CYBER SECURITY
Presented by
M. Lakshana
R. Pooja
Agenda
What is cyber security
Motive behind cybercrime
How cyber security works
Network security Strategies
Access control and Identity Management
Common cyber threats
Types of Hackers
Cyber security Careers
What is Cyber Security
Cybersecurity is the practice
of protecting computer
systems, networks, and data
from digital attacks, theft, and
damage.
It involves a range of
strategies and technologies
designed to safeguard
information and ensure the
integrity, confidentiality, and
availability of digital assets.
Motives behind cybercrime
Industrial Espionage
Asking company for
Ransom
Selling the information to
criminals
How cyber security works ?
• Enabling two-factor authentication for added account
2-Way Authentication security.
• Using strong, unique passwords for each account.
Secure Passwords
• Keeping software and operating systems up-to-date to
Regular Updates patch vulnerabilities.
• Employing antivirus software to detect and remove
Antivirus malware.
• Using a firewall to block unauthorized network
Firewall access.
• Recognizing and avoiding phishing attempts like
No Phishing suspicious emails.
• Implementing encryption methods to protect data
Cryptography (encryption) confidentiality.
• Utilizing a secure DNS service to prevent DNS
Secure DNS spoofing and protect privacy.
Network Security Strategies
Securing your network infrastructure is essential to protect your data and systems from
cyberattacks. Implementing a multi-layered approach strengthens your defenses.
1 Firewalls
Firewalls act as barriers between your network and the external world,
blocking unauthorized access and malicious traffic.
2 Intrusion Detection Systems (IDS)
IDS monitor network traffic for suspicious activity and alert administrators
to potential threats.
3 Intrusion Prevention Systems (IPS)
IPS go beyond detection and take active steps to block malicious traffic and
prevent attacks.
4 Virtual Private Networks (VPNs)
VPNs create a secure and encrypted connection over a public network, protecting
data transmitted between devices.
5 Network Segmentation
Dividing a network into smaller segments can limit the impact of a breach,
preventing attackers from gaining access to sensitive data.
Access Control and Identity Management
Access control and identity management are crucial for ensuring that only authorized users
can access sensitive data and systems.
Authentication
Verifies the identity of users before granting access to systems and resources.
Authorization
Determines which actions a user is allowed to perform within a system or network.
Account Management
Encompasses the creation, modification, and termination of user accounts, ensuring
proper access levels and security.
Password Policies
Establish rules for creating strong passwords, ensuring their complexity and regular
rotation.
Multi-Factor Authentication (MFA)
Requires users to provide multiple forms of identification, such as a password and a
security token, to gain access.
Importance of Cyber Security
In today's interconnected world, cybersecurity is
paramount for individuals and organizations alike. It
safeguards sensitive data, ensures operational
continuity, protects financial assets, and maintains
public trust.
1 Data Protection 2 Business Continuity
Cybersecurity By preventing
safeguards sensitive cyberattacks and data
information, like breaches, cybersecurity
personal data, financial ensures that businesses
records, and intellectual can operate smoothly
property, from and without disruption.
unauthorized access and
theft.
3 Financial Security 4 Reputation Management
Cybersecurity protects
against financial fraud, A strong cybersecurity
identity theft, and other posture helps maintain
financial losses that can public trust and protects
result from an organization's
cyberattacks. reputation in the face of
potential cyberattacks.
Common Cyber Threats
Cybercriminals employ a variety of methods to
target individuals and organizations. Understanding
common cyber threats is crucial for building
effective defenses.
Malware Phishing
Malicious software, such Phishing attacks attempt
as viruses, worms, and to trick users into
ransomware, can damage revealing sensitive
systems, steal data, and information, such as
disrupt operations. login credentials or credit
card details, through
deceptive emails or
websites.
Denial-of-Service Social Engineering
Attacks
DoS attacks overwhelm a Social engineering
system with traffic, exploits human
making it unavailable to psychology to manipulate
legitimate users. individuals into granting
access to sensitive data or
systems.
Emerging Cyber Threats and
Trends
The cyber threat landscape is constantly evolving,
with new technologies and vulnerabilities emerging
regularly. Staying informed about emerging threats is
crucial for adapting security practices.
Artificial Intelligence (AI) Cloud Computing
AI can be used by both The increasing adoption
attackers and defenders of cloud services creates
to automate tasks and new challenges for
enhance cyberattacks. security, as data is stored
and processed in remote
environments.
Ransomware Attacks
Internet of Things (IoT)
The proliferation of Ransomware attacks
connected devices have become
increases the attack increasingly
surface, as IoT devices sophisticated and target
often lack robust security critical infrastructure and
measures. businesses.
Benefits of Cyber Security
Protection of Increase Productivity Inspires customer
your business confidence
Stops your website Protection for your customers
from crashing or clients
Types of Hackers
White hat
Script Kiddie
hacker
Types of
hackers
Black hat
Hacktivist
hacker
Red hat Gray hat
hacker hacker
Cybersecurity Careers
A career in cybersecurity offers a wide range of
opportunities for individuals with technical skills and an
interest in protecting digital assets.
1 Security Analyst 2 Ethical Hacker
Security analysts monitor Ethical hackers use their
networks and systems for skills to test systems for
suspicious activity, investigate vulnerabilities and identify
security incidents, and security weaknesses before
implement security controls. malicious actors exploit
them.
3 Penetration Tester 4 Security Engineer
Penetration testers simulate real-
Security engineers design,
world attacks to assess an
implement, and maintain
organization's security posture
security systems and
and identify potential
infrastructure.
vulnerabilities.
Thank You