CyberSecurityPPT V3 1

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

Cyber Security

Awarenes
s
Presentatio
n Contents 01 Introduction Cyber Security

02 Causes of concern

03 Common Causes of Cyber attacks

04 Types of Cyber Attacks

05 News
Cyber Security

Why is Cyber Awareness Important?


Causes for Concern

On average, hackers attack every 39


seconds, 2,244 times a day.

Since 2014, security breaches have


increased by 67%.

68% of business leaders believe


their
cyber security risks are increasing.

25% of breaches in 2019 were


motivated
by espionage.

71% of breaches in 2019 were financially


motivated.

4.1 billion records were exposed by data


breaches in the first half of 2019.

University of North Dakota:


https://onlinedegrees.und.edu/blog/types-
of-cyber-attacks/
Common Causes of Cyber attacks
• Weak or stolen usernames and passwords
• Application vulnerabilities
• Absence of Antivirus and latest patches
• Use of Pirated Operating Systems
• System and Network Firewalls disabled
• Social engineering (tricking people into breaking security protocols)
• Poor access control (Unauthorized users have access)
• Insider threats (System Password has not set)
• Improper configuration of WIFI devices and Hotspots
• Unnecessary Ports opened on Network for Backdoor Entry
Types of Cyber Attacks
Malware
Malware is intrusive software that is designed to damage and destroy application and computer systems.
Malware is a contraction for “malicious software.” Examples of common malware includes viruses, worms,
Trojan viruses, spyware, adware, and ransomware.

Salient Differences

1) Computer Virus:
• Needs a host file
Internet • Copies itself
• Executable

2) Network Worm:
• No host (self-contained)
• Copies itself
• Executable

3) Trojan Horse:
• No host (self-contained)
Hackers & Governments • Does not copy itself
Internet Service
• Imposter Program
Providers
Snoopers
• Phishing: a ‘trustworthy entity’ asks via e-mail for sensitive information such as UID, credit card numbers, login IDs or
passwords. It is a kind of social engineering attack where a person steals the sensitive information of user in a fraud
manner by disguising as a legitimate person.
• Spoofing is a kind of computer virus attack where a person steals the details of important a legitimate user and acts as
another user. It is a kind of identity theft. Cyber criminals use spoofing to fool victims into giving up sensitive
information or money or downloading malware
• Ransomware is a new type of malware that encrypts documents, pictures and other files, making them unreadable.
The attacker then holds the decryption key for ransom until you agree to pay money, usually through an untraceable method
such as Bitcoin or other digital currency.

Do:
• Always verify the sender of a message.
• Always hover over web page links (URLs) in email messages to see where they link to – beware URL
shortening services (like bit.ly) that may obscure the final web site destination.
• Be skeptical of messages with odd spelling/grammar, improper logos or that ask you to upgrade or verify your
account.
• Report suspicious emails to [email protected] or NIC
• Take backups of important files to avoid ransomware

Don’t:
• Open an attachment from an unknown sender. Consider the source and whether or not the file was
expected.
• Click on a link from an unknown sender.
Social engineering manipulates people into performing actions or divulging confidential information. Similar
to a confidence trick or simple fraud, the term applies to the use of deception to gain information, commit
fraud, or access computer systems.
Email:
Phone Call: ABC Bank has
This is John, noticed a
the System problem with I have come
Admin. What In Person:
What ethnicity
your account… to repair
is your your
password? are you? Your
and have machine…
mother’s
maiden name? some
software
patches
Mobile Device Security

• Keep your device software up to date – unpatched software leaves your device vulnerable to attack. Install
operating system updates as well as updates to applications.
• Have anti-virus and/or anti-malware software installed, enabled and set to automatically update.
• Never leave your laptop or mobile device unattended. Thefts do happen.
• Encrypt laptops and external media that contains restricted or sensitive data.
• Make sure you backup your data frequently in case your device is ever lost or stolen.
• Ensure access to your mobile device is protected with a passcode and use built-in encryption settings to
ensure
that your data is safe if your device is ever lost or stolen.
• Consider using a remote tracking/wipe function if supported. For iOS devices, iCloud provides the “Find my
iPhone” service for free. Android and other mobile operating systems also have similar functionality.
News…!!!
THANK
YOU…!!!

You might also like