVIOR, POLITICAL SCIENCE, ENGINEERING,
SOCIOLOGY, DECISION SCIENCES, INTERNATIONAL RELATIONS, AND LAW. IN PRACTICE, ALTHOUGH TECHNICAL
MEASURES ARE AN IMPORTANT ELEMENT, CYBERSECURITY IS NOT PRIMARILY A TECHNICAL MATTER,
ALTHOUGH IT IS EASY FOR POLICY ANALYSTS AND OTHERS TO GET LOST IN THE TECHNICAL DETAILS.
FURTHERMORE, WHAT IS KNOWN ABOUT CYBERSECURITY IS OFTEN COMPARTMENTED ALONG DISCIPLINARY
LINES, REDUCING THE INSIGHTS AVAILABLE FROM CROSS-FERTILIZATION.THIS PRIMER SEEKS TO ILLUMINATE
SOME OF THESE CONNECTIONS. MOST OF ALL, IT ATTEMPTS TO LEAVE THE READER WITH TWO CENTRAL
IDEAS. THE CYBERSECURITY PROBLEM WILL NEVER BE SOLVED ONCE AND FOR ALL. SOLUTIONS TO THE
PROBLEM, LIMITED IN SCOPE AND LONGEVITY THOUGH THEY MAY BE, ARE AT LEAST AS MUCH
NONTECHNICAL AS TECHNICAL IN NATURE.

You might also like