SlideShare ist ein Scribd-Unternehmen logo
1 von 26
Cyber Defense Principles
CYBERSECURITY
is everyone’s
responsibility.
THE INTERNET
Desktop Computer
Owned by few people.
Telecom companies began serving internet thru their telephone lines.
Super Computers
Only owned by big companies and universities.
Smart Devices Owned by almost everyone. Each of devices are now capable of accessing the internet.
3
INTERNET OF THINGS
EVERY
“THING ”
CONNECTED.
4
What you can do?
Anything
What can you find

Everything
Who is in there?
Everyone
INTERNET OF THINGS
INTERNET OF THINGS
WHATIS THE PRICE?
SECURITY
EXTORTION
MALWARES
IDENTITY THEFT
ESPIONAGE
INTERNET OF THINGS
WHATIS THE PRICE?
Xiaomi Electric Scooters Vulnerable to Life-Threatening Remote Hacks
In the article of
(2019), researchers
Khandelwal
from
Zimperium
security flaw
have discovered a
in M365 Folding
Electric Scooter by Xiaomi.
lock
Attackers
the scooter
can remotely
in the mid-traffic
and /or deploy
can full take
without
a malware that
control of the
the user
machine
knowledge.
Reference: Swati Khandelwal, The Hacker News
DEEP WEB
A huge part of
The Internet you
don’t normally
See.
SURFACE WEB Anything that can
be search on
Google, Yahoo, etc.
The darker part of
Deep web that
contains Illegal
activities.
DARK WEB
Retrieved from:
https://blog.dashburst.com
/
Our Goal is providing order
The 3 key areasof Cyber Security that needs to be protected.
A
Availability
Information must be
accessible when and
where it is needed.
C
Confidentiality
Information must not be
exposed or accessed by
any unauthorized
individual.
I
Integrity
Information must be
consistent and
correct unless an
authorized change
was made.
10
11
‱ Being paranoid.
‱ Thinking on the other side.
‱ Continuous learning.
‱ Providing awareness.
‱ Practicing what you preach.
MINDSET
CYBERDEFENSING
<PHISHING>
A social engineering technique used by cybercriminals to fool computer users to disclose personal
information or installing a malware to your system. Usually in a form of website or emails with attachments.
Image taken from:Cloudfront.net
MASS-SCALE
PHISHING
Cyber criminalsuse
wide-rangeattacks
that aren’t highly
targeted.
Image taken from:asstatic.com
WHALING
Same as spear
phish, butit
targets high
profileperson
such asCEOs,
CFOsetc.
Image takenfrom:yottaweb.net
SPEAR
PHISHING
Targets a specific
individual,
seekingunauthorized
access to sensitive
information.
<PHISHING>
PHISHING WEBSITE LEGIT WEBSITE
Banks will never ask these information
toyou.
12
CYBERDEFENSING
Poor email and grammar
composition.
<PHISHING>
PHISHING EMAIL PHISHING SMS
CYBERDEFENSING
13
CYBERDEFENSING
<PHISHING>
LEGIT WEBSITE PHISHING WEBSITE
14
CYBERDEFENSI
NG
<PHISHING>
Phish targeting IOS Phones
15
CYBERDEFENSING
<PHISHING>
16
18
What y ou share can also be used
ag ainst y ou.
POSTING YOUR TANTRUMS
Hate post will not solve anything.
But it will have an impact your
personal image on cyber space and
real life.
CYBERDEFENSING
19
CHECK-IN AND LOCATION ON POST
Not only does your status information
tell somebody where you currently are, it
also tells them where you aren’t. This
information can be just as dangerous in
the hands of criminals.
20
CYBERDEFENSING
PASSWORD SHARING
You don’t need to share your
account password to your
partner. Relationships should
be trust- centric.
CYBERDEFENSING
20
PUTTING MIDDLE NAME
Your Mother’s maiden name is
being used as part of
verification on financial
institutions. This can be very
prone to identity theft.
CYBERDEFENSING
21
PUTTING MOBILE PHONES
Accounts can be searched thru mobile
number. A clear way of saying that
everyone you like or not can reach you
thru SMS.
CYBERDEFENSING
22
TREATING SOCIAL MEDIA AS A DIARY
The more information you provide, the higher
chance of you being victimized.
CYBERDEFENSING
23
CYBERDEFENSING
ofget the fesume, son. Let's just
take a look at what you have posted on
you-r fac.ebook instead.
Reference: http://careerandhumanresources.blogcommunity.com
27
ESTABLISH YOUR
PERIMETER DEFENSE

Weitere Àhnliche Inhalte

Ähnlich wie 1_3_Cyber_Defense_Principle.pptx

Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
IT for Managers
IT for ManagersIT for Managers
IT for ManagersPramod P Nair
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.Hussain777
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityJay Moliya
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptxRajviNikeetaRathore
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfKira Dess
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Ambrish Mishra
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02raja jawahar
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device securityCAS
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guideGary Gray, MCSE
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022CapRockTelephone
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfNirGoldstein5
 

Ähnlich wie 1_3_Cyber_Defense_Principle.pptx (20)

Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
IT for Managers
IT for ManagersIT for Managers
IT for Managers
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Crimes in digital marketing..pptx
Crimes in digital marketing..pptxCrimes in digital marketing..pptx
Crimes in digital marketing..pptx
 
cyber crime
cyber crimecyber crime
cyber crime
 
cybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdfcybercrime-131020055545-phpapp02.pdf
cybercrime-131020055545-phpapp02.pdf
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02Cybercrime 131020055545-phpapp02
Cybercrime 131020055545-phpapp02
 
Computer crime
 Computer crime Computer crime
Computer crime
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Smart phone and mobile device security
Smart phone and mobile device securitySmart phone and mobile device security
Smart phone and mobile device security
 
cybercrime survival guide
cybercrime survival guidecybercrime survival guide
cybercrime survival guide
 
Cybersecurity Training 2022
Cybersecurity Training 2022Cybersecurity Training 2022
Cybersecurity Training 2022
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
parabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdfparabcswithout-front-200320113631.pdf
parabcswithout-front-200320113631.pdf
 

KĂŒrzlich hochgeladen

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

KĂŒrzlich hochgeladen (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

1_3_Cyber_Defense_Principle.pptx

  • 3. THE INTERNET Desktop Computer Owned by few people. Telecom companies began serving internet thru their telephone lines. Super Computers Only owned by big companies and universities. Smart Devices Owned by almost everyone. Each of devices are now capable of accessing the internet. 3
  • 5. What you can do? Anything What can you find
 Everything Who is in there? Everyone INTERNET OF THINGS
  • 6. INTERNET OF THINGS WHATIS THE PRICE? SECURITY EXTORTION MALWARES IDENTITY THEFT ESPIONAGE
  • 7. INTERNET OF THINGS WHATIS THE PRICE? Xiaomi Electric Scooters Vulnerable to Life-Threatening Remote Hacks In the article of (2019), researchers Khandelwal from Zimperium security flaw have discovered a in M365 Folding Electric Scooter by Xiaomi. lock Attackers the scooter can remotely in the mid-traffic and /or deploy can full take without a malware that control of the the user machine knowledge. Reference: Swati Khandelwal, The Hacker News
  • 8. DEEP WEB A huge part of The Internet you don’t normally See. SURFACE WEB Anything that can be search on Google, Yahoo, etc. The darker part of Deep web that contains Illegal activities. DARK WEB Retrieved from: https://blog.dashburst.com /
  • 9. Our Goal is providing order The 3 key areasof Cyber Security that needs to be protected. A Availability Information must be accessible when and where it is needed. C Confidentiality Information must not be exposed or accessed by any unauthorized individual. I Integrity Information must be consistent and correct unless an authorized change was made. 10
  • 10. 11 ‱ Being paranoid. ‱ Thinking on the other side. ‱ Continuous learning. ‱ Providing awareness. ‱ Practicing what you preach. MINDSET
  • 11. CYBERDEFENSING <PHISHING> A social engineering technique used by cybercriminals to fool computer users to disclose personal information or installing a malware to your system. Usually in a form of website or emails with attachments. Image taken from:Cloudfront.net MASS-SCALE PHISHING Cyber criminalsuse wide-rangeattacks that aren’t highly targeted. Image taken from:asstatic.com WHALING Same as spear phish, butit targets high profileperson such asCEOs, CFOsetc. Image takenfrom:yottaweb.net SPEAR PHISHING Targets a specific individual, seekingunauthorized access to sensitive information.
  • 12. <PHISHING> PHISHING WEBSITE LEGIT WEBSITE Banks will never ask these information toyou. 12 CYBERDEFENSING
  • 13. Poor email and grammar composition. <PHISHING> PHISHING EMAIL PHISHING SMS CYBERDEFENSING 13
  • 17. 18 What y ou share can also be used ag ainst y ou.
  • 18. POSTING YOUR TANTRUMS Hate post will not solve anything. But it will have an impact your personal image on cyber space and real life. CYBERDEFENSING 19
  • 19. CHECK-IN AND LOCATION ON POST Not only does your status information tell somebody where you currently are, it also tells them where you aren’t. This information can be just as dangerous in the hands of criminals. 20 CYBERDEFENSING
  • 20. PASSWORD SHARING You don’t need to share your account password to your partner. Relationships should be trust- centric. CYBERDEFENSING 20
  • 21. PUTTING MIDDLE NAME Your Mother’s maiden name is being used as part of verification on financial institutions. This can be very prone to identity theft. CYBERDEFENSING 21
  • 22. PUTTING MOBILE PHONES Accounts can be searched thru mobile number. A clear way of saying that everyone you like or not can reach you thru SMS. CYBERDEFENSING 22
  • 23. TREATING SOCIAL MEDIA AS A DIARY The more information you provide, the higher chance of you being victimized. CYBERDEFENSING 23
  • 24. CYBERDEFENSING ofget the fesume, son. Let's just take a look at what you have posted on you-r fac.ebook instead. Reference: http://careerandhumanresources.blogcommunity.com
  • 25.