0% found this document useful (0 votes)
18 views5 pages

1 1 0 Introduction

a

Uploaded by

saisudhiraicte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views5 pages

1 1 0 Introduction

a

Uploaded by

saisudhiraicte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Cyber Security

1
Introduction
• Cyber Security is the technique of protecting your systems, digital devices,
networks, and all of the data stored in the devices from cyber attacks/
damages/un-authorized access.
• Cybersecurity refers to any technologies, practices and policies for preventing
cyberattacks or minimizing their impact.
• We can divide cybersecurity into two parts one is cyber, and the other is security.
• Cyber refers to the technology that includes systems, networks, programs, and data.
• security is concerned with the protection of systems, networks, applications, and
information.
• In some cases, it is also called electronic information security or information
technology security.
• "Cyber Security is the set of principles and practices designed to protect our
computing resources and online information against threats." 2
• Cybersecurity aims to protect computer systems, applications, devices,
data, financial assets and people against ransomware and other
malware, phishing scams, data theft and other cyberthreats.
• It includes implementing firewalls, encryption, intrusion detection
systems, and antivirus software, as well as developing robust security
policies and conducting regular vulnerability assessments.
• Cybersecurity also encompasses incident response, where experts
identify, contain, and mitigate the impact of security breaches, and
user education to prevent common threats like phishing and social
engineering. In an increasingly digital world, effective cybersecurity is
essential to safeguard personal information, corporate assets, and
national security. 3
Need
• Cybersecurity is important because cyberattacks and cybercrime have the power to
disrupt, damage or destroy businesses, communities and lives.
• Successful cyberattacks lead to identity theft, personal and corporate blackmails,
loss of sensitive information and business-critical data, temporary business outages,
lost business and lost customers and, in some cases, business closures.
• These cyber-attacks are usually aimed at accessing, changing, or destroying sensitive
information, extorting money from users, or interrupting normal business processes.

• Cyberattacks have an enormous and growing impact on businesses and the economy.
• By one estimate, cybercrime will cost the world economy USD 10.5 trillion per year by 2025.3
The cost of cyberattacks continues to rise as cybercriminals become more sophisticated.

4
Types of cyber threats

Common cyber threats include:

• Malware, such as ransomware, botnet software, RATs (remote access Trojans),


rootkits and bootkits, spyware, Trojans, viruses, and worms.
• Backdoors, which allow remote access.
• Formjacking, which inserts malicious code into online forms.
• Cryptojacking, which installs illicit cryptocurrency mining software.
• DDoS (distributed denial-of-service) attacks, which flood servers, systems, and
networks with traffic to knock them offline.
• DNS (domain name system) poisoning attacks, which compromise the DNS to
redirect traffic to malicious sites.
5

You might also like