SlideShare a Scribd company logo
1 of 22
INTRODUCTION
Cybersecurity refers to a set of techniques used to
protect the integrity of networks, programs and data
from attack, damage or unauthorized access.
Three main aspects we are trying to control,
namely:
Unauthorized Access
Unauthorized Deletion
Unauthorized Modification
The CIA triad- is also commonly referred to as the
three pillars of security and most of the security
policies of an organization are built on these three
principles.
1. Confidentiality- the protection of personal
information.
2.Integrity- refers to methods of ensuring that data is
real, accurate and safeguarded from unauthorized
user modification.
3.Availability- refers to the ability of a user to
access information or resources in a specified
location and in the correct format.
HISTORY
Cybersecurity began in the 1970s when researcher Bob Thomas created
a computer programme called Creeper that could move across
ARPANET’s network.
1970- a number of security measures were developed, including
encryption algorithms, firewalls, and access control systems. The
development of the internet in the 1990s led to the creation of new
security protocols, such as the Secure Sockets Layer (SSL) and
Transport Layer Security (TLS), which are used to secure online
communications and transactions.
early 2000's- a number of high-profile cyberattacks, such as the Code
Red and Nimda worms, highlighted the growing threat of cybercrime.
HISTORY
Cybersecurity has been developed and advanced by a range of
individuals and organizations over time. It is difficult to attribute the
development of cybersecurity to any one person or group, as it has
evolved as a response to the changing threat landscape and the growth of
computer networks.
OTHER CONTRIBUTORS:
-Whitfield Diffie
-Martin Hellman
-Robert moris
HISTORY
Where did cybersecurity begin?
Cyber magazine takes a look at the history of cybersecurity from inception
to the present day.
Cybersecurity is becoming increasingly significant due to the increased
reliance on computer systems, the Internet and wireless network standards
such as Bluetooth and Wi-Fi, and due to the growth of smart devices and
the various devices that constitute the ‘Internet of things’.
1970s: ARAPNET and the Creeper
Cybersecurity began in the 1970s when researcher Bob Thomas created a computer
programme called Creeper that could move across ARPANET’s network, leaving a
breadcrumb trail wherever it went. Ray Tomlinson, the inventor of email, wrote the
programme Reaper, which chased and deleted Creeper.
HISTORY
1980s: Birth of the commercial antivirus
1987 was the birth year of commercial antivirus although there were competing
claims for the innovator of the first antivirus product. Andreas Lüning and Kai Figge
released their first antivirus product for the Atari ST – which also saw the release of
Ultimate Virus Killer in 1987. Three Czechoslovakians created the first version of
the NOD antivirus in the same year and in the US, John McAfee founded McAfee
and released VirusScan.
1990s: The world goes online
With the internet becoming available to the public, more people began putting their
personal information online. Organised crime entities saw this as a potential source
of revenue and started to steal data from people and governments via the web. By the
middle of the 1990s, network security threats had increased exponentially and
firewalls and antivirus programmes had to be produced on a mass basis to protect the
public.
HISTORY
2000s: Threats diversify and multiply
In the early 2000s crime organisations started to heavily fund
professional cyberattacks and governments began to clamp down on the
criminality of hacking, giving much more serious sentences to those
culpable. Information security continued to advance as the internet grew
as well but, unfortunately, so did viruses.
2021: The next generation
The cybersecurity industry is continuing to grow at the speed of light.
The global cybersecurity market size is forecast to grow to $345.4bn by
2026 according to Statista. Ransomware is one of the most common
threats to any organisation's data security and is forecast to continue to
increase.
DEFINITION
Cyber security is the application of
technologies, processes, and controls to
protect systems, networks, programs, devices
and data from cyber attacks.
5 types of cyber security:
1. Critical infrastructure cyber security
2. Network security
3. Cloud security
4. IoT (Internet of Things) security
5. Application security
DEFINITION
1. Critical infrastructure cyber security
-Critical infrastructure organisations are often more vulnerable to attack
than others because SCADA (supervisory control and data acquisition)
systems often rely on older software.
2. Network security
-Network security involves addressing vulnerabilities affecting your
operating systems and network architecture, including servers and hosts,
firewalls and wireless access points, and network protocols.
3. Cloud security
-Cloud security is concerned with securing data, applications, and
infrastructure in the Cloud.
DEFINITION
4. IoT (Internet of Things) security
-IoT security involves securing smart devices and networks
connected to the IoT. IoT devices include things that connect
to the Internet without human intervention, such as smart fire
alarms, lights, thermostats, and other appliances.
5. Application security
-Application security involves addressing vulnerabilities
resulting from insecure development processes in designing,
coding, and publishing software or a website.
EXAMPLES: LATEST TRENDS
Examples of Network Security includes:
• Antivirus and Antispyware programs,
• Firewall that block unauthorized
access to a network and
• VPNs (Virtual Private Networks) used
for secure
EXAMPLES: LATEST TRENDS
Latest Trends:
1. Rise of Automotive Hacking
2. Potential of Artificial Intelligence (AI)
3. Mobile is the New Target
4. Cloud is Also Potentially Vulnerable
5. Data Breaches: Prime target
6. IoT with 5G Network: The New Era of
Technology and Risks
7. Automation and Integration
8. Targeted Ransomware
9. State-Sponsored Cyber Warfare
NEWS RELATED ARTICLES
◆ Kimsuky Updates its Tactics to
Target South Korean Experts
Threat Actors (March 24, 2023)
Cyware Alerts - Hacker News
◆ Black Magic APT Targets Ukraine
with CommonMagic and
PowerMagic Breaches and
Incidents (March 24, 2023)
Cyware Alerts - Hacker News
NEWS RELATED ARTICLES
◆ Hacktivists Increasingly Claim to
Target and Impact OT
◆ NETWORK SECURITYCisco
Patches High-Severity
Vulnerabilities in IOS Software
◆ Hackers inject credit card
stealers into payment processing
modules
ADVANTAGES
1. Protects sensitive personal information
-Cyber Security can prevent such attacks in the
first place as it is a proactive approach.
2. Protect private and Business data
-Cyber Security is a complete security package
that can protect businesses and organisations
from various threats.
3. Improves productivity
-An effective Cyber Security strategy can give
an early warning on when to expect attacks and
give suggestions on how to respond.
ADVANTAGES
4. Provides a business continuity plan
-Cyber Security uses Artificial Intelligence (AI)
and machine learning to create a business
continuity plan.
5. Improve the overall security of an organisation
-Cyber Security is a one-stop solution for all
security issues for businesses and
organisations.
DISADVANTAGES
1. Regular Update
-Businesses need to regularly update their
software, hardware, and security strategy to be
one step ahead of the attackers.
2. Needs Continuous learning
-The threats are new and never-ending, and so
is the learning process to keep up with the
threats.
3. Complex to Setup
-Setting up security architectures and tools like
a firewall can be complicated and could take a
long time.
DISADVANTAGES
4. Slower Systems
-Over time, Systems tend to become sluggish as running
these security applications takes up a lot of resources.
5. Constant Monitoring
-An effective Cyber Security strategy involves continuous
monitoring of new threats.
6. Talent Shortage
-Cyber Security is vast, and there's a significant talent
shortage in this field.
7. Expensive
-Implementing Cyber Security can be very expensive as it
is an ongoing process that requires consistent learning and
spending.
SUMMARY
Over the years, the term Cyber Security has gained much
importance and become a common part of each one’s life who is associated
with a computer or a smartphone device. When people submit their data
online, it becomes vulnerable to cyber-attacks or cyber-crimes.
Moreover, cyber-attacks can happen over an external facing DNS
server or an internal firewall, which in turn effects the data and
infrastructure within the enterprise that inherently causes significant
damage to the business of the associated organization.
Cyber Security offers security, from unauthorized access or
exploitation, through online services to the massive data, associated
appliances and network that is used for communication.
CONCLUSION
In conclusion, information is a critical part of any
organization and investing on the right service provider keeps your
business in safe hands in the ever-expanding IoT (Internet of Things)
world.
A scalable and customized cyber security-driven business
model includes disaster-recovery capabilities and secures data and the
underlying infrastructure of the organization, thus building a safe
barrier for the information even before it is attacked and saving the
organization from a loss of billions of dollars that could result from
the security threat.
REFERENCES:
https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.edureka.co/blog/what-is-
cybersecurity/amp/&ved=2ahUKEwiB4q-ugfL9AhWhR2wGHa5UB-
IQFnoECC4QAQ&usg=AOvVaw2yLUdOD9SfH9hRhZjwGftQ
https://cybermagazine.com/cyber-security/history-cybersecurity
https://www.theknowledgeacademy.com/blog/advantages-and-disadvantages-of-cybersecurity/
https://www.knowledgehut.com/blog/security/cyber-security-trends
https://images.app.goo.gl/NHZWwbcFrrUVACNL7
https://images.app.goo.gl/m8sbTYQHH6HLEosLA
https://www.google.com/imgres?imgurl=https%3A%2F%2Fexecutiveacademy.at%2Ffileadmin_synced_asset
s%2F_processed_%2Fc%2Fc%2Fcsm_filler-news-cyber-security-best-practices-
verordnung1_32070b9668.jpg&tbnid=xfXUl0zmLStxrM&vet=1&imgrefurl=https%3A%2F%2Fexecutiveaca
demy.at%2Fen%2Fnews%2Fdetail%2Fcybersecurity-from-best-practice-to-
regulation&docid=UJ06Rniw2aHKyM&w=1200&h=632&hl=en-US&source=sh%2Fx%2Fim

More Related Content

What's hot

Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentationVishakha Kumar
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICTKak Yong
 
Internet of things
Internet of thingsInternet of things
Internet of thingsPalak Sood
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGAYESHA JAVED
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeAung Thu Rha Hein
 
Information Technology policy
Information Technology policyInformation Technology policy
Information Technology policymarindi
 
Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs) Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs) Khaleel Al Bataineh
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 

What's hot (20)

Iot - Internet of Things
Iot - Internet of ThingsIot - Internet of Things
Iot - Internet of Things
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
87 seminar presentation
87 seminar presentation87 seminar presentation
87 seminar presentation
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
INTRODUCTION TO ICT
INTRODUCTION TO ICTINTRODUCTION TO ICT
INTRODUCTION TO ICT
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKINGINTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
INTERNET OF THING PRESENTATION ON PUBLIC SPEAKING
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Internet Of Things
 Internet Of Things Internet Of Things
Internet Of Things
 
Information Technology policy
Information Technology policyInformation Technology policy
Information Technology policy
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs) Information and Communication Technologies (ICTs)
Information and Communication Technologies (ICTs)
 
IoT security
IoT securityIoT security
IoT security
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 

Similar to Cyber Security

Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxNigussMehari4
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...IJCSIS Research Publications
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityIJRES Journal
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docxssuser719d6b
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developerstechtutorus
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptxRishabhDwivedi70
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docxballolliemin
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443WoMaster
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfonline Marketing
 

Similar to Cyber Security (20)

Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
The evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docxThe evolution and growth of cybersecurity.docx
The evolution and growth of cybersecurity.docx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
The Sharp Increase in Unmasking of Obtrusion into Internet of Things (IoT) IP...
 
Peripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network SecurityPeripheral Review and Analysis of Internet Network Security
Peripheral Review and Analysis of Internet Network Security
 
C018131821
C018131821C018131821
C018131821
 
cybersecurity essay.docx
cybersecurity essay.docxcybersecurity essay.docx
cybersecurity essay.docx
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Forensics
ForensicsForensics
Forensics
 
CS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptxCS_UNIT 2(P3).pptx
CS_UNIT 2(P3).pptx
 
Cyber security for Developers
Cyber security for DevelopersCyber security for Developers
Cyber security for Developers
 
Rishabhcyber security.pptx
Rishabhcyber security.pptxRishabhcyber security.pptx
Rishabhcyber security.pptx
 
IJISRT22MAR7471.docx
IJISRT22MAR7471.docxIJISRT22MAR7471.docx
IJISRT22MAR7471.docx
 
The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443The new era of Cyber Security IEC62443
The new era of Cyber Security IEC62443
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 

Recently uploaded

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Cyber Security

  • 1.
  • 2. INTRODUCTION Cybersecurity refers to a set of techniques used to protect the integrity of networks, programs and data from attack, damage or unauthorized access. Three main aspects we are trying to control, namely: Unauthorized Access Unauthorized Deletion Unauthorized Modification
  • 3. The CIA triad- is also commonly referred to as the three pillars of security and most of the security policies of an organization are built on these three principles. 1. Confidentiality- the protection of personal information. 2.Integrity- refers to methods of ensuring that data is real, accurate and safeguarded from unauthorized user modification. 3.Availability- refers to the ability of a user to access information or resources in a specified location and in the correct format.
  • 4. HISTORY Cybersecurity began in the 1970s when researcher Bob Thomas created a computer programme called Creeper that could move across ARPANET’s network. 1970- a number of security measures were developed, including encryption algorithms, firewalls, and access control systems. The development of the internet in the 1990s led to the creation of new security protocols, such as the Secure Sockets Layer (SSL) and Transport Layer Security (TLS), which are used to secure online communications and transactions. early 2000's- a number of high-profile cyberattacks, such as the Code Red and Nimda worms, highlighted the growing threat of cybercrime.
  • 5. HISTORY Cybersecurity has been developed and advanced by a range of individuals and organizations over time. It is difficult to attribute the development of cybersecurity to any one person or group, as it has evolved as a response to the changing threat landscape and the growth of computer networks. OTHER CONTRIBUTORS: -Whitfield Diffie -Martin Hellman -Robert moris
  • 6. HISTORY Where did cybersecurity begin? Cyber magazine takes a look at the history of cybersecurity from inception to the present day. Cybersecurity is becoming increasingly significant due to the increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of smart devices and the various devices that constitute the ‘Internet of things’. 1970s: ARAPNET and the Creeper Cybersecurity began in the 1970s when researcher Bob Thomas created a computer programme called Creeper that could move across ARPANET’s network, leaving a breadcrumb trail wherever it went. Ray Tomlinson, the inventor of email, wrote the programme Reaper, which chased and deleted Creeper.
  • 7. HISTORY 1980s: Birth of the commercial antivirus 1987 was the birth year of commercial antivirus although there were competing claims for the innovator of the first antivirus product. Andreas Lüning and Kai Figge released their first antivirus product for the Atari ST – which also saw the release of Ultimate Virus Killer in 1987. Three Czechoslovakians created the first version of the NOD antivirus in the same year and in the US, John McAfee founded McAfee and released VirusScan. 1990s: The world goes online With the internet becoming available to the public, more people began putting their personal information online. Organised crime entities saw this as a potential source of revenue and started to steal data from people and governments via the web. By the middle of the 1990s, network security threats had increased exponentially and firewalls and antivirus programmes had to be produced on a mass basis to protect the public.
  • 8. HISTORY 2000s: Threats diversify and multiply In the early 2000s crime organisations started to heavily fund professional cyberattacks and governments began to clamp down on the criminality of hacking, giving much more serious sentences to those culpable. Information security continued to advance as the internet grew as well but, unfortunately, so did viruses. 2021: The next generation The cybersecurity industry is continuing to grow at the speed of light. The global cybersecurity market size is forecast to grow to $345.4bn by 2026 according to Statista. Ransomware is one of the most common threats to any organisation's data security and is forecast to continue to increase.
  • 9. DEFINITION Cyber security is the application of technologies, processes, and controls to protect systems, networks, programs, devices and data from cyber attacks. 5 types of cyber security: 1. Critical infrastructure cyber security 2. Network security 3. Cloud security 4. IoT (Internet of Things) security 5. Application security
  • 10. DEFINITION 1. Critical infrastructure cyber security -Critical infrastructure organisations are often more vulnerable to attack than others because SCADA (supervisory control and data acquisition) systems often rely on older software. 2. Network security -Network security involves addressing vulnerabilities affecting your operating systems and network architecture, including servers and hosts, firewalls and wireless access points, and network protocols. 3. Cloud security -Cloud security is concerned with securing data, applications, and infrastructure in the Cloud.
  • 11. DEFINITION 4. IoT (Internet of Things) security -IoT security involves securing smart devices and networks connected to the IoT. IoT devices include things that connect to the Internet without human intervention, such as smart fire alarms, lights, thermostats, and other appliances. 5. Application security -Application security involves addressing vulnerabilities resulting from insecure development processes in designing, coding, and publishing software or a website.
  • 12. EXAMPLES: LATEST TRENDS Examples of Network Security includes: • Antivirus and Antispyware programs, • Firewall that block unauthorized access to a network and • VPNs (Virtual Private Networks) used for secure
  • 13. EXAMPLES: LATEST TRENDS Latest Trends: 1. Rise of Automotive Hacking 2. Potential of Artificial Intelligence (AI) 3. Mobile is the New Target 4. Cloud is Also Potentially Vulnerable 5. Data Breaches: Prime target 6. IoT with 5G Network: The New Era of Technology and Risks 7. Automation and Integration 8. Targeted Ransomware 9. State-Sponsored Cyber Warfare
  • 14. NEWS RELATED ARTICLES ◆ Kimsuky Updates its Tactics to Target South Korean Experts Threat Actors (March 24, 2023) Cyware Alerts - Hacker News ◆ Black Magic APT Targets Ukraine with CommonMagic and PowerMagic Breaches and Incidents (March 24, 2023) Cyware Alerts - Hacker News
  • 15. NEWS RELATED ARTICLES ◆ Hacktivists Increasingly Claim to Target and Impact OT ◆ NETWORK SECURITYCisco Patches High-Severity Vulnerabilities in IOS Software ◆ Hackers inject credit card stealers into payment processing modules
  • 16. ADVANTAGES 1. Protects sensitive personal information -Cyber Security can prevent such attacks in the first place as it is a proactive approach. 2. Protect private and Business data -Cyber Security is a complete security package that can protect businesses and organisations from various threats. 3. Improves productivity -An effective Cyber Security strategy can give an early warning on when to expect attacks and give suggestions on how to respond.
  • 17. ADVANTAGES 4. Provides a business continuity plan -Cyber Security uses Artificial Intelligence (AI) and machine learning to create a business continuity plan. 5. Improve the overall security of an organisation -Cyber Security is a one-stop solution for all security issues for businesses and organisations.
  • 18. DISADVANTAGES 1. Regular Update -Businesses need to regularly update their software, hardware, and security strategy to be one step ahead of the attackers. 2. Needs Continuous learning -The threats are new and never-ending, and so is the learning process to keep up with the threats. 3. Complex to Setup -Setting up security architectures and tools like a firewall can be complicated and could take a long time.
  • 19. DISADVANTAGES 4. Slower Systems -Over time, Systems tend to become sluggish as running these security applications takes up a lot of resources. 5. Constant Monitoring -An effective Cyber Security strategy involves continuous monitoring of new threats. 6. Talent Shortage -Cyber Security is vast, and there's a significant talent shortage in this field. 7. Expensive -Implementing Cyber Security can be very expensive as it is an ongoing process that requires consistent learning and spending.
  • 20. SUMMARY Over the years, the term Cyber Security has gained much importance and become a common part of each one’s life who is associated with a computer or a smartphone device. When people submit their data online, it becomes vulnerable to cyber-attacks or cyber-crimes. Moreover, cyber-attacks can happen over an external facing DNS server or an internal firewall, which in turn effects the data and infrastructure within the enterprise that inherently causes significant damage to the business of the associated organization. Cyber Security offers security, from unauthorized access or exploitation, through online services to the massive data, associated appliances and network that is used for communication.
  • 21. CONCLUSION In conclusion, information is a critical part of any organization and investing on the right service provider keeps your business in safe hands in the ever-expanding IoT (Internet of Things) world. A scalable and customized cyber security-driven business model includes disaster-recovery capabilities and secures data and the underlying infrastructure of the organization, thus building a safe barrier for the information even before it is attacked and saving the organization from a loss of billions of dollars that could result from the security threat.
  • 22. REFERENCES: https://www.google.com/url?sa=t&source=web&rct=j&url=https://www.edureka.co/blog/what-is- cybersecurity/amp/&ved=2ahUKEwiB4q-ugfL9AhWhR2wGHa5UB- IQFnoECC4QAQ&usg=AOvVaw2yLUdOD9SfH9hRhZjwGftQ https://cybermagazine.com/cyber-security/history-cybersecurity https://www.theknowledgeacademy.com/blog/advantages-and-disadvantages-of-cybersecurity/ https://www.knowledgehut.com/blog/security/cyber-security-trends https://images.app.goo.gl/NHZWwbcFrrUVACNL7 https://images.app.goo.gl/m8sbTYQHH6HLEosLA https://www.google.com/imgres?imgurl=https%3A%2F%2Fexecutiveacademy.at%2Ffileadmin_synced_asset s%2F_processed_%2Fc%2Fc%2Fcsm_filler-news-cyber-security-best-practices- verordnung1_32070b9668.jpg&tbnid=xfXUl0zmLStxrM&vet=1&imgrefurl=https%3A%2F%2Fexecutiveaca demy.at%2Fen%2Fnews%2Fdetail%2Fcybersecurity-from-best-practice-to- regulation&docid=UJ06Rniw2aHKyM&w=1200&h=632&hl=en-US&source=sh%2Fx%2Fim