SlideShare ist ein Scribd-Unternehmen logo
1 von 22
CYBERSECURITY
TRAINING
Windstone Health Services
2021
WHAT IS CYBER SECURITY?
• Cyber Security is the practice of protecting systems, networks, and programs from
digital attacks.
• These cyberattacks are usually aimed at accessing, changing, or destroying sensitive
information; extorting money from users; or interrupting normal business
procedures.
WHY IS CYBER SECURITY
IMPORTANT?
• Cyberattacks are a serious risk for all businesses
• Out of 1,045 small and medium-sized businesses that contributed to this cyber
security survey conducted in 2018 by the Ponemon Institute:
1. 67% of respondents suffered a cyberattack in 2018 (compared to 61% the previous
year)
2. 60% of survey respondents that had a data breach said the cause was a negligent
employee or independent contractor
3. A significant majority of respondents experienced an exploit or malware that evaded
their company’s intrusion detection or antivirus software
4. Mobile devices were the most vulnerable entry points to companies’ computer
networks
WHAT IS CYBER SECURITY ALL
ABOUT?
• Users must understand and
comply with basic data security
principles such as choosing
strong passwords, being wary of
attachments in email, and
backing up data.
• Organizations must have a framework
for how they deal with both
attempted and successful cyber
attacks.
• One well-respected framework can
guide you. It explains how you can
identify attacks, protect systems,
detect and respond to threats, and
recover from successful attacks.
• Technology is essential to giving
organizations and individuals the
computer security tools needed to
protect themselves from cyber
attacks.
• Three main entities must be
protected: endpoint devices like
computers, smart devices, and
routers; networks; and the cloud.
COMMON CYBER SECURITY
THREATS
Types of Malware:
• Virus
• Worm
• Trojan Horse
• Adware
• Spyware
• Ransomware
Threats:
• Malware
• Phishing
• Spamming
• Man-in-the-middle
Attack
• Denial-of-service Attack
• SQL Injection
• Zero-day Exploit
Malware
A malware attack is a piece of malicious
software which takes over a person’s
computer in order to spread the bug
onto other people’s devices and profiles.
It can also infect a computer and turn it
into a botnet, which means the cyber
criminal can control the computer and
use it to send malware to others.
Phishing
Phishing attacks are designed to steal login
and password details so that the cyber
criminal can assume control of the victim’s
social network, email and online bank
accounts.
70% of internet users choose the same
password for almost every web service they
use. This is why phishing is so effective, as
the criminal, by using the same login details,
can access multiple private accounts and
manipulate them for their own good.
Spamming
Spamming is when a cyber criminal sends
emails designed to make a victim spend
money on counterfeit or fake goods.
Often advertising pharmaceutical
products or security software, which
people believe they need to solve
security issues which do not actually
exist.
Virus
A computer virus attaches itself to a
program or file enabling it to spread
from one computer to another, leaving
infections as it travels.
Worm
A worm is similar to a virus by design and
is considered to be a sub-class of a virus.
Worms spread from computer to
computer, but unlike a virus, it has the
capability to travel without any human
action.
A worm takes advantage of file or
information transport features on your
system, which is what allows it to travel
unaided.
Trojan Horse
A Trojan Horse is full of as much trickery
as the mythological Trojan Horse it was
named after.
The Trojan Horse, at first glance will
appear to be useful software but will
actually do damage once installed or run
on your computer.
Types of Malware
Adware
Adware is also known as advertising-supported
software. It is software which renders
advertisements for the purpose of generating
revenue for its author. The advertisements are
published on the screen presented to the user at
the time of installation. Adware is programmed
to examine which Internet sites, the user visits
frequently and to present and feature related
advertisements. Not all adware has malicious
intent, but it becomes a problem anyway
because it harms computer performance and
can be annoying.
Spyware
This type of malicious software, spies on you,
tracks your internet activities. It helps the
hacker in gathering information about the
victim’s system, without the consent of the
victim. This spyware’s presence is typically
hidden from the host and it is very difficult
to detect. Some spyware like keyloggers may
be installed intentionally in an organization
to monitor activities of employees.
Ransomware
Ransomware is an advanced type of malware
that restricts access to the computer system
until the user pays a fee. Your screen might
show a pop-up warning that your have been
locked out of your computer and that you
can access only after paying the
cybercriminal. The cybercriminal demands a
ransom to be paid in order for the restriction
to be removed.
Types of Malware
MAN-IN-THE-MIDDLE ATTACK
• A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves
between a user and a website. This kind of attack comes in several forms.
• For example, a fake banking website may be used to capture financial login
information. The fake site is “in the middle” between the user and the actual bank
website.
DENIAL-OF-SERVICE ATTACK
• Refers to events that render systems on a computer network temporarily unusable.
• Denials of service can happen accidentally as the result of actions taken by network users or
administrators, but often they are malicious DoS attacks.
• They may target servers, network routers or network communication links.
• They can cause computers and routers to shut down ("crash") and links to bog down.
• They usually do not cause permanent damage.
SQL INJECTION
• SQL query is one way an application talks
to the database
• SQL injection occurs when an application
fails to sanitize untrusted data (such as
data in web form fields) in a database
query
• An attacker can use specially-crafted SQL
commands to trick the application into
asking the database to execute
unexpected commands
ZERO-DAY EXPLOIT
• “Zero-day” is a loose term for a recently
discovered vulnerability or exploit for a
vulnerability that hackers can use to attack
systems.
• These threats are incredibly dangerous
because only the attacker is aware of their
existence.
• Exploits can go unnoticed for years and are
often sold on the black market for large
sums of money.
CONSEQUENCES OF INACTION
• Loss or damage of electronic data
• Extra expenses to keep your business operating
• You may suffer a loss of income (i.e. a denial of
service attack forces you to shut down your business,
causing you to lose both income and customers)
• Loss of confidentiality, integrity and/or availability of
valuable patient information
• Network security and privacy lawsuits (i.e. if a cyber
thief steals data from your computer system and the
data belongs to another party, that party may sue
you)
• Allows attackers to covertly gather personal data,
including financial information and
usernames/passwords
WHAT CAN YOU DO?
RESPONSIBLE BROWSING
• Do not download/install/open
programs/executables without
consulting/reviewing with IT support.
• Beware of cloned websites that may appear
to be legitimate. Note that secure websites
start with https, not http.
• Beware of suspicious websites, even if they
are https://. Here is an example.
• https://www.bankofamerica.com
and https://www.bankofarnerica.com are
two different sites, one of them is trying to
steal your identity. (Please note how
cleverly ‘m’ was replaced by ‘rn’).
RESPONSIBLE EMAIL ACTIONS
• Do not click on suspicious links embedded
in emails. Hover over questionable links to
reveal the true destination before clicking.
• Don’t open attachments or click on URLs in
unsolicited emails, even from users you
know.
• Alert IT support immediately upon receiving
suspicious emails.
• Do not act on email-based requests for
sensitive personal information, money
movements, or trading. Directly verify all
requests with the clients and ask questions.
RESPONSIBLE USE OF EXTERNAL MEDIA
• Do not insert any USB drive or
CDs/DVDs that you’ve received from an
unknown/unreliable source.
• Do not install programs that was copied
from a USB drive, external drive and/or
found over the internet.
PASSWORDS
• Do not share your passwords at any cause.
They must not be shared with colleagues,
vendors and IT support.
• Change your passwords every 90 days.
When choosing a password:
• Make new passwords difficult to guess by
avoiding dictionary words, and mixing
letters, numbers and punctuation.
• Use a unique long and strong password for
each account to prevent a quick and
invasive attack on all of your accounts.
SOFTWARE UPDATES
• Updates - sometimes called patches - fix
problems and glitches with your operating
system (OS) (e.g., Windows) and software
programs (e.g., Microsoft Office
applications). Anti-virus software removes
viruses, quarantines and repairs infected
files, and can help prevent future viruses.
• Please ensure all software patches are
installed and kept up-to-date by your IT
department.
• To avoid computer problems caused by
viruses, please ensure that an anti-virus
program like Sophos is installed and kept
up to date.
WHAT CAN YOUR COMPANY DO?
• Use a Virtual Private Network (VPN) to encrypt your
web traffic. An encrypted VPN severely limits a
hacker’s ability to read or modify web traffic.
• Ensure your operating system is up-to-date.
• Must have anti-virus software installed onto your
system to scan the entire system at boot along with e-
mails and files as they are downloaded from the
Internet
• Network should have strong firewalls and protocols to
prevent unauthorized access.
• Secure your communications through encryption.
• Regularly talk to employees about cybersecurity.
COMMON TECHNOLOGY USED TO
PROTECT OUR RESOURCES
• Next-generation firewalls
• DNS filtering
• Malware protection
• Antivirus software
• Email security solutions
WHILE YOU MAKE THE
BEST EFFORT TO SECURE
THE COMPANY’S
INFRASTRUCTURE…
A SYSTEM IS ONLY AS
SECURE AS THE WEAKEST
LINK.

Weitere ähnliche Inhalte

Was ist angesagt?

Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
R_Yanus
 

Was ist angesagt? (20)

Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
 
Cyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptxCyber Security PPT - 2023.pptx
Cyber Security PPT - 2023.pptx
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScanHow to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
How to Spot and Combat a Phishing Attack - Cyber Security Webinar | ControlScan
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Knowbe4 presentation
Knowbe4 presentationKnowbe4 presentation
Knowbe4 presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by AdamCybersecurity Awareness Session by Adam
Cybersecurity Awareness Session by Adam
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Presentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human HackingPresentation of Social Engineering - The Art of Human Hacking
Presentation of Social Engineering - The Art of Human Hacking
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 

Ähnlich wie Cybersecurity Training

Ähnlich wie Cybersecurity Training (20)

Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Unit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdfUnit14-Computer Security and ethics -downloaded.pdf
Unit14-Computer Security and ethics -downloaded.pdf
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Cyber security
Cyber security Cyber security
Cyber security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
What are various types of cyber attacks
What are various types of cyber attacksWhat are various types of cyber attacks
What are various types of cyber attacks
 
attack vectors by chimwemwe.pptx
attack vectors  by chimwemwe.pptxattack vectors  by chimwemwe.pptx
attack vectors by chimwemwe.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Information & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. onlineInformation & cyber security, Winter training ,bsnl. online
Information & cyber security, Winter training ,bsnl. online
 
Information cyber security
Information cyber securityInformation cyber security
Information cyber security
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Cyber security
Cyber securityCyber security
Cyber security
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Newsletter connect - June 2016
Newsletter connect - June 2016Newsletter connect - June 2016
Newsletter connect - June 2016
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 

Kürzlich hochgeladen

Call Girl in Indore 8827247818 {LowPrice} ❤️ (ahana) Indore Call Girls * UPA...
Call Girl in Indore 8827247818 {LowPrice} ❤️ (ahana) Indore Call Girls  * UPA...Call Girl in Indore 8827247818 {LowPrice} ❤️ (ahana) Indore Call Girls  * UPA...
Call Girl in Indore 8827247818 {LowPrice} ❤️ (ahana) Indore Call Girls * UPA...
mahaiklolahd
 
Call Girls in Gagan Vihar (delhi) call me [🔝 9953056974 🔝] escort service 24X7
Call Girls in Gagan Vihar (delhi) call me [🔝  9953056974 🔝] escort service 24X7Call Girls in Gagan Vihar (delhi) call me [🔝  9953056974 🔝] escort service 24X7
Call Girls in Gagan Vihar (delhi) call me [🔝 9953056974 🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
adilkhan87451
 

Kürzlich hochgeladen (20)

Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...
Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...
Premium Bangalore Call Girls Jigani Dail 6378878445 Escort Service For Hot Ma...
 
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
Best Rate (Patna ) Call Girls Patna ⟟ 8617370543 ⟟ High Class Call Girl In 5 ...
 
Top Rated Bangalore Call Girls Richmond Circle ⟟ 9332606886 ⟟ Call Me For Ge...
Top Rated Bangalore Call Girls Richmond Circle ⟟  9332606886 ⟟ Call Me For Ge...Top Rated Bangalore Call Girls Richmond Circle ⟟  9332606886 ⟟ Call Me For Ge...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 9332606886 ⟟ Call Me For Ge...
 
💕SONAM KUMAR💕Premium Call Girls Jaipur ↘️9257276172 ↙️One Night Stand With Lo...
💕SONAM KUMAR💕Premium Call Girls Jaipur ↘️9257276172 ↙️One Night Stand With Lo...💕SONAM KUMAR💕Premium Call Girls Jaipur ↘️9257276172 ↙️One Night Stand With Lo...
💕SONAM KUMAR💕Premium Call Girls Jaipur ↘️9257276172 ↙️One Night Stand With Lo...
 
Call Girls Vasai Virar Just Call 9630942363 Top Class Call Girl Service Avail...
Call Girls Vasai Virar Just Call 9630942363 Top Class Call Girl Service Avail...Call Girls Vasai Virar Just Call 9630942363 Top Class Call Girl Service Avail...
Call Girls Vasai Virar Just Call 9630942363 Top Class Call Girl Service Avail...
 
Call Girls Vadodara Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Vadodara Just Call 8617370543 Top Class Call Girl Service AvailableCall Girls Vadodara Just Call 8617370543 Top Class Call Girl Service Available
Call Girls Vadodara Just Call 8617370543 Top Class Call Girl Service Available
 
Call Girl in Indore 8827247818 {LowPrice} ❤️ (ahana) Indore Call Girls * UPA...
Call Girl in Indore 8827247818 {LowPrice} ❤️ (ahana) Indore Call Girls  * UPA...Call Girl in Indore 8827247818 {LowPrice} ❤️ (ahana) Indore Call Girls  * UPA...
Call Girl in Indore 8827247818 {LowPrice} ❤️ (ahana) Indore Call Girls * UPA...
 
8980367676 Call Girls In Ahmedabad Escort Service Available 24×7 In Ahmedabad
8980367676 Call Girls In Ahmedabad Escort Service Available 24×7 In Ahmedabad8980367676 Call Girls In Ahmedabad Escort Service Available 24×7 In Ahmedabad
8980367676 Call Girls In Ahmedabad Escort Service Available 24×7 In Ahmedabad
 
Call Girls Rishikesh Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Rishikesh Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Rishikesh Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Rishikesh Just Call 8250077686 Top Class Call Girl Service Available
 
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...
 
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any TimeTop Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
Top Quality Call Girl Service Kalyanpur 6378878445 Available Call Girls Any Time
 
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
Night 7k to 12k Chennai City Center Call Girls 👉👉 7427069034⭐⭐ 100% Genuine E...
 
Call Girls Visakhapatnam Just Call 8250077686 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 8250077686 Top Class Call Girl Service Ava...Call Girls Visakhapatnam Just Call 8250077686 Top Class Call Girl Service Ava...
Call Girls Visakhapatnam Just Call 8250077686 Top Class Call Girl Service Ava...
 
Model Call Girls In Chennai WhatsApp Booking 7427069034 call girl service 24 ...
Model Call Girls In Chennai WhatsApp Booking 7427069034 call girl service 24 ...Model Call Girls In Chennai WhatsApp Booking 7427069034 call girl service 24 ...
Model Call Girls In Chennai WhatsApp Booking 7427069034 call girl service 24 ...
 
Call Girls in Gagan Vihar (delhi) call me [🔝 9953056974 🔝] escort service 24X7
Call Girls in Gagan Vihar (delhi) call me [🔝  9953056974 🔝] escort service 24X7Call Girls in Gagan Vihar (delhi) call me [🔝  9953056974 🔝] escort service 24X7
Call Girls in Gagan Vihar (delhi) call me [🔝 9953056974 🔝] escort service 24X7
 
Call Girls Tirupati Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Tirupati Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Tirupati Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Tirupati Just Call 8250077686 Top Class Call Girl Service Available
 
Mumbai ] (Call Girls) in Mumbai 10k @ I'm VIP Independent Escorts Girls 98333...
Mumbai ] (Call Girls) in Mumbai 10k @ I'm VIP Independent Escorts Girls 98333...Mumbai ] (Call Girls) in Mumbai 10k @ I'm VIP Independent Escorts Girls 98333...
Mumbai ] (Call Girls) in Mumbai 10k @ I'm VIP Independent Escorts Girls 98333...
 
Call Girls Hosur Just Call 9630942363 Top Class Call Girl Service Available
Call Girls Hosur Just Call 9630942363 Top Class Call Girl Service AvailableCall Girls Hosur Just Call 9630942363 Top Class Call Girl Service Available
Call Girls Hosur Just Call 9630942363 Top Class Call Girl Service Available
 
Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
Russian Call Girls Lucknow Just Call 👉👉7877925207 Top Class Call Girl Service...
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
 

Cybersecurity Training

  • 2. WHAT IS CYBER SECURITY? • Cyber Security is the practice of protecting systems, networks, and programs from digital attacks. • These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business procedures.
  • 3. WHY IS CYBER SECURITY IMPORTANT? • Cyberattacks are a serious risk for all businesses • Out of 1,045 small and medium-sized businesses that contributed to this cyber security survey conducted in 2018 by the Ponemon Institute: 1. 67% of respondents suffered a cyberattack in 2018 (compared to 61% the previous year) 2. 60% of survey respondents that had a data breach said the cause was a negligent employee or independent contractor 3. A significant majority of respondents experienced an exploit or malware that evaded their company’s intrusion detection or antivirus software 4. Mobile devices were the most vulnerable entry points to companies’ computer networks
  • 4. WHAT IS CYBER SECURITY ALL ABOUT? • Users must understand and comply with basic data security principles such as choosing strong passwords, being wary of attachments in email, and backing up data. • Organizations must have a framework for how they deal with both attempted and successful cyber attacks. • One well-respected framework can guide you. It explains how you can identify attacks, protect systems, detect and respond to threats, and recover from successful attacks. • Technology is essential to giving organizations and individuals the computer security tools needed to protect themselves from cyber attacks. • Three main entities must be protected: endpoint devices like computers, smart devices, and routers; networks; and the cloud.
  • 5. COMMON CYBER SECURITY THREATS Types of Malware: • Virus • Worm • Trojan Horse • Adware • Spyware • Ransomware Threats: • Malware • Phishing • Spamming • Man-in-the-middle Attack • Denial-of-service Attack • SQL Injection • Zero-day Exploit
  • 6. Malware A malware attack is a piece of malicious software which takes over a person’s computer in order to spread the bug onto other people’s devices and profiles. It can also infect a computer and turn it into a botnet, which means the cyber criminal can control the computer and use it to send malware to others. Phishing Phishing attacks are designed to steal login and password details so that the cyber criminal can assume control of the victim’s social network, email and online bank accounts. 70% of internet users choose the same password for almost every web service they use. This is why phishing is so effective, as the criminal, by using the same login details, can access multiple private accounts and manipulate them for their own good. Spamming Spamming is when a cyber criminal sends emails designed to make a victim spend money on counterfeit or fake goods. Often advertising pharmaceutical products or security software, which people believe they need to solve security issues which do not actually exist.
  • 7. Virus A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. Worm A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. Trojan Horse A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Types of Malware
  • 8. Adware Adware is also known as advertising-supported software. It is software which renders advertisements for the purpose of generating revenue for its author. The advertisements are published on the screen presented to the user at the time of installation. Adware is programmed to examine which Internet sites, the user visits frequently and to present and feature related advertisements. Not all adware has malicious intent, but it becomes a problem anyway because it harms computer performance and can be annoying. Spyware This type of malicious software, spies on you, tracks your internet activities. It helps the hacker in gathering information about the victim’s system, without the consent of the victim. This spyware’s presence is typically hidden from the host and it is very difficult to detect. Some spyware like keyloggers may be installed intentionally in an organization to monitor activities of employees. Ransomware Ransomware is an advanced type of malware that restricts access to the computer system until the user pays a fee. Your screen might show a pop-up warning that your have been locked out of your computer and that you can access only after paying the cybercriminal. The cybercriminal demands a ransom to be paid in order for the restriction to be removed. Types of Malware
  • 9. MAN-IN-THE-MIDDLE ATTACK • A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website. This kind of attack comes in several forms. • For example, a fake banking website may be used to capture financial login information. The fake site is “in the middle” between the user and the actual bank website.
  • 10. DENIAL-OF-SERVICE ATTACK • Refers to events that render systems on a computer network temporarily unusable. • Denials of service can happen accidentally as the result of actions taken by network users or administrators, but often they are malicious DoS attacks. • They may target servers, network routers or network communication links. • They can cause computers and routers to shut down ("crash") and links to bog down. • They usually do not cause permanent damage.
  • 11. SQL INJECTION • SQL query is one way an application talks to the database • SQL injection occurs when an application fails to sanitize untrusted data (such as data in web form fields) in a database query • An attacker can use specially-crafted SQL commands to trick the application into asking the database to execute unexpected commands
  • 12. ZERO-DAY EXPLOIT • “Zero-day” is a loose term for a recently discovered vulnerability or exploit for a vulnerability that hackers can use to attack systems. • These threats are incredibly dangerous because only the attacker is aware of their existence. • Exploits can go unnoticed for years and are often sold on the black market for large sums of money.
  • 13. CONSEQUENCES OF INACTION • Loss or damage of electronic data • Extra expenses to keep your business operating • You may suffer a loss of income (i.e. a denial of service attack forces you to shut down your business, causing you to lose both income and customers) • Loss of confidentiality, integrity and/or availability of valuable patient information • Network security and privacy lawsuits (i.e. if a cyber thief steals data from your computer system and the data belongs to another party, that party may sue you) • Allows attackers to covertly gather personal data, including financial information and usernames/passwords
  • 15. RESPONSIBLE BROWSING • Do not download/install/open programs/executables without consulting/reviewing with IT support. • Beware of cloned websites that may appear to be legitimate. Note that secure websites start with https, not http. • Beware of suspicious websites, even if they are https://. Here is an example. • https://www.bankofamerica.com and https://www.bankofarnerica.com are two different sites, one of them is trying to steal your identity. (Please note how cleverly ‘m’ was replaced by ‘rn’).
  • 16. RESPONSIBLE EMAIL ACTIONS • Do not click on suspicious links embedded in emails. Hover over questionable links to reveal the true destination before clicking. • Don’t open attachments or click on URLs in unsolicited emails, even from users you know. • Alert IT support immediately upon receiving suspicious emails. • Do not act on email-based requests for sensitive personal information, money movements, or trading. Directly verify all requests with the clients and ask questions.
  • 17. RESPONSIBLE USE OF EXTERNAL MEDIA • Do not insert any USB drive or CDs/DVDs that you’ve received from an unknown/unreliable source. • Do not install programs that was copied from a USB drive, external drive and/or found over the internet.
  • 18. PASSWORDS • Do not share your passwords at any cause. They must not be shared with colleagues, vendors and IT support. • Change your passwords every 90 days. When choosing a password: • Make new passwords difficult to guess by avoiding dictionary words, and mixing letters, numbers and punctuation. • Use a unique long and strong password for each account to prevent a quick and invasive attack on all of your accounts.
  • 19. SOFTWARE UPDATES • Updates - sometimes called patches - fix problems and glitches with your operating system (OS) (e.g., Windows) and software programs (e.g., Microsoft Office applications). Anti-virus software removes viruses, quarantines and repairs infected files, and can help prevent future viruses. • Please ensure all software patches are installed and kept up-to-date by your IT department. • To avoid computer problems caused by viruses, please ensure that an anti-virus program like Sophos is installed and kept up to date.
  • 20. WHAT CAN YOUR COMPANY DO? • Use a Virtual Private Network (VPN) to encrypt your web traffic. An encrypted VPN severely limits a hacker’s ability to read or modify web traffic. • Ensure your operating system is up-to-date. • Must have anti-virus software installed onto your system to scan the entire system at boot along with e- mails and files as they are downloaded from the Internet • Network should have strong firewalls and protocols to prevent unauthorized access. • Secure your communications through encryption. • Regularly talk to employees about cybersecurity.
  • 21. COMMON TECHNOLOGY USED TO PROTECT OUR RESOURCES • Next-generation firewalls • DNS filtering • Malware protection • Antivirus software • Email security solutions
  • 22. WHILE YOU MAKE THE BEST EFFORT TO SECURE THE COMPANY’S INFRASTRUCTURE… A SYSTEM IS ONLY AS SECURE AS THE WEAKEST LINK.

Hinweis der Redaktion

  1. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html https://fthmb.tqn.com/ht65ckVNmtzO0TmLuzmas6vSQU4=/1500x1000/filters:fill(auto,1)/antivirus-5a72401a8e1b6e0037eca70b.jpg
  2. https://www.thebalancesmb.com/dangers-of-cyber-attacks-462537
  3. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html https://www.bing.com/images/search?view=detailV2&ccid=wIf5MzXI&id=3142055A4D46FB796117D51611F237BFA84D0A6E&thid=OIP.wIf5MzXI4cFVROcRha_ScwHaDh&mediaurl=http%3a%2f%2fwww-qa.es3.com%2fwp-content%2fuploads%2f2015%2f06%2fpeople-process-technology.png&exph=475&expw=1000&q=people%2c+process+and+technology+icon&simid=607989079640378120&selectedIndex=7&ajaxhist=0
  4. https://www.telegraph.co.uk/technology/8267578/What-is-the-difference-between-spam-malware-and-phishing.html
  5. https://fossbytes.com/difference-viruses-worms-ransomware-trojans-bots-malware-spyware-etc/
  6. https://www.telegraph.co.uk/technology/8267578/What-is-the-difference-between-spam-malware-and-phishing.html https://nerdcrossing.com/malware-vs-adware-vs-spyware-vs-viruses/ https://fossbytes.com/difference-viruses-worms-ransomware-trojans-bots-malware-spyware-etc/ https://antivirus.comodo.com/blog/malware-vs-viruses-whats-difference/
  7. https://phoenixnap.com/blog/man-in-the-middle-attacks-prevention
  8. https://www.lifewire.com/denial-of-service-dos-and-ddos-817997
  9. https://searchsoftwarequality.techtarget.com/definition/SQL-injection https://www.malwarebytes.com/sql-injection/ https://www.hungred.com/useful-information/solutions-sql-injection-attack/ https://www.bing.com/images/search?view=detailV2&ccid=fp%2broyNV&id=D8BE98CC271607E8090CC1A6DE726657CDB2F8A1&thid=OIP.fp-royNVoUodEHecBi8QHQHaEN&mediaurl=https%3a%2f%2fwww.veracode.com%2fsites%2fdefault%2ffiles%2fstyles%2fmedia_responsive_widest%2fpublic%2fwhat-is-sql-injection_0.png&exph=471&expw=829&q=sql+injection+attack&simid=608023800158093620&selectedIndex=0&qft=+filterui%3aimagesize-large&ajaxhist=0
  10. https://www.forcepoint.com/cyber-edu/zero-day-exploit
  11. https://www.thebalancesmb.com/dangers-of-cyber-attacks-462537
  12. https://azprioritycare.com/wp-content/uploads/2019/06/2019-AZPC-Cyber-Security-Compliance-Training.pdf https://www.webopedia.com/DidYouKnow/Internet/virus.asp DO’S: Keep a backup of your data in a safe place so that no hacker attack can cause you to lose your data. Always consult with IT support if you are suspicious of any emails, links or attachments. DON’T’S: Do not click on suspicious links embedded in emails or open files attached in an email from unknown sources. Do not download programs/executables from untrusty websites and from external media. Do not save your passwords on your computer. Do not visit websites that are not intended for work
  13. https://kirkpatrickprice.com/blog/top-5-cyber-security-awareness-tips-employees/
  14. https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html http://antiviruscoupon.net/wp-content/uploads/2015/07/best-antivirus-software.jpg
  15. http://go.kaspersky.com/rs/kaspersky1/images/Top_10_Tips_For_Educating_Employees_About_Cybersecurity_eBook.pdf?mkt_tok=3RkMMJWWfF9wsRonuKXNcO%2FhmjTEU5z16OglWa%2BzlMI%2F0ER3fOvrPUfGjI4ITMZjI%2BSLDwEYGJlv6SgFQrDHMalq1LgPXxE%3D