We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10
Cyber Security
Presentation by Parth Sharma
Introduction
Today’s age cannot be even thought of being
without internet, even in dreams.
Although Internet is very useful nowadays but
still it is very risky too, if not used in a proper way. And it is important to know about the possible threats.
Cyber security is not only to keep information
safe and secure, but also being responsible with that information. What is Cyber Security?
● Cybersecurity encompasses the technologies,
processes, and practices designed to protect computers, networks, programs, and data from unauthorized access, damage, or cyberattacks.
● In an increasingly interconnected world,
cybersecurity is crucial for safeguarding sensitive information, ensuring business continuity, and protecting individuals' privacy. Types of Cyber Threats
● Malware: Malware refers to malicious software designed
to disrupt, damage, or gain unauthorized access to computer systems or data. Examples: Viruses, worms, Trojans, ransomware.
● Phishing: Phishing involves the use of deceptive emails,
messages, or websites to trick individuals into revealing sensitive information such as passwords, financial data, or personal details. Tactics: Spoofed emails, fake login pages.
● DDoS Attacks: Distributed Denial of Service (DDoS)
attacks aim to overwhelm a target system, network, or service with a flood of traffic, rendering it inaccessible to legitimate users. Impact: Disruption of services, financial losses. Cybersecurity Frameworks and Standards
● NIST Cybersecurity Framework: The NIST
Cybersecurity Framework provides a structured approach for organizations to manage and reduce cybersecurity risks.
● ISO/IEC 27001: ISO/IEC 27001 is an international
standard for establishing, implementing, maintaining, and continually improving an information security management system (ISMS).
● GDPR (General Data Protection Regulation):
GDPR is a regulation in EU law on data protection and privacy for all individual citizens of the European Union (EU) and the European Economic Area (EEA). Cybersecurity Measures ● Encryption: Encryption is the process of converting data into a ciphertext to prevent unauthorized access. It ensures that only authorized parties can access and read the information.
● Firewalls: Firewalls are network security devices that
monitor and control incoming and outgoing traffic based on predetermined security rules.
and removes malicious software (malware) from computers and networks.
● Patch Management: Patch management involves the
process of identifying, acquiring, and applying updates. Cybersecurity Best Practices ● Strong Passwords: Use complex and unique passwords, avoid dictionary words or predictable patterns.
● Two-Factor Authentication (2FA): Two-Factor
Authentication adds an extra layer of security by requiring users to provide two different authentication factors (e.g., password and one-time code) to access an account.
● Regular Backups: Regularly backing up critical data helps
organizations recover from data loss incidents, including ransomware attacks.
● Employee Training: Educating employees about
cybersecurity risks and best practices is essential for building a security-conscious culture and reducing the likelihood of human errors. Cybersecurity Challenges and Future Trends
● IoT Security: The proliferation of Internet of Things (IoT)
devices introduces new cybersecurity challenges, including device vulnerabilities, data privacy concerns, and network security risks.
● AI and Machine Learning in Cybersecurity: Artificial
Intelligence (AI) and Machine Learning (ML) technologies are increasingly used both by cyber attackers and defenders to automate tasks, detect anomalies, and improve threat intelligence.
● Quantum Computing: The emergence of quantum
computing poses a potential threat to current encryption algorithms, potentially rendering traditional cryptographic methods vulnerable to decryption. Conclusion
Recap of Key Points:
● What is Cyber Security
● Types of Cyber Threats. ● Cybersecurity Frameworks and Standards ● Cybersecurity Measures and Best Practices. ● Emerging Challenges and Trends.
By implementing robust cybersecurity measures,
organizations can better protect their digital assets and mitigate the risks posed by cyber threats. Stay vigilant and proactive in safeguarding against evolving cyber threats Thanks for watching!