SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
Discover Cyber Security
Presented by: Mouneeb Shahid
#2wd
1.
@2webdesign
!
Discover
Cyber
Security
#2wd
1.
Top Cyber Security Issues
Impact of Compromising Security
7 Most Crucial Steps to Reinforce Cyber Security
Success Stories
Discover
Cyber
Security
@2webdesign
1.
@2webdesign
1. PHISHING
• spoof emails
• harvest details
• stolen funds
• misused identities
Cyber 

Security 

Issue #1

1.
@2webdesign
2. POISONED WEBSITES
• points to juicy story
• destination infects computer
• issue fake virus alert
• buy malware to get rid of virus
Cyber 

Security 

Issue #2

1.
@2webdesign
3. SOCIAL MEDIA
• spread Trojans, Worms and
Malware
• masked links
• can compromise networks
• Links to your website
Cyber 

Security 

Issue #3

1.
@2webdesign
4. DDOS ATTACKS
(DISTRIBUTED DENIAL OF
SERVICE)
• flood of traffic
• block real traffic
Cyber 

Security 

Issue #4

1.
@2webdesign
5. DATED BROWSERS,
APPLICATIONS
• gain access to emails
• forget to download updates for
add-ons
• learn about your “digital
shadow” (myshadow.org)
Cyber 

Security 

Issue #5

1.
@2webdesign
6. WEBSITE FILE
PERMISSIONS!
“lacking security configuration”
• websites can be compromised
• data can be stolen
• blacklisted from Google
Cyber 

Security 

Issue #6

1.
@2webdesign
7. OUTDATED HARDWARE
• Server hardware
• Firewalls and security
• Nation-wide / Global
accessibility
Cyber 

Security 

Issue #7

1.
@2webdesign
8. MOBILE BROWSERS/APPS
• may not be as secure as
desktop
• same device for personal and
work
• apps <vs> browsers
Cyber 

Security 

Issue #8

1.
@2webdesign
9. ERROR HANDLING
• missing pages and server
errors should be handled by
code
• display custom page
• do not divulge system
information to user
Cyber 

Security 

Issue #9

1.
@2webdesign
10.PRIVATE WEBSITE FILES
LEAKAGE
• Google permissions
• File permissions
• Using different servers
Cyber 

Security 

Issue #10

#2wd
1.
@2webdesign
Impact of
Compromised
Cyber
Security
#2wd
1.Government of Canada
Ashley Madison
Security
Compromise
@2webdesign
1.
@2webdesign
• Ashley Madison
Security
Compromise
1.
@2webdesign
• Government of Canada is
investing $140+ million in
cyber security
!
• RCMP, Public Safety Canada
• Communications Security
Establishment
• Canadian Security Intelligence
Service (CSIS)
Security
Compromise
1.
@2webdesign
• SVDNGOVERNANCE.com
Security
Compromise
1.
@2webdesign
• Lack of Credibility &
Reputation
• Damage trust
• Loss of revenue
Security
Compromise
#2wd
1.
@2webdesign
7 Steps to
Reinforce
Cyber
Security
1.
@2webdesign
STEP
1
1. WEBSITE SECURITY
POLICY
• acceptable internet use policy
• ban unrelated sites
• password controls
• rules for email safety & privacy
• social media policy
1.
@2webdesign
STEP
2
2. STAY UP-TO-DATE
• Meet industry standards
• Compliancy Standards
• Accessibility Standards
• Use experienced developers
1.
@2webdesign
STEP
3
3. PROTECTION
• Firewalls
• Antivirus
• Anti-malware
• Strong encryption (HTTPS)
• Display independent site
certification (TRUSTe)
1.
@2webdesign
STEP
4
4. BACKUP and BACKUP
again
• schedule regular backups
(utilize realtime-backups)
• plan for “disaster recovery”
1.
@2webdesign
STEP
5
5. MONITOR
• Hosting server use and
access
• Website traffic and visitors
1.
@2webdesign
STEP
6
6. CHOOSE SECURITY OVER
CONVENIENCE
• build security into website
design
• hard to retrofit security to a
website already under attack
1.
@2webdesign
STEP
7
7. WEBSITE
MANAGEMENT
SYSTEM
• Select the right Content
Management System for your
organization website
• Understand the risks with free
and open-source systems
1.
@2webdesign
Risk
Management
• Develop a Risk Management Plan !
1. Identify potential risks!
2. Create a Proposed Mitigation Plan
#2wd
1.
@2webdesign
www.websitesuccess.ca
#2WD
Thank you!
Converse with us on Twitter
!@2webdesign
@2webdesign

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Michael Boman
 

Was ist angesagt? (17)

Vishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM SpyingVishwadeep Presentation On NSA PRISM Spying
Vishwadeep Presentation On NSA PRISM Spying
 
Four ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicFour ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographic
 
Writing Secure Mobile Apps for Drones
Writing Secure Mobile Apps for DronesWriting Secure Mobile Apps for Drones
Writing Secure Mobile Apps for Drones
 
PhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-ComputingPhD-Guidance-in-Dependable-and-Secure-Computing
PhD-Guidance-in-Dependable-and-Secure-Computing
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
Mozilla wot dwika v5
Mozilla wot dwika  v5Mozilla wot dwika  v5
Mozilla wot dwika v5
 
Pro track
Pro trackPro track
Pro track
 
INFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile ComputingINFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile Computing
 
Stepping Up conference 2013
Stepping Up conference 2013Stepping Up conference 2013
Stepping Up conference 2013
 
The IoT Attack Surface
The IoT Attack SurfaceThe IoT Attack Surface
The IoT Attack Surface
 
Datashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - KingfinDatashur Presentation pin flash drive - Kingfin
Datashur Presentation pin flash drive - Kingfin
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08Privacy In Wireless Networks   Keeping Your Private Data Private 2008-08-08
Privacy In Wireless Networks Keeping Your Private Data Private 2008-08-08
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"
ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"
ISNGI 2016 - Keynote Speaker: Mr Wienke Giezeman - "The Things Network"
 
Security tips
Security tips Security tips
Security tips
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 

Andere mochten auch

Web Design Evaluation.doc
Web Design Evaluation.docWeb Design Evaluation.doc
Web Design Evaluation.doc
butest
 

Andere mochten auch (9)

Evaluating a website
Evaluating a websiteEvaluating a website
Evaluating a website
 
How To Evaluate a Web Design
How To Evaluate a Web DesignHow To Evaluate a Web Design
How To Evaluate a Web Design
 
Web Design Evaluation.doc
Web Design Evaluation.docWeb Design Evaluation.doc
Web Design Evaluation.doc
 
Evaluation design
Evaluation designEvaluation design
Evaluation design
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluation
 
The 5Ws of Web Site Evaluation
The 5Ws of Web Site EvaluationThe 5Ws of Web Site Evaluation
The 5Ws of Web Site Evaluation
 
Evaluating Websites For Learners
Evaluating Websites For LearnersEvaluating Websites For Learners
Evaluating Websites For Learners
 
Website evaluation
Website evaluationWebsite evaluation
Website evaluation
 
Website Evaluation Lesson
Website Evaluation Lesson Website Evaluation Lesson
Website Evaluation Lesson
 

Ähnlich wie Discover Cyber Security by 2 Web Design Inc.

En CCNA Security v11_ch01
En CCNA Security v11_ch01En CCNA Security v11_ch01
En CCNA Security v11_ch01
Ajith Pathirana
 

Ähnlich wie Discover Cyber Security by 2 Web Design Inc. (20)

Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...
Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...
Lessons Learned from the Top Four Cyber Security Breaches & How Your Company ...
 
Mitigating Web 2.0 Threats
Mitigating Web 2.0  ThreatsMitigating Web 2.0  Threats
Mitigating Web 2.0 Threats
 
News Bytes June 2012
News Bytes June 2012News Bytes June 2012
News Bytes June 2012
 
Newsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_DecNewsbytes_NULLHYD_Dec
Newsbytes_NULLHYD_Dec
 
Webinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise OrganizationsWebinar: CWAF for Mid Market/Enterprise Organizations
Webinar: CWAF for Mid Market/Enterprise Organizations
 
Better to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and SecurityBetter to Ask Permission? Best Practices for Privacy and Security
Better to Ask Permission? Best Practices for Privacy and Security
 
DarkWeb.pptx
DarkWeb.pptxDarkWeb.pptx
DarkWeb.pptx
 
Cloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and TechniquesCloud Security Engineering - Tools and Techniques
Cloud Security Engineering - Tools and Techniques
 
CyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID ExploitationsCyberArk Cleveland Defend Non-Human ID Exploitations
CyberArk Cleveland Defend Non-Human ID Exploitations
 
Cyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spyCyber espionage - Tinker, taylor, soldier, spy
Cyber espionage - Tinker, taylor, soldier, spy
 
Social Media And It's Effect on Security
Social Media And It's Effect on SecuritySocial Media And It's Effect on Security
Social Media And It's Effect on Security
 
Passwords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to goPasswords are passé. WebAuthn is simpler, stronger and ready to go
Passwords are passé. WebAuthn is simpler, stronger and ready to go
 
The Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutputThe Shifting Landscape of PoS MalwareOutput
The Shifting Landscape of PoS MalwareOutput
 
The Future of Cybersecurity and You
The Future of Cybersecurity and YouThe Future of Cybersecurity and You
The Future of Cybersecurity and You
 
HACKING AND PHISHING
HACKING AND PHISHINGHACKING AND PHISHING
HACKING AND PHISHING
 
Insecure Trends in Web 2.0
Insecure Trends in Web 2.0Insecure Trends in Web 2.0
Insecure Trends in Web 2.0
 
001 ho basic computer
001 ho basic computer001 ho basic computer
001 ho basic computer
 
Hackers are innocent
Hackers are innocentHackers are innocent
Hackers are innocent
 
All about Hacking
All about HackingAll about Hacking
All about Hacking
 
En CCNA Security v11_ch01
En CCNA Security v11_ch01En CCNA Security v11_ch01
En CCNA Security v11_ch01
 

Kürzlich hochgeladen

Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
amilabibi1
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
David Celestin
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 

Kürzlich hochgeladen (15)

SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
Bring back lost lover in USA, Canada ,Uk ,Australia ,London Lost Love Spell C...
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 
Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 

Discover Cyber Security by 2 Web Design Inc.