0% found this document useful (0 votes)
35 views19 pages

Cyber Security

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 19

CYBER SECURITY

TABLE OF CONTENTS
1. INTRODUCTION(3)
2. WHAT IS CYBERSECURITY ALL ABOUT? (4)
3. THE SCALE OF THE CYBER THREAT(5-6)
4. IMPORTANCE OF CYBERSECURITY(7)
5. TYPES OF CYBERSECURITY THREATS(8-10)
6. LATEST CYBER THREATS(11-12)
7. CYBER SAFETY TIPS - PROTECT YOURSELF AGAINST CYBERATTACKS(13)
8. END-USER PROTECTION(14-15)
9. CONCLUSION(16)
10. BIBLIOGRAPHY(17)
11. ACKNOWLEDGEMENT(18)
12. PRESENTED BY(19)

2
INTRODUCTION

Cybersecurity is the practice of protecting systems,


networks, and programs from digital attacks. These
cyberattacks are usually aimed at accessing, changing,
or destroying sensitive information; extorting money
from users via ransomware; or interrupting normal
business processes.

Implementing effective cybersecurity measures is


particularly challenging today because there are more
devices than people, and attackers are becoming more
innovative.

3
WHAT IS CYBERSECURITY ALL ABOUT?
A successful PEOPLE TECHNOLOGY
cybersecurity approach
Users must understand and comply with Technology is essential to giving
has multiple layers of basic data security principles like
protection spread across organizations and individuals the
choosing strong passwords, being wary
computer security tools needed to
the computers, networks, of attachments in email, and backing up
protect themselves from cyber-
programs, or data that data.
attacks. Three main entities must be
one intends to keep safe. protected: endpoint devices like
In an organization, the PROCESSES computers, smart devices, and
people, processes, and routers; networks; and the cloud.
technology must all Organizations must have a Common technology used to protect
complement one another framework for how they deal with these entities include next-
both attempted and successful generation firewalls, DNS filtering,
to create an effective
cyber-attacks. It explains how you malware protection, antivirus
defence from cyber- software, and email security
can identify attacks, protect systems,
attacks. solutions.
detect and respond to threats, and
recover from successful attacks.
4
THE SCALE OF THE CYBER THREAT
1. The global cyber threat continues to evolve at a rapid pace, with a rising number of data
breaches each year. A report by RiskBased Security revealed that a shocking 7.9 billion
records have been exposed by data breaches in the first nine months of 2019 alone. This
figure is more than double (112%) the number of records exposed in the same period in
2018.
2. Medical services, retailers and public entities experienced the most breaches, with malicious
criminals responsible for most incidents. Some of these sectors are more appealing to
cybercriminals because they collect financial and medical data, but all businesses that use
networks can be targeted for customer data, corporate espionage, or customer attacks.
3. With the scale of the cyber threat set to continue to rise, global spending on cybersecurity
solutions is naturally increasing. Gartner predicts cybersecurity spending will reach $188.3
billion in 2023 and surpass $260 billion globally by 2026. Governments across the globe
have responded to the rising cyber threat with guidance to help organizations implement
effective cyber-security practices.
5
1. In the U.S., the National Institute of Standards and Technology
(NIST) has created a cyber-security framework. To combat the
proliferation of malicious code and aid in early detection, the
framework recommends continuous, real-time monitoring of all
electronic resources.
2. The importance of system monitoring is echoed in the “10 steps to
cyber security”, guidance provided by the U.K. government’s
National Cyber Security Centre. In Australia, The Australian
Cyber Security Centre (ACSC) regularly publishes guidance on
how organizations can counter the latest cyber-security threats.

6
IMPORTANCE OF CYBERSECURITY
In today’s connected world, everyone benefits from advanced cyber defence
programs. At an individual level, a cybersecurity attack can result in everything
from identity theft, to extortion attempts, to the loss of important data like family
photos. Everyone relies on critical infrastructure like power plants, hospitals, and
financial service companies. Securing these and other organizations is essential to
keeping our society functioning.
Everyone also benefits from the work of cyberthreat researchers, like the team of
250 threat researchers at Talos, who investigate new and emerging threats and
cyber-attack strategies. They reveal new vulnerabilities, educate the public on the
importance of cybersecurity, and strengthen open-source tools. Their work makes
the Internet safer for everyone.

7
TYPES OF CYBERSECURITY THREATS
Malware Ransomware
Malware is a type of software
designed to gain unauthorized Ransomware is a type of malicious
access or to cause damage to a
computer. software. It is designed to extort
money by blocking access to files
Virus
or the computer system until the
A self-replicating program that ransom is paid. Paying the ransom
attaches itself to clean file and does not guarantee that the files
spreads throughout a computer system,
infecting files with malicious code.
will be recovered, or the system
restored.
8
Trojans Adware
A type of malware that is disguised as
legitimate software. Cybercriminals Advertising software which can
trick users into uploading Trojans onto be used to spread malware.
their computer where they cause
damage or collect data.

Spyware Botnets
A program that secretly records what a Networks of malware infected computers
user does, so that cybercriminals can
which cybercriminals use to perform tasks
make use of this information. For
example, spyware could capture credit online without the user’s permission.
card details.

9
Social engineering
Phishing

Phishing is the practice of sending Social engineering is a tactic that


fraudulent emails that resemble adversaries use to trick you into revealing
emails from reputable sources. The sensitive information. They can solicit a
aim is to steal sensitive data like monetary payment or gain access to your
credit card numbers and login
confidential data. Social engineering can
information. It’s the most common
type of cyber-attack. You can help be combined with any of the threats
protect yourself through education listed earlier to make you more likely to
or a technology solution that filters click on links, download malware, or trust
malicious emails. a malicious source.
10
LATEST CYBER THREATS
What are the latest cyber threats that individuals and organizations need to guard against? Here
are some of the most recent cyber threats that the U.K., U.S., and Australian governments have
reported on.

Dridex malware
In December 2019, the U.S. Department of Justice (DoJ) charged the leader of an organized cyber-
criminal group for their part in a global Dridex malware attack. This malicious campaign affected
the public, government, infrastructure and business worldwide.
Dridex is a financial trojan with a range of capabilities. Affecting victims since 2014, it infects
computers though phishing emails or existing malware. Capable of stealing passwords, banking
details and personal data which can be used in fraudulent transactions, it has caused massive
financial losses amounting to hundreds of millions.
In response to the Dridex attacks, the U.K.’s National Cyber Security Centre advises the public to
“ensure devices are patched, anti-virus is turned on and up to date and files are backed up”.

11
Romance scams Emotet malware

In February 2020, the FBI warned In late 2019, The Australian Cyber Security
U.S. citizens to be aware of Centre warned national organizations about
confidence fraud that cybercriminals a widespread global cyber threat from
commit using dating sites, chat rooms Emotet malware.
and apps. Perpetrators take Emotet is a sophisticated trojan that can steal
advantage of people seeking new data and load other malware. Emotet thrives
partners, duping victims into giving on unsophisticated password: a reminder of
away personal data. the importance of creating a secure
The FBI reports that romance cyber password to guard against cyber threats.
threats affected 114 victims in New
Mexico in 2019, with financial losses
amounting to $1.6 million.

12
CYBER SAFETY TIPS - PROTECT
YOURSELF AGAINST CYBERATTACKS
How can businesses and individuals guard against cyber threats? Here are some top cyber safety tips:
1. Update your software and operating system: This means you benefit from the latest security
patches.
2. Use anti-virus software: Security solutions like Kaspersky Total Security will detect and removes
threats. Keep your software updated for the best level of protection.
3. Use strong passwords: Ensure your passwords are not easily guessable.
4. Do not open email attachments from unknown senders: These could be infected with malware.
5. Do not click on links in emails from unknown senders or unfamiliar websites: This is a common way
that malware is spread.
6. Avoid using unsecure Wi-Fi networks in public places: Unsecure networks leave you vulnerable to
man-in-the-middle attacks.

13
END-USER PROTECTION
End-user protection or endpoint security is a crucial aspect of
cyber security. After all, it is often an individual (the end-user)
who accidentally uploads malware or another form of cyber
threat to their desktop, laptop or mobile device.
So, how do cyber-security measures protect end users and
systems? First, cyber-security relies on cryptographic protocols
to encrypt emails, files, and other critical data. This not only
protects information in transit, but also guards against loss or
theft.
In addition, end-user security software scans computers for
pieces of malicious code, quarantines this code, and then
removes it from the machine. Security programs can even
detect and remove malicious code hidden in primary boot
record and are designed to encrypt or wipe data from
computer’s hard drive.

14
Electronic security protocols also focus on real-time malware detection. Many use
heuristic and behavioural analysis to monitor the behaviour of a program and its
code to defend against viruses or Trojans that change their shape with each
execution (polymorphic and metamorphic malware). Security programs can confine
potentially malicious programs to a virtual bubble separate from a user's network
to analyse their behaviour and learn how to better detect new infections.
Security programs continue to evolve new defences as cyber-security professionals
identify new threats and new ways to combat them. To make the most of end-user
security software, employees need to be educated about how to use it. Crucially,
keeping it running and updating it frequently ensures that it can protect users
against the latest cyber threats.

15
CONCLUSION
In this Cyber Security presentation, we have seen the definition of
Cyber Security, the scale of the cyber threat, and the importance of
cyber security in order to stay protected against cyber threats. We
have also seen types of cybersecurity threats and the latest cyber
threats. In the end, we have seen the ways in which we can stay
protected from cyberattacks. We have also specially explored the
role of end-user protection in order to stay protected from these
threats. Overall, we came to know from here that cyber security is a
very important aspect of the 21st century and should not be ignored.
We should deploy different measures in order to stay protected
against viruses, malware, spyware, trojans and other types of
cyberthreats.
16
BIBLIOGRAPHY

1. What Is Cybersecurity? – Cisco


2. What is Cyber Security? | Definition, Types, and
User Protection
3. Download Human Text Wallpaper Question Desktop
Behavior Mark HQ PNG Image | FreePNGImg

17
ACKNOWLEDGEMENT

We are grateful to our Computer teacher, Joyita


Ma’am for giving us the opportunity to create a
presentation on the topic ‘Cyber Security’. We
also acknowledge the resources that we have
used for this presentation. We also acknowledge
the help received from our friends in order to do
this presentation.
18
Amarjit
Sahu

Debjit Ayush
Mandal Banerjee

Ankit
Gope

19

You might also like