0% found this document useful (0 votes)
43 views28 pages

Cyber Security

Cyber security focuses on protecting computer systems and data from unauthorized access or damage. It involves implementing technologies, processes, and practices to secure networks, computers, programs, and data. The main goals of cyber security are confidentiality, integrity, and availability of data. Key aspects of cyber security include network security, application security, information security, identity management, operational security, mobile security, and cloud security. Some important measures to ensure cyber security are keeping software updated, using antivirus protection, firewalls, strong passwords, two-factor authentication, awareness of phishing scams, protecting personal information, securely using mobile devices, backing up data regularly.

Uploaded by

Birender Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views28 pages

Cyber Security

Cyber security focuses on protecting computer systems and data from unauthorized access or damage. It involves implementing technologies, processes, and practices to secure networks, computers, programs, and data. The main goals of cyber security are confidentiality, integrity, and availability of data. Key aspects of cyber security include network security, application security, information security, identity management, operational security, mobile security, and cloud security. Some important measures to ensure cyber security are keeping software updated, using antivirus protection, firewalls, strong passwords, two-factor authentication, awareness of phishing scams, protecting personal information, securely using mobile devices, backing up data regularly.

Uploaded by

Birender Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

INTRODUCTION TO CYBER SECURITY

Head Constable (Communication)


Sahil Bhardwaj
What is Cyber Security?
 Cyber security focuses on protecting computer
systems from unauthorised access or being
otherwise damaged or made inaccessible.
Information security is a broader category that
protects all information assets, whether in hard
copy or digital form.

 Cyber Security is the set of technologies,


processes and practices designed to protect
networks, computers, programs and data from
attack, damage or unauthorized access.
Types of Cyber Security
 Network Security: It involves implementing the
hardware and software to secure a computer
network from unauthorized access, intruders,
attacks, disruption, and misuse. This security helps
an organization to protect its assets against external
and internal threats.
 Application Security: It involves protecting the
software and devices from unwanted threats. This
protection can be done by constantly updating the
apps to ensure they are secure from attacks.
Successful security begins in the design stage,
writing source code, validation, threat modeling,
etc., before a program or device is deployed.
CONT.
 Information or Data Security: It involves
implementing a strong data storage mechanism to
maintain the integrity and privacy of data, both in
storage and in transit.
 Identity management: It deals with the procedure
for determining the level of access that each
individual has within an organization.
 Operational Security: It involves processing and
making decisions on handling and securing data
assets.
CONT.
 Mobile Security: It involves securing the
organizational and personal data stored on mobile
devices such as cell phones, computers, tablets, and
other similar devices against various malicious
threats. These threats are unauthorized access, device
loss or theft, malware, etc.
 Cloud Security: It involves in protecting the
information stored in the digital environment or cloud
architectures for the organization. It uses various
cloud service providers such as AWS, Azure, Google,
etc., to ensure security against multiple threats.
Cyber Security Goals
 Cyber Security's main objective is to
ensure data protection. The security
community provides a triangle of three
related principles to protect the data
from cyber-attacks. This principle is
called the CIA triad. The CIA model is
designed to guide policies for an
organization's information security
infrastructure. When any security
breaches are found, one or more of these
principles has been violated.
CONT.
 Confidentiality
Confidentiality is equivalent to privacy that
avoids unauthorized access of information. It
involves ensuring the data is accessible by
those who are allowed to use it and blocking
access to others. It prevents essential
information from reaching the wrong
people. Data encryption is an excellent
example of ensuring confidentiality.
CONT.
 Integrity
This principle ensures that the data is
authentic, accurate, and safeguarded from
unauthorized modification by threat actors or
accidental user modification. If any
modifications occur, certain measures should
be taken to protect the sensitive data from
corruption or loss and speedily recover from
such an event. In addition, it indicates to
make the source of information genuine.
CONT.

 Availability

This principle makes the information to be


available and useful for its authorized people
always. It ensures that these accesses are not
hindered by system malfunction or cyber-
attacks.
HOW TO PROTECT YOURSELF
Measures to ensure Cyber Security

• Firewalls
 A firewall is a H/w or S/w program
which filters network data to decide
whether or not to forward them to their
destination or deny it.
 These programs will generally protect
your machine from inbound (i.e.
incoming) “net attacks.”.
 This means unauthorized network request
from foreign computers will be blocked.
Cont.

 Anti Virus Software

 This is also another piece of software we should have


on our system.

• Quick Heal, Norton Antivirus, McAfee, Trend Micro,


Symantec are common ones.

 Keep your antivirus software regularly updated


HOW WE PROTECT INFORMATION?

 People
 Training, education, awareness, repetition

 Process
 Governance, oversight, policy, reporting

 Technology
 Firewalls, IDS/ISP, SIEM, anti-malware
 Strong passwords, Logging/monitoring

 Which is the weakest link?


SOCIAL ENGINEERING BEST PRACTICES

 USE YOUR SECURITY SPIDER SENSE!


 ALWAYS validate requests for information if
you’re not 100000% sure
 Call a number YOU know
 Google it…
 ALWAYS ASK QUESTIONS!
 Is this who I think it is FOR SURE?
 Did someone mention this to me personally, or
was it discussed at a staff meeting?
 Is this the FIRST I’m hearing about this?
BUSINESS EMAIL COMPROMISE (BEC) BEST PRACTICES

 Avoid using free web-based email for business


 Not only less-professional, but easier to hack, typosquat, or spoof

 Domains and email addresses are cheap, especially compared to


BEC(Business Email Compromise)

 Register similar domains to yours to prevent typosquatting e.g. delaplex.com


vs. delapelx.com
 Be careful about the information you share on your website or Social Media
(LinkedIn, Facebook) about job duties or positions, especially for positions
with transactional or purchasing authority

 Think through Out of Office email responders


SUN TZU ON THE ART OF WAR
 If you know the enemy and know yourself,
you need not fear the result of a hundred
battles.
 If you know yourself but not the enemy,
for every victory gained you will also
suffer a defeat.
 If you know neither the enemy nor
yourself, you will succumb in every
battle.
Safety Measures to ensure Cyber security:-

1.Keep Your Software Up to Date

Turn on automatic system updates for your device Make


sure your desktop web browser uses automatic security
updates Keep your web browser plugins like Flash, Java,
etc. updated
2. Use Anti-Virus Protection & Firewall
 Anti-virus (AV) protection software has been the most prevalent
solution to fight malicious attacks. AV software blocks malware
and other malicious viruses from entering your device and
compromising your data. Use anti-virus software from trusted
vendors and only run one AV tool on your device.

 Using a firewall is also important when defending your data


against malicious attacks. A firewall helps screen out hackers,
viruses, and other malicious activity that occurs over the Internet
and determines what traffic is allowed to enter your device.
Windows and Mac OS X comes with their respective firewalls,
aptly named Windows Firewall and Mac Firewall. Your router
should also have a firewall built in to prevent attacks on your
network.
3. Use Strong Passwords & Use a Password Management Tool
Dropping the crazy, complex mixture of upper case letters,
symbols, and numbers. Instead, opt for something more user-
friendly but with at least eight characters and a maximum
length of 64 characters.
Don’t use the same password twice.
The password should contain at least one lowercase letter,
one uppercase letter, one number, and four symbols but not
the following &%#@_.
Choose something that is easy to remember and never leave
a password hint out in the open or make it publicly available
for hackers to see.
Reset your password when you forget it. But, change it once
per year as a general refresh.
4. Use Two-Factor or Multi-Factor Authentication

 Two-factor or multi-factor authentication is a


service that adds additional layers of security to the
standard password method of online identification.
Without two-factor authentication, you would
normally enter a username and password. But, with
two-factor, you would be prompted to enter one
additional authentication method such as a
Personal Identification Code, another password or
even fingerprint. With multi-factor authentication,
you would be prompted to enter more than two
additional authentication methods after entering
your username and password.
5. Learn about Phishing Scams – be very suspicious of emails, phone calls, and flyers

A few important cyber security tips to remember about phishing schemes


include:

Bottom line – Don’t open email from people you don’t know

Know which links are safe and which are not – hover over a link to
discover where it directs to

Be suspicious of the emails sent to you in general – look and see where it
came from and if there are grammatical errors

Malicious links can come from friends who have been infected too. So, be
extra careful!
6. Protect Your Sensitive Personal Identifiable Information (PII)

Personal Identifiable Information (PII) is any information that can be used by a


cybercriminal to identify or locate an individual. PII includes information such as name,
address, phone numbers, data of birth, Social Security Number, IP address, location details,
or any other physical or digital identity data.
7. Use Your Mobile Devices Securely
According to McAfee Labs, your mobile device is now a
target to more than 1.5 million new incidents of mobile
malware. Here are some quick tips for mobile device security:
Create a Difficult Mobile Passcode – Not Your Birthdate or
Bank PIN
Install Apps from Trusted Sources
Keep Your Device Updated – Hackers Use Vulnerabilities in
Unpatched Older Operating Systems
Avoid sending PII or sensitive information over text
message or email
Perform regular mobile backups using iCloud or Enabling
Backup & Sync from Android
8. Backup Your Data Regularly

Backing up your data regularly is an overlooked step


in personal online security. The top IT and security
managers follow a simple rule called the 3-2-1 backup
rule. Essentially, you will keep three copies of your data
on two different types of media (local and external hard
drive) and one copy in an off-site location (cloud
storage).
If you become a victim of ransomware or malware, the
only way to restore your data is to erase your systems
and restore with a recently performed backup.
9. Don’t Use Public Wi-Fi

Don’t use a public Wi-Fi without using a Virtual


Private Network (VPN). By using VPN software
, the traffic between your device and the VPN
server is encrypted. This means it’s much more
difficult for a cybercriminal to obtain access to
your data on your device. Use your cell network
if you don’t have a VPN when security is
important.
10. Review Your Online Accounts & Credit Reports
Regularly for Changes
 A credit report is a statement that has information about your credit
activity and current credit situation such as loan paying history and
the status of your credit accounts.
 With the recent Equifax breach, it’s more important than ever for
consumers to safeguard their online accounts and monitor their credit
reports. A credit freeze is the most effective way for you to protect
your personal credit information from cyber criminals right now.
Essentially, it allows you to lock your credit and use a personal
identification number (PIN) that only you will know. You can then
use this PIN when you need to apply for credit.
Presented By :
Head Constable (Communication)
Sahil Bhardwaj
Frontier Headquarter SSB Siliguri

Thank you

You might also like