0% found this document useful (0 votes)
43 views21 pages

Cyber Security

Uploaded by

hamza zalah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views21 pages

Cyber Security

Uploaded by

hamza zalah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

CYBER-SECURITY

Cyber-security is the practice of protecting systems, networks, and programs


from digital attacks. It involves a range of measures and strategies to safeguard
sensitive information, prevent unauthorized access, and ensure the integrity
and availability of digital assets.
Content Overview

What is the What is the need What are the How to


meaning of the of Cyber security implement and
word CYBER? Security? problems in maintain
Explore the reasons
Cyber field? Security of a
Understand the why cybersecurity is Identify the major
Cyber field
meaning of the term essential in today's security challenges
around us?
"cyber" and how it digital world and the and problems that Understand the
relates to the field of importance of exist in the cyber steps and strategies
cybersecurity. protecting against domain, such as required to
cyber threats. viruses, hacking, and effectively
data breaches. implement and
maintain
cybersecurity
measures in our
daily lives and within
organizations.
Introduction to Cyber Security

The term cyber security is used to refer to the security offered through on-line
services to protect your online information. Cyber security or information
technology security is the protection of computer systems from theft or
damage to their hardware, software or electronic data, as well as from
disruption or misdirection of the services they provide.
Increasing Security Threats
1. With an increasing amount of people getting connected to Internet, the security threats that
cause massive harm are increasing also.
Meaning of Cyber
• It is a combining form relating to information technology, the
Internet, and virtual reality.
Need for Cyber Security
Cyber security is necessary since it helps in securing data from threats such as
data theft or misuse, also safeguards your system from viruses.
Major Security Problems
Virus Hacker Malware
Viruses are malicious Hackers are individuals Malware is any software
software programs that who gain unauthorized designed to cause harm
can infect and damage access to computer or disruption to a
computer systems, systems or networks, computer system,
often without the user's often with the intent to including viruses,
knowledge or consent. steal data, disrupt worms, Trojans, and
operations, or cause spyware.
other forms of damage.

Trojan Horses Password Cracking


Trojan horses are a type of malware that Password cracking is the process of
disguise themselves as legitimate attempting to guess or obtain
software, tricking users into installing unauthorized access to a user's password,
them and granting access to their often through the use of automated tools
systems. or brute-force methods.
Viruses and Solutions
Viruses 1
A Virus is a "program that is loaded
onto your computer without your
knowledge and runs against your 2 Solutions
wishes. Install a security suite that protects
the computer against threats such
as viruses.
3
Visual Representation of Cyber Threats

Cyber Threats Complexity of Cyber Proactive Cyber


Looming Attacks Defense
The digital landscape is Cyber attacks are often Effective cyber security
fraught with unseen dangers, intricate, multi-layered, and requires a proactive, vigilant
as malicious actors lurk in the far-reaching, with attackers approach. This visual
shadows, ready to exploit leveraging a vast network of representation showcases a
vulnerabilities and wreak compromised systems and cutting-edge cybersecurity
havoc. This visual data to achieve their dashboard, complete with
representation captures the nefarious goals. This data real-time threat monitoring,
ominous and foreboding visualization illustrates the advanced analytics, and
nature of the cyber threats complexity and scale of these intuitive security controls –
that organizations and threats, underscoring the all essential tools in the fight
individuals face on a daily need for robust cyber security against the ever-evolving
basis. measures. landscape of cyber threats.
Hackers
• In common a hacker is a person who breaks into computers, usually by gaining access to
administrative controls.
Types of Hackers
Hackers can be categorized into three main types based on their motivations
and actions.
White Hat Hacker
1 • A white hat hacker is a computer security specialist who breaks into protected
systems and networks to test and asses their security.
• White hat hackers use their skills to improve security by exposing
vulnerabilities(weaknesses) before malicious hackers (known as black hat
hackers) can detect and exploit them.
Grey Hat Hacker
The term "grey hat", alternatively spelled as greyhat or "gray hat", refers to a computer hacker or
computer security expert who may sometimes violate laws(illegal) or typical ethical standards, but
does not have the malicious intent typical of a black hat hacker.
Black Hat Hacker
• Black hat refers to a hacker who breaks into a computer system or
network with malicious intent. A black hat hacker may exploit security
vulnerabilities for monetary gain; to steal or destroy private data, or to
alter, disrupt or shut down websites and networks.
How to prevent hacking
Effective Security Controls Vigilance is Key

It may be impossible to prevent(stop) While complete prevention may not be


computer hacking, however effective security possible, maintaining vigilance and
controls including strong passwords, and the implementing robust security measures can
use of firewalls can helps. significantly reduce the risk of successful
hacking attempts.
Malware
The word "malware" comes from the term "MALicious softWARE." Malware is any software that infects
and damages a computer system without the owner's knowledge or permission.
To Stop Malware

1 Download an anti-malware 2 Activate Network Threat


program that also helps prevent Protection, Firewall, Antivirus.
infections.
Having an effective anti-malware Enabling the security features on your
program installed on your devices is devices, such as network threat
crucial to detect and remove any existing protection, firewall, and antivirus, can
malware, as well as prevent future help create a strong defense against
infections. malware and other cyber threats.

3 Maintain backup. 4 Keep your private information


Regularly backing up your important
private.
data can help you recover from a Protecting your personal and sensitive
malware attack and minimize the impact information is crucial to prevent
on your files and information. malware from gaining access to your
data and using it for malicious purposes.
Trojan Horses
• Trojan horses are email viruses that can duplicate themselves, steal
information, or harm the computer system. These viruses are the most
serious threats to computers.
How to Avoid Trojans
Security suites, such as Avast Internet Security, will prevent you from
downloading Trojan Horses.
Password Cracking
Password attacks are attacks by hackers that are able to determine passwords or find passwords to
different protected electronic areas and social network sites.
Securing Passwords
• Use Strong Passwords - Create complex passwords with a mix of uppercase, lowercase,
numbers, and symbols. Avoid common words or personal information.
• Never Reuse Passwords - Use a unique password for each account to prevent hackers
from gaining access to multiple sites if one is compromised.
• Use a Password Manager - Utilize a secure password management tool to generate,
store, and automatically fill strong passwords across your accounts.

You might also like