SlideShare ist ein Scribd-Unternehmen logo
1 von 10
CYBER SECURITY AND ITS
CONTROLS
WHAT IS CYBER SECURITY?
• Cybersecurity is the practical method of defending computer systems, servers,
mobile devices, electronic systems, networks, and data from Hacking attacks and
various other attacks.
• It’s also known as information tech security or Network information security in
common.
• The term consists of a variety of contexts, from entrepreneurial to mobile computing,
and can be divided into a few other general parts.
TYPES OF CYBER ATTACKS.
• Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
• Man-in-the-middle (MitM) attack.
• Phishing and spear-phishing attacks.
• Drive-by attack.
• Password attack.
• SQL injection attack.
• Cross-site-scripting (XSS) attack.
• Eaves-dropping attack.
TYPES OF CYBER SECURITY MANAGEMENT
• Network security
• Application security
• Information security
• Operational security
• Cloud Security
HOW TO BE SAFE FROM CYBER ATTACKS:-
• Give knowledge to all levels of your company and
its members related to the risks of social
engineering attacks and common social engineering
scams like phishing emails ETC.
• Invest in the web tools that limit information leaks,
keep an eye on your third-party risk, and fourth-
party risk, and continuously scan for data leak
points and leak credentials.
• Use technical knowledge to reduce costs like
automatically sending out the assessment
questionnaires as part of an overall cybersecurity
risk assessment technique.
TYPES OF HACKERS AND ATTACKERS.
• White Hat:- These are good hackers and have a genuine license for doing the hacking.
The hacking performed by them is to protect the government or big companies and to
build a cybersecurity infrastructure. They are good hackers.
• Grey Hat:- They are called by companies to attack their companies to test their
company’s security system. They are also called to hack another company in the
competition or even make D-Dos attacks on their competitive companies.
• Black Hat:- These are bad hackers and perform Unethical hacking to hack big companies
either to hack their bank account or to blackmail them and to take financial advantage.
Eg:- “These are the hackers and attackers who hack your bank accounts, Social Media
account” and many other things.
NEED OF CYBER SECURITY.
• Cybersecurity is required because it ensures all the things to protect our sensitive
information personally identifiable information personal information and
governmental computer systems from the leak and harms done by hackers.
• Cyber Attack risk is increasing due to global connectivity and usage of cloud
services, Eg:-Amazon Web Services, to store sensitive information and personal
data. The poor security level is a serious threat. Cybersecurity ppt
• Past were are the days of normal firewalls and antivirus services being your main
security measures. Entrepreneurs can no longer leave Information security and
network security to cybersecurity professionals.
IMPORTANCE OF CYBER SECURITY.
• In today’s internet connected world, everyone benefits from advanced cyber defense programs.
• At an individual level, a cybersecurity attack can result in everything from identity theft and hacker, to
attempts, to the loss of important information and media files like family photos. cyber security ppt
• Everyone keeps their shoulders on critical infrastructure like power plants, hospitals, and financial
service companies. Securing these and other organizations is essential to keeping our society functioning
to be secured from digital attacks.
• Everyone also benefits from the work of cyber threat researchers or cyber security experts, like the team
of 250 threat researchers at the USA, who finds new and emerging threats and cyber-attack techniques.
• They reveal new loop holes in their network, educate the public on the importance of cyber security, and
even strengthen open source tools. cybersecurity ppt
• Their work makes the Internet safer for everyone in their countries.
CYBER SAFETY TIPS – PROTECT YOURSELF
AGAINST CYBER ATTACKS.
• Update your software and operating system:
• There is the meaning that you got the benefit from the latest security loops.
• Use anti-virus software:
These Security solutions like will detect and removes threats. Keep your software updated for the best level of protection
regularly. You will also find this point in the above cybersecurity ppt.
• Use strong passwords:
Ensures your passwords are not easily guessable and you will not be hacked.
• Don’t open email attachments from anonymous senders:
They could be infected with malware or any kind of spyware. You will also find this point in the above cybersecurity ppt
• Do not click on links on emails from anonymous mail senders or unknown websites:
This is a common way in which malware is spread across digital devices. You will also find this point in the above
cybersecurity ppt
• Avoid connecting to open WiFi connections in public areas like hotels and station:
Non protected networks keep you vulnerable to be attacked by man-in-the-middle attacks. They are very easy atacks
which can be done on you.
Thank you

Weitere ähnliche Inhalte

Ähnlich wie Cyber security and its controls.pptx

SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
GauravWankar2
 

Ähnlich wie Cyber security and its controls.pptx (20)

Presentation 10 (1).pdf
Presentation 10 (1).pdfPresentation 10 (1).pdf
Presentation 10 (1).pdf
 
cscnapd.ppt
cscnapd.pptcscnapd.ppt
cscnapd.ppt
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
Unit 1.pptx
Unit 1.pptxUnit 1.pptx
Unit 1.pptx
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Cybersecurity Training
Cybersecurity TrainingCybersecurity Training
Cybersecurity Training
 
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptxCyber Security and Data Privacy in Information Systems.pptx
Cyber Security and Data Privacy in Information Systems.pptx
 
Subhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptxSubhankar Dutta, Cyber security presentation.pptx
Subhankar Dutta, Cyber security presentation.pptx
 
All About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptxAll About Network Security & its Essentials.pptx
All About Network Security & its Essentials.pptx
 
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Lec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendationsLec 1- Intro to cyber security and recommendations
Lec 1- Intro to cyber security and recommendations
 
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
How to Protect Your Business from Cyberattacks.pptx
How to Protect Your Business from Cyberattacks.pptxHow to Protect Your Business from Cyberattacks.pptx
How to Protect Your Business from Cyberattacks.pptx
 
Presentation on Cyber Security
Presentation on Cyber SecurityPresentation on Cyber Security
Presentation on Cyber Security
 
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 

Kürzlich hochgeladen

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Cyber security and its controls.pptx

  • 1. CYBER SECURITY AND ITS CONTROLS
  • 2. WHAT IS CYBER SECURITY? • Cybersecurity is the practical method of defending computer systems, servers, mobile devices, electronic systems, networks, and data from Hacking attacks and various other attacks. • It’s also known as information tech security or Network information security in common. • The term consists of a variety of contexts, from entrepreneurial to mobile computing, and can be divided into a few other general parts.
  • 3. TYPES OF CYBER ATTACKS. • Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. • Man-in-the-middle (MitM) attack. • Phishing and spear-phishing attacks. • Drive-by attack. • Password attack. • SQL injection attack. • Cross-site-scripting (XSS) attack. • Eaves-dropping attack.
  • 4. TYPES OF CYBER SECURITY MANAGEMENT • Network security • Application security • Information security • Operational security • Cloud Security
  • 5. HOW TO BE SAFE FROM CYBER ATTACKS:- • Give knowledge to all levels of your company and its members related to the risks of social engineering attacks and common social engineering scams like phishing emails ETC. • Invest in the web tools that limit information leaks, keep an eye on your third-party risk, and fourth- party risk, and continuously scan for data leak points and leak credentials. • Use technical knowledge to reduce costs like automatically sending out the assessment questionnaires as part of an overall cybersecurity risk assessment technique.
  • 6. TYPES OF HACKERS AND ATTACKERS. • White Hat:- These are good hackers and have a genuine license for doing the hacking. The hacking performed by them is to protect the government or big companies and to build a cybersecurity infrastructure. They are good hackers. • Grey Hat:- They are called by companies to attack their companies to test their company’s security system. They are also called to hack another company in the competition or even make D-Dos attacks on their competitive companies. • Black Hat:- These are bad hackers and perform Unethical hacking to hack big companies either to hack their bank account or to blackmail them and to take financial advantage. Eg:- “These are the hackers and attackers who hack your bank accounts, Social Media account” and many other things.
  • 7. NEED OF CYBER SECURITY. • Cybersecurity is required because it ensures all the things to protect our sensitive information personally identifiable information personal information and governmental computer systems from the leak and harms done by hackers. • Cyber Attack risk is increasing due to global connectivity and usage of cloud services, Eg:-Amazon Web Services, to store sensitive information and personal data. The poor security level is a serious threat. Cybersecurity ppt • Past were are the days of normal firewalls and antivirus services being your main security measures. Entrepreneurs can no longer leave Information security and network security to cybersecurity professionals.
  • 8. IMPORTANCE OF CYBER SECURITY. • In today’s internet connected world, everyone benefits from advanced cyber defense programs. • At an individual level, a cybersecurity attack can result in everything from identity theft and hacker, to attempts, to the loss of important information and media files like family photos. cyber security ppt • Everyone keeps their shoulders on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning to be secured from digital attacks. • Everyone also benefits from the work of cyber threat researchers or cyber security experts, like the team of 250 threat researchers at the USA, who finds new and emerging threats and cyber-attack techniques. • They reveal new loop holes in their network, educate the public on the importance of cyber security, and even strengthen open source tools. cybersecurity ppt • Their work makes the Internet safer for everyone in their countries.
  • 9. CYBER SAFETY TIPS – PROTECT YOURSELF AGAINST CYBER ATTACKS. • Update your software and operating system: • There is the meaning that you got the benefit from the latest security loops. • Use anti-virus software: These Security solutions like will detect and removes threats. Keep your software updated for the best level of protection regularly. You will also find this point in the above cybersecurity ppt. • Use strong passwords: Ensures your passwords are not easily guessable and you will not be hacked. • Don’t open email attachments from anonymous senders: They could be infected with malware or any kind of spyware. You will also find this point in the above cybersecurity ppt • Do not click on links on emails from anonymous mail senders or unknown websites: This is a common way in which malware is spread across digital devices. You will also find this point in the above cybersecurity ppt • Avoid connecting to open WiFi connections in public areas like hotels and station: Non protected networks keep you vulnerable to be attacked by man-in-the-middle attacks. They are very easy atacks which can be done on you.