SlideShare ist ein Scribd-Unternehmen logo
CYBER THREATS
Introduction To
Cyber Threats
Notwithstanding the viability of the innovation of
figuring, most confided in putting away
documents in PCs, cell phones, and the web are
defenseless to assaults by programmers and all
types of unapproved access on the internet and
this leads to the requirement for proficient
network safety frameworks.
The multiplication of PCs, versatile innovation,
simple admittance to the web, and a thriving
business sector for related new specialized
gadgets have meaningfully impacted the manner
in which we invest our recreation energy and the
manner in which we carry on with work.
2
CYBER THREATS
Defination
• A Cyber danger is any noxious movement that endeavors to get to a PC network without
approval or consent from the proprietors.
• It alludes to the large number of pernicious exercises that can harm or disturb a PC
framework, an organization, or the data it contains.
• Most normal digital dangers: Social Engineered Trojans, Unpatched Software, Phishing,
Network worms, and so forth.
SOURCES OF
CYBERSECURITY
Digital dangers can emerge out of a
wide assortment of sources, a few
eminent models include:
• National governments.
• Terrorists.
• Industrial secret agents.
• Rogue employees.
• Hackers.
• Business competitors.
• Organization insiders.
Category of Cyber Threats
CYBER THREATS
1. Natural Threats
2. Unintentional Threats
3. Intentional Threats
Category of Cyber Threats
Natural Threats Unintentional Threats
Cybercriminals could exploit catastrophic
events like storms, rapidly spreading fires,
and twisters to unleash devastation on basic
framework, including transportation, crisis
reaction, water frameworks, and clinics.
Cybercriminals
Flaws in privacy policy definition; mistakes in
information system design, development, integration,
configuration, and operation; and errors made by
personnel of organizations with custody of the
information.
Intentional Threats
Both targeted and untargeted attacks from a variety of sources,
including criminal groups, hackers, disgruntled employees,
foreign nations engaged in espionage and information warfare,
and terrorists.
TYPES OF CYBER SECURITY THREATS
The task of keeping up with new technologies, security trends and threat
intelligence is challenging but must be performed. In order to protect
information and other assets from cyber threats, the following forms of
threats are analyzed:
• Ransomware
• Malware
• Social Engineering
• Phishing
• Man In The Middle
• SQL Injection
• Password Attacks
RISKS
Gambles are normally mistaken for dangers. In
any case, there is an unpretentious contrast
between the two. A network safety risk alludes
to a blend of a danger likelihood and
misfortune/influence.
Essentially, this translates to the following:
risk = threat probability * potential loss
Four steps for threat prevention
• Protect users wherever they work
• Smart network segmentation
• Find and control problems fast
• Secure the perimeter
Giving good danger anticipation can overpower. Our organization's security agenda recognizes
five basic strides for digital danger counteraction. Underneath we frame the fundamental parts
On basis of these criteria, threats are of 3 types:
20XX
On basis of these criteria, threats are of 3
types:
1. Unstructured Threats
2. Structured Threats
3. Highly Structured threats
20XX
Unstructured Cyber Threats
1. Resources: Individual or small group.
1. Organization: Little or no organization.
1. Funding: Negligible.
1. Attack: Easy to detect and make use of freely available cyberattack tool.
Exploitation based on documented vulnerabilities.
20XX
Structured Cyber Threats
1. Resource: Well-trained individual or group.
1. Organization: Well planned.
1. Funding: Available.
1. Attack: Against particular individuals or organizations.
Exploitation based on information Gathering.
20XX
Highly Structured Cyber Threats
1. Extensive organization, resources, and planning over time.
2. Along term attack on particular machine or data.
3. Exploitation with multiple methods:
4. Technical, social and insider help.
20XX
THANK YOU!
Subhankar Dutta

Weitere ähnliche Inhalte

Ähnlich wie Subhankar Dutta, Cyber security presentation.pptx

43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PradeeshSAI
 
CYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptxCYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptx
Weyai1
 
Introduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxxIntroduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxx
zahraomer517
 

Ähnlich wie Subhankar Dutta, Cyber security presentation.pptx (20)

Cyber security
Cyber securityCyber security
Cyber security
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
R20BM564.pptx
R20BM564.pptxR20BM564.pptx
R20BM564.pptx
 
R20BM564_NAWARAJSUNARPPT.pptx
R20BM564_NAWARAJSUNARPPT.pptxR20BM564_NAWARAJSUNARPPT.pptx
R20BM564_NAWARAJSUNARPPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Cyber security and its controls.pptx
Cyber security and its controls.pptxCyber security and its controls.pptx
Cyber security and its controls.pptx
 
Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...Get Started with Cyber Security and Its Landscape Null Community Presentation...
Get Started with Cyber Security and Its Landscape Null Community Presentation...
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Class activity 4
Class activity 4 Class activity 4
Class activity 4
 
CYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptxCYBERSECURITY WEYAI.pptx
CYBERSECURITY WEYAI.pptx
 
Introduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxxIntroduction-to-Cybersecurit57hhfcbbcxxx
Introduction-to-Cybersecurit57hhfcbbcxxx
 
Cyber Security: A Hands on review
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on review
 

Kürzlich hochgeladen

一比一原版(UofT毕业证)多伦多大学毕业证成绩单
一比一原版(UofT毕业证)多伦多大学毕业证成绩单一比一原版(UofT毕业证)多伦多大学毕业证成绩单
一比一原版(UofT毕业证)多伦多大学毕业证成绩单
tuuww
 
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
tuuww
 
Paint shop management system project report.pdf
Paint shop management system project report.pdfPaint shop management system project report.pdf
Paint shop management system project report.pdf
Kamal Acharya
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 

Kürzlich hochgeladen (20)

一比一原版(UofT毕业证)多伦多大学毕业证成绩单
一比一原版(UofT毕业证)多伦多大学毕业证成绩单一比一原版(UofT毕业证)多伦多大学毕业证成绩单
一比一原版(UofT毕业证)多伦多大学毕业证成绩单
 
RM&IPR M4.pdfResearch Methodolgy & Intellectual Property Rights Series 4
RM&IPR M4.pdfResearch Methodolgy & Intellectual Property Rights Series 4RM&IPR M4.pdfResearch Methodolgy & Intellectual Property Rights Series 4
RM&IPR M4.pdfResearch Methodolgy & Intellectual Property Rights Series 4
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
"United Nations Park" Site Visit Report.
"United Nations Park" Site  Visit Report."United Nations Park" Site  Visit Report.
"United Nations Park" Site Visit Report.
 
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
一比一原版(UNK毕业证)内布拉斯加州立大学科尼分校毕业证成绩单
 
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and ClusteringKIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
KIT-601 Lecture Notes-UNIT-4.pdf Frequent Itemsets and Clustering
 
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdfONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
ONLINE CAR SERVICING SYSTEM PROJECT REPORT.pdf
 
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdfA CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
A CASE STUDY ON ONLINE TICKET BOOKING SYSTEM PROJECT.pdf
 
Paint shop management system project report.pdf
Paint shop management system project report.pdfPaint shop management system project report.pdf
Paint shop management system project report.pdf
 
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdfONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
ONLINE VEHICLE RENTAL SYSTEM PROJECT REPORT.pdf
 
Furniture showroom management system project.pdf
Furniture showroom management system project.pdfFurniture showroom management system project.pdf
Furniture showroom management system project.pdf
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdfRESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
RESORT MANAGEMENT AND RESERVATION SYSTEM PROJECT REPORT.pdf
 
Supermarket billing system project report..pdf
Supermarket billing system project report..pdfSupermarket billing system project report..pdf
Supermarket billing system project report..pdf
 
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWINGBRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
BRAKING SYSTEM IN INDIAN RAILWAY AutoCAD DRAWING
 
retail automation billing system ppt.pptx
retail automation billing system ppt.pptxretail automation billing system ppt.pptx
retail automation billing system ppt.pptx
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
The battle for RAG, explore the pros and cons of using KnowledgeGraphs and Ve...
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 

Subhankar Dutta, Cyber security presentation.pptx

  • 2. Introduction To Cyber Threats Notwithstanding the viability of the innovation of figuring, most confided in putting away documents in PCs, cell phones, and the web are defenseless to assaults by programmers and all types of unapproved access on the internet and this leads to the requirement for proficient network safety frameworks. The multiplication of PCs, versatile innovation, simple admittance to the web, and a thriving business sector for related new specialized gadgets have meaningfully impacted the manner in which we invest our recreation energy and the manner in which we carry on with work. 2
  • 3. CYBER THREATS Defination • A Cyber danger is any noxious movement that endeavors to get to a PC network without approval or consent from the proprietors. • It alludes to the large number of pernicious exercises that can harm or disturb a PC framework, an organization, or the data it contains. • Most normal digital dangers: Social Engineered Trojans, Unpatched Software, Phishing, Network worms, and so forth.
  • 4. SOURCES OF CYBERSECURITY Digital dangers can emerge out of a wide assortment of sources, a few eminent models include: • National governments. • Terrorists. • Industrial secret agents. • Rogue employees. • Hackers. • Business competitors. • Organization insiders.
  • 5. Category of Cyber Threats CYBER THREATS 1. Natural Threats 2. Unintentional Threats 3. Intentional Threats
  • 6. Category of Cyber Threats Natural Threats Unintentional Threats Cybercriminals could exploit catastrophic events like storms, rapidly spreading fires, and twisters to unleash devastation on basic framework, including transportation, crisis reaction, water frameworks, and clinics. Cybercriminals Flaws in privacy policy definition; mistakes in information system design, development, integration, configuration, and operation; and errors made by personnel of organizations with custody of the information. Intentional Threats Both targeted and untargeted attacks from a variety of sources, including criminal groups, hackers, disgruntled employees, foreign nations engaged in espionage and information warfare, and terrorists.
  • 7. TYPES OF CYBER SECURITY THREATS The task of keeping up with new technologies, security trends and threat intelligence is challenging but must be performed. In order to protect information and other assets from cyber threats, the following forms of threats are analyzed: • Ransomware • Malware • Social Engineering • Phishing • Man In The Middle • SQL Injection • Password Attacks
  • 8. RISKS Gambles are normally mistaken for dangers. In any case, there is an unpretentious contrast between the two. A network safety risk alludes to a blend of a danger likelihood and misfortune/influence. Essentially, this translates to the following: risk = threat probability * potential loss
  • 9. Four steps for threat prevention • Protect users wherever they work • Smart network segmentation • Find and control problems fast • Secure the perimeter Giving good danger anticipation can overpower. Our organization's security agenda recognizes five basic strides for digital danger counteraction. Underneath we frame the fundamental parts
  • 10. On basis of these criteria, threats are of 3 types: 20XX
  • 11. On basis of these criteria, threats are of 3 types: 1. Unstructured Threats 2. Structured Threats 3. Highly Structured threats 20XX
  • 12. Unstructured Cyber Threats 1. Resources: Individual or small group. 1. Organization: Little or no organization. 1. Funding: Negligible. 1. Attack: Easy to detect and make use of freely available cyberattack tool. Exploitation based on documented vulnerabilities. 20XX
  • 13. Structured Cyber Threats 1. Resource: Well-trained individual or group. 1. Organization: Well planned. 1. Funding: Available. 1. Attack: Against particular individuals or organizations. Exploitation based on information Gathering. 20XX
  • 14. Highly Structured Cyber Threats 1. Extensive organization, resources, and planning over time. 2. Along term attack on particular machine or data. 3. Exploitation with multiple methods: 4. Technical, social and insider help. 20XX