Cybersecurity
Cybersecurity
Cybersecurity
Use of technology
tools to curb the
cybersecurity threats
PRESENTED BY-
PRAGATI CHATURVEDI
z
Introduction
With remotely working becoming the new normal, every organization requires Cyber Security
experts proficient in Cyber Security tools and techniques, no matter how big or small. At present,
no organization can escape cyber threats and security issues without a good Cyber Security
team.
Hackers are always on the move to find loopholes in security systems to put companies in
distress and benefit from it. Out of the top 10 most targeted countries by cyber attackers, India
ranks 3rd.
Cyber Security is the method of protecting networks, and systems from unauthorized data
access, identity theft, and other cyber-attacks, with the help of various cybersecurity tools.
The different aspects of Cyber Security, including application security, information security,
network security, disaster recovery, operational security, and more, are necessary to provide
security from multiple cyber threats that take the form of Ransomware, Malware, Phishing, and
more. Thus, Cyber Security tools play an important role when it comes to the protection of
sensitive and private data of businesses as well as individuals.
z
Firewalls
Sandboxing
Traffic analysis
Malware detection
Endpoint security
Cyber Security tools can largely be divided into a number of categories. The
categories in which these tools can be classified are listed below:
Penetration testing
Packet sniffers
Encryption
Network defenses
Security experts use John the Ripper to test the strength of passwords. Its design
helps in exposing weak passwords that pose security threats to a particular
system. In the beginning, it was only designed for the UNIX platform, but the new
versions allow it to work on other operating systems as well, such as DOS,
Windows, OpenVMS systems, etc.
KeePass
z Professionals in IT Security often use KeePass for the purpose of identity
management. It allows users to use a master password to access all of their
accounts they use for work. It combines security and convenience, which gives it
an edge over the other Cyber Security tools for identity management.
Nmap
Aircrack-ng
This tool consists of numerous methods that help in analyzing the vulnerabilities
of Wi-Fi security. Experts use Aircrack-ng to gather data packets connected
through a network for the process of continuous monitoring. Moreover, it enables
Cyber Security professionals to use its functions to export these data packets to
understandable text files that can go through various security assessments.
z Best Practices and Technologies to
implement strong Cybersecurity Threats
The following best practices and technologies can help your organization
implement strong cybersecurity that reduces your vulnerability to cyber
attacks and protects your critical information systems, without intruding on
the user or customer experience:
Identity and access management (IAM) defines the roles and access
privileges for each user, as well as the conditions under which they are
granted or denied their privileges. IAM methodologies include single sign-
on, which enables a user to log in to a network once without re-entering
credentials during the same session; multifactor authentication, requiring
two or more access credentials; privileged user accounts, which grant
administrative privileges to certain users only; and user lifecycle
management, which manages each user’s identity and access privileges
from initial registration through retirement.
z Security information and event management (SIEM) aggregates and
analyzes data from security events to automatically detect suspicious
user activities and trigger a preventative or remedial response. Today
SIEM solutions include advanced detection methods such as user
behavior analytics and artificial intelligence (AI).