0% found this document useful (0 votes)
35 views11 pages

Ss 3

Uploaded by

Soham Godkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
35 views11 pages

Ss 3

Uploaded by

Soham Godkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

● Cyber Security

● What is Cyber security?


Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. It's
also known as information technology security or electronic information security. The term applies in a variety of contexts, from business to
mobile computing, and can be divided into a few common categories.

1. Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware. ·
2. Application security focuses on keeping software and devices free of threats. A
compromised application could provide access to the data its designed to protect.Successful security begins
in the design stage, well before a program or device is deployed. ·
3. Information security protects the integrity and privacy of data, both in storage and in transit.
4. Operational security includes the processes and decisions for handling and protecting data assets. The
permissions users have when accessing a network and the procedures that determine how and where
data may be stored or shared all fall under this umbrella.
● Common Causes of Cyber attacks

1. Weak or stolen usernames and passwords


2. Application vulnerabilities
3. Absence of Antivirus and latest patches
4. Use of Pirated Operating Systems
5. System and Network Firewalls disabled
6. Social engineering (tricking people into breaking security
protocols)
7. Poor access control (Unauthorized users have access)
8. Insider threats (System Password has not set)
9. Improper configuration of WIFI devices and Hotspots
10. Unnecessary Ports opened on Network for Backdoor Entry
● Types of Cyber Attacks
● Types of cyber attacks
1. Malware:Malware is intrusive software that is designed to damage and destroy application and computer
systems. Malware is a contraction for “malicious software.” Examples of common malware includes viruses,
worms, Trojan viruses, spyware, adware, and ransomware
2. Ransomware is a new type of malware that encrypts documents, pictures and other files, making them
unreadable.The attacker then holds the decryption key for ransom until you agree to pay money, usually
through an untraceable method such as BitCoin or other digital currency.

and have some


software patches
3. Phishing: a ‘trustworthy entity’ asks via e-mail for sensitive information such as UID, credit card numbers, login
IDs & passwords. It is a kind of social engineering attack where a person steals the sensitive information of user in
a fraud manner by disguising as a legitimate person.

4.Virus: A virus is a contagious program or code that attaches itself to another piece of software, and then
reproduces itself when that software is run. Most often this is spread by sharing software or files between
computers.

.
Phone Call: This is
In Person:
Rahul, the System
What your credit
Admin. What is your card number,can you
password? told me I forgot
mine?
● Statistics of cyber crime in India

On average, hackers attack every 39


seconds, 2,244 times a day.

Since 2014, security breaches have


increased by 67%.

68% of business leaders believe their


cyber security risks are increasing.

25% of breaches in 2019 were motivated


by espionage.

71% of breaches in 2019 were financially

motivated.

4.1 billion records were exposed by data


breaches in the first half of 2019.
● How to prevent cyber attacks?
● Use eOffice for official communication: The product is developed by National Informatics Centre (NIC) and aims to
usher in more efficient, effective and transparent inter-government and intra-government transactions and processes
eOffice service may be accessed through a Virtual Private Network (VPN) for enhanced security. The Top Secret & Secret
information shall be shared over the e-Office system only with leased line closed network and SAG grade encryption
mechanism

● Use Government Email (NIC Email) for official communication: NlC email facility or Government Instant Messaging
Platforms (such as CDAC's Samvad, NIC's Sandesh, etc.) is recommended in the Ministry/Departments for the
communication of Confidential and Restricted information. However, utmost care should be taken during the
classification of information and before the communication of the same over interne
○ Features:-
■ Email platform is supported by 2-level authentication factor i.e. KAVACH which enables extra security.
■ The feature of BRIEFCASE which is used to store the personalized data similar to google
● How to prevent cyber attacks?(contd.)
● Avoid Digital Assistant devices: While discussing official information avoid usage of digital assistant devices like
Amazon's Echo, Apple's HomePod, Google Home, etc. and may not be kept in office. Further, Digital Assistants (such
as Alexa, Siri, etc.) should be turned off in the smart phones/watches used by the employee. Smart phones may be
deposited outside the meeting room during discussion on classified issues.
○ Benefits of avoiding digital assistant devices:
■ Decrease the chances of incident that results in unauthorized access to information.
■ Increase accountability

● Mobile Device Security:-


○ Keep your device software up to date – unpatched software leaves your device vulnerable to attack. Install
operating system updates as well as updates to applications.
○ Have antivirus and/or anti-malware software installed, enabled and set to automatically update.
○ Never leave your laptop or mobile device unattended. Thefts do happen.
○ Encrypt laptops and external media that contains restricted or sensitive data.
● References
https://thewire.in/tech/state-sponsored-cyber-attacks-against-india-went-up-by-278-betwee
n-2021-and-september-2023-report

https://economictimes.indiatimes.com/tech/technology/india-most-targeted-country-by-cy
ber-attackers-report/articleshow/104989856.cms

https://iasscore.in/data-story/cyber-crimes-in-india
THANK
YOU!!!

You might also like