What is Cyber Security?
• The technique of protecting internet-connected systems such as
computers, servers, mobile devices, electronic systems,
networks, and data from malicious attacks is known as
cybersecurity
Cyber security Fundamentals
i.e. CIA
• Confidentiality: Confidentiality is about preventing the disclosure of data to
unauthorized parties.
It includes:
• Data encryption
• Two-factor authentication
• Biometric verification
• Security tokens
Cyber security Fundamentals
Integrity:
Integrity refers to protecting information from being modified by unauthorized
parties. It includes:
• Cryptographic checksums
• Using file permissions
• Uninterrupted power supplies
• Data backups
Availability:
Availability is making sure that authorized parties are able to access the information
when needed.
It includes:
• Backing up data to external drives
• Implementing firewalls
• Having backup power supplies
• Data redundancy
Types of Cyber Security
• Network Security: It involves implementing the hardware and software
to secure a computer network from unauthorized access. This security
helps an organization to protect its assets against external and internal
threats.
• Application Security: It involves protecting the software and devices
from unwanted threats. This protection can be done by constantly
updating the apps to ensure they are secure from attacks.
• Information or Data Security: It involves implementing a strong data
storage mechanism to maintain the integrity and privacy of data, both in
storage and in transit.
• Identity management: It deals with the procedure for determining the
level of access that each individual has within an organization.
• Operational Security: It involves processing and making decisions on
handling and securing data assets.
Types of Cyber Security
• Mobile Security: It involves securing the organizational and personal data
stored on mobile devices such as cell phones, computers, tablets, and other
similar devices against various malicious threats. These threats are
unauthorized access, device loss or theft, malware, etc.
• Cloud Security: It involves in protecting the information stored in the digital
environment or cloud architectures for the organization. It uses various cloud
service providers such as AWS, Azure, Google, etc., to ensure security
against multiple threats.
• Disaster Recovery and Business Continuity Planning: It deals with the
processes, monitoring, alerts, and plans to how an organization responds
when any malicious activity is causing the loss of operations or data. Its
policies dictate resuming the lost operations after any disaster happens to the
same operating capacity as before the event.
• User Education: It deals with the processes, monitoring, alerts, and plans to
how an organization responds when any malicious activity is causing the loss
of operations or data. Its policies dictate resuming the lost operations after
any disaster happens to the same operating capacity as before the event.
Types of Cyber Security Threats:
A threat in cybersecurity is a malicious activity by an individual or
organization to corrupt or steal data, gain access to a network, or disrupts
digital life in general.
Malware
Malware means malicious software which is used by the cybercriminal or
hacker to damage a user's system.
• Virus: It is a malicious piece of code that spreads from one device to
another. It can clean files and spreads throughout a computer system,
infecting files, stoles information, or damage device.
• Spyware: It is a software that secretly records information about user
activities on their system. For example, spyware could capture credit
card details.
• Trojans: It is a type of malware or code that appears as legitimate(valid)
software or file to fool us into downloading and running. Its primary
purpose is to corrupt or steal data from our device or do other harmful
activities on our network.
• Worms: It is a piece of software that spreads copies of itself from device
to device without human interaction.
• Botnets: It enables cybercriminals to get credentials leaks,
unauthorized access, and data theft without the user's permission.
.
• Phishing
• Phishing is a type of cybercrime in which a sender seems to come from
a genuine organization like financial institutions. They contact a target
or targets via email, phone, or text message with a link to persuade them
to click on that links. This link will redirect them to fraudulent websites to
provide sensitive data such as personal information, usernames, and
passwords. Clicking on the link will also install malware on the target
devices that allow hackers to control devices remotely.
• Man-in-the-middle (MITM) attack
• The main objective of this type of attack is to gain access to our business
or customer data. For example, a cybercriminal could intercept data
passing between the target device and the network on an unprotected
Wi-Fi network.
• Distributed denial of service (DDoS)
• It is a type of cyber threat where the requests come from several IP
addresses that can make the system unusable, overload their servers,
slowing down significantly or temporarily taking them offline, or
.
• Brute Force
• A brute force attack is a cryptographic hack that uses a trial-and-error
method to guess all possible combinations until the correct information is
discovered.
• SQL Injection (SQLI)
• Once the attack is successful, the malicious actor can view, change, or
delete sensitive company data, user lists, or private customer details
stored in the SQL database.
• Domain Name System (DNS) attack
• It is a severe cybersecurity risk because the DNS system is an essential
element of the internet infrastructure.
SECURITY VULNERABILITIES, THREATS AND ATTACKS
Categories of vulnerabilities
• Corrupted (Loss of integrity)
• Leaky (Loss of confidentiality)
• Unavailable or very slow (Loss of availability)
Threats represent potential security harm to an asset when vulnerabilities are
exploited
Attacks are threats that have been carried out
• Passive – Make use of information from the system without affecting system
resources
• Active – Alter system resources or affect operation
• Insider – Initiated by an entity inside the organization
• Outsider – Initiated from outside the perimeter
Cyber Safety Tips
• Conduct cybersecurity training and awareness
• Update software and operating system
• Use anti-virus software
• Perform periodic security reviews
• Use strong passwords
• Do not open email attachments from unknown senders
• Avoid using unsecured Wi-Fi networks in public places
• Backup data
Security Policies
• : Security policies are a formal set of rules which is issued by an organization
to ensure that the user who are authorized to access company technology and
information assets comply with rules and guidelines related to the security of
information. A security policy also considered to be a "living document" which
means that the document is never finished, but it is continuously updated as
requirements of the technology and employee changes. We use security
policies to manage our network security. Most types of security policies are
automatically created during the installation. We can also customize policies
to suit our specific environment. Need of Security policies1) It increases
efficiency. 2) It upholds discipline and accountability 3) It can make or break a
business deal 4) It helps to educate employees on security literacy
REGULATIONS
• There are five predominant laws to cover when it comes to cybersecurity: Information Technology
Act, 2000 The Indian cyber laws are governed by the Information Technology Act, penned down back
in 2000. The principal impetus of this Act is to offer reliable legal inclusiveness to eCommerce,
facilitating registration of real-time records with the Government. But with the cyber attackers
getting sneakier, topped by the human tendency to misuse technology, a series of amendments
followed. The ITA, enacted by the Parliament of India, highlights the grievous punishments and
penalties safeguarding the e-governance, e-banking, and e-commerce sectors. Now, the scope of ITA
has been enhanced to encompass all the latest communication devices. The IT Act is the salient one,
guiding the entire Indian legislation to govern cybercrimes rigorously:
• Section 43 - Applicable to people who damage the computer systems without permission from the
owner. The owner can fully claim compensation for the entire damage in such cases.
• Section 66 - Applicable in case a person is found to dishonestly or fraudulently committing any act
referred to in section 43. The imprisonment term in such instances can mount up to three years or a
fine of up to Rs. 5 lakh.
• Section 66B - Incorporates the punishments for fraudulently receiving stolen communication devices
or computers, which confirms a probable three years imprisonment. This term can also be topped by
Rs. 1 lakh fine, depending upon the severity.
• Section 66C - This section scrutinizes the identity thefts related to imposter digital signatures,
hacking passwords, or other distinctive identification features. If proven guilty, imprisonment of
three years might also be backed by Rs.1 lakh fine.
REGULATIONS
• Section 66 D - This section was inserted on-demand, focusing on punishing cheaters doing impersonation using
computer resources.
• Indian Penal Code (IPC) 1980 Identity thefts and associated cyber frauds are embodied in the Indian Penal
Code (IPC), 1860 - invoked along with the Information Technology Act of 2000.
• The primary relevant section of the IPC covers cyber frauds: Forgery (Section 464)
• Forgery pre-planned for cheating (Section 468)
• False documentation (Section 465)
• Presenting a forged document as genuine (Section 471)
• Reputation damage (Section 469)
• Companies Act of 2013
• The corporate stakeholders refer to the Companies Act of 2013 as the legal obligation necessary for the
refinement of daily operations. The directives of this Act cements all the required techno-legal compliances,
putting the less compliant companies in a legal fix.
• The Companies Act 2013 vested powers in the hands of the SFIO (Serious Frauds Investigation Office) to
prosecute Indian companies and their directors. Also, post the notification of the Companies Inspection,
Investment, and Inquiry Rules, 2014, SFIOs has become even more proactive and stern in this regard. The
legislature ensured that all the regulatory compliances are well-covered, including cyber forensics, e-discovery,
and cybersecurity diligence. The Companies (Management and Administration) Rules, 2014 prescribes strict
guidelines confirming the cybersecurity obligations and responsibilities upon the company directors and
leaders.

More Related Content

PPTX
Cyber Security in detail PPT BY HIMANXU.pptx
PDF
Cyber Ethics Notes.pdf
PPTX
Cyber Security awareness of cyber security
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
Cyber Security and data Security for all.pptx
PPTX
Cyber security
PPTX
Information Security
PPTX
unit -ii security1.pptx for Information system management
Cyber Security in detail PPT BY HIMANXU.pptx
Cyber Ethics Notes.pdf
Cyber Security awareness of cyber security
Cyber security.pptxelectronic systems, networks, and data from malicious
Cyber Security and data Security for all.pptx
Cyber security
Information Security
unit -ii security1.pptx for Information system management

Similar to Cyber Sequrity.pptx is life of cyber security (20)

PPT
Chapter1 intro network_security_sunorganised
DOCX
Cyber Security.docx
PPTX
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
PPTX
cyber security
PPTX
cyber security presentation.pptx
PPTX
Unit 1.pptx
PDF
Introduction_to_CyberSecurity and Applications.pdf
PPTX
Cyber-Security-Unit-1.pptx
PPTX
What is Cyber & information security.pptx
PPTX
Cyber security
PPTX
Cyber crime and Information Security.pptx
PPTX
cybersecurity understanding in simple way
PDF
CyberSecurity.pdf
PDF
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
PPTX
U-1.pptx..........................................
PPTX
Cyber Security
PPTX
Module 1Introduction to cyber security.pptx
PPTX
Lec 1- Intro to cyber security and recommendations
PPTX
SEMINAR ON CYBER SECURITY.pptx
PPT
Cyber security & Importance of Cyber Security
Chapter1 intro network_security_sunorganised
Cyber Security.docx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
cyber security
cyber security presentation.pptx
Unit 1.pptx
Introduction_to_CyberSecurity and Applications.pdf
Cyber-Security-Unit-1.pptx
What is Cyber & information security.pptx
Cyber security
Cyber crime and Information Security.pptx
cybersecurity understanding in simple way
CyberSecurity.pdf
CyberSecurity: A computer-misuse-and-cybercrimes-act.pdf
U-1.pptx..........................................
Cyber Security
Module 1Introduction to cyber security.pptx
Lec 1- Intro to cyber security and recommendations
SEMINAR ON CYBER SECURITY.pptx
Cyber security & Importance of Cyber Security
Ad

More from perweeng31 (6)

PPTX
SPREADSHEET 2.pptx is the power point presentations
PPTX
19 MS word.pptx iybvs bscj ghdj shhshhhsh
PPTX
18 LINUX OS.pptx Linux command is basic isma
PPT
15 SMPS.ppt simple mail protocol systeyk
PPTX
10 MS DOS and Its Commands.pptx .related to
PPTX
SAFETY PRECAUTION.pptx . safety is firstv
SPREADSHEET 2.pptx is the power point presentations
19 MS word.pptx iybvs bscj ghdj shhshhhsh
18 LINUX OS.pptx Linux command is basic isma
15 SMPS.ppt simple mail protocol systeyk
10 MS DOS and Its Commands.pptx .related to
SAFETY PRECAUTION.pptx . safety is firstv
Ad

Recently uploaded (20)

DOCX
EKG reading for serious individuals. Where are you?
PPTX
Orange and Purple Gradient Computer Networking Technology Presentation.pptx
PPTX
dDifference Beetween Saving slides And Investment Slides.pptx
PDF
script scriptscriptscriptscriptscriptscript
PPT
Access List. Configuration of Layer three Router Access List
PPTX
🛠️ Introduction to Industrial Arts.pptx
PPTX
Fabrication 1.pptx from electronics circuits and devices
PPTX
加拿大埃德蒙顿康考迪亚大学毕业证书{CUE海牙认证CUE成绩单防伪}100%复刻
PPTX
Installation and Maintenance in Hardware
PPTX
F&B 5th Semester exam Class Notes (2).pptx
DOC
咨询SBC毕业证学历认证,林顿伍德大学毕业证买大学文凭
DOCX
Buy Abortion Pills Best Prices In Qatar$
PPTX
Operating_Systems_Presentation_With_Icons (1).pptx
PPTX
Unit-5 .pptx sem 3 electrical circuits and machines
PPT
COA______________₹₹_₹₹33₹₹₹33₹₹₹3UNIT1V8.ppt
PPTX
SAI-CAO-24CSEN2021-PPT-UNIT-------1.pptx
PPTX
Computer Hardware - Technology and Livelihood Education
PPT
Soldering technics Aerospace electronic assembly
PPTX
vinay_mahavar_enhanddsfsdfssdfssfced.pptx
PPTX
Java_Basics_Grade6 powerpoint prese.pptx
EKG reading for serious individuals. Where are you?
Orange and Purple Gradient Computer Networking Technology Presentation.pptx
dDifference Beetween Saving slides And Investment Slides.pptx
script scriptscriptscriptscriptscriptscript
Access List. Configuration of Layer three Router Access List
🛠️ Introduction to Industrial Arts.pptx
Fabrication 1.pptx from electronics circuits and devices
加拿大埃德蒙顿康考迪亚大学毕业证书{CUE海牙认证CUE成绩单防伪}100%复刻
Installation and Maintenance in Hardware
F&B 5th Semester exam Class Notes (2).pptx
咨询SBC毕业证学历认证,林顿伍德大学毕业证买大学文凭
Buy Abortion Pills Best Prices In Qatar$
Operating_Systems_Presentation_With_Icons (1).pptx
Unit-5 .pptx sem 3 electrical circuits and machines
COA______________₹₹_₹₹33₹₹₹33₹₹₹3UNIT1V8.ppt
SAI-CAO-24CSEN2021-PPT-UNIT-------1.pptx
Computer Hardware - Technology and Livelihood Education
Soldering technics Aerospace electronic assembly
vinay_mahavar_enhanddsfsdfssdfssfced.pptx
Java_Basics_Grade6 powerpoint prese.pptx

Cyber Sequrity.pptx is life of cyber security

  • 1. What is Cyber Security? • The technique of protecting internet-connected systems such as computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks is known as cybersecurity
  • 2. Cyber security Fundamentals i.e. CIA • Confidentiality: Confidentiality is about preventing the disclosure of data to unauthorized parties. It includes: • Data encryption • Two-factor authentication • Biometric verification • Security tokens
  • 3. Cyber security Fundamentals Integrity: Integrity refers to protecting information from being modified by unauthorized parties. It includes: • Cryptographic checksums • Using file permissions • Uninterrupted power supplies • Data backups Availability: Availability is making sure that authorized parties are able to access the information when needed. It includes: • Backing up data to external drives • Implementing firewalls • Having backup power supplies • Data redundancy
  • 4. Types of Cyber Security • Network Security: It involves implementing the hardware and software to secure a computer network from unauthorized access. This security helps an organization to protect its assets against external and internal threats. • Application Security: It involves protecting the software and devices from unwanted threats. This protection can be done by constantly updating the apps to ensure they are secure from attacks. • Information or Data Security: It involves implementing a strong data storage mechanism to maintain the integrity and privacy of data, both in storage and in transit. • Identity management: It deals with the procedure for determining the level of access that each individual has within an organization. • Operational Security: It involves processing and making decisions on handling and securing data assets.
  • 5. Types of Cyber Security • Mobile Security: It involves securing the organizational and personal data stored on mobile devices such as cell phones, computers, tablets, and other similar devices against various malicious threats. These threats are unauthorized access, device loss or theft, malware, etc. • Cloud Security: It involves in protecting the information stored in the digital environment or cloud architectures for the organization. It uses various cloud service providers such as AWS, Azure, Google, etc., to ensure security against multiple threats. • Disaster Recovery and Business Continuity Planning: It deals with the processes, monitoring, alerts, and plans to how an organization responds when any malicious activity is causing the loss of operations or data. Its policies dictate resuming the lost operations after any disaster happens to the same operating capacity as before the event. • User Education: It deals with the processes, monitoring, alerts, and plans to how an organization responds when any malicious activity is causing the loss of operations or data. Its policies dictate resuming the lost operations after any disaster happens to the same operating capacity as before the event.
  • 6. Types of Cyber Security Threats: A threat in cybersecurity is a malicious activity by an individual or organization to corrupt or steal data, gain access to a network, or disrupts digital life in general.
  • 7. Malware Malware means malicious software which is used by the cybercriminal or hacker to damage a user's system. • Virus: It is a malicious piece of code that spreads from one device to another. It can clean files and spreads throughout a computer system, infecting files, stoles information, or damage device. • Spyware: It is a software that secretly records information about user activities on their system. For example, spyware could capture credit card details. • Trojans: It is a type of malware or code that appears as legitimate(valid) software or file to fool us into downloading and running. Its primary purpose is to corrupt or steal data from our device or do other harmful activities on our network. • Worms: It is a piece of software that spreads copies of itself from device to device without human interaction. • Botnets: It enables cybercriminals to get credentials leaks, unauthorized access, and data theft without the user's permission.
  • 8. . • Phishing • Phishing is a type of cybercrime in which a sender seems to come from a genuine organization like financial institutions. They contact a target or targets via email, phone, or text message with a link to persuade them to click on that links. This link will redirect them to fraudulent websites to provide sensitive data such as personal information, usernames, and passwords. Clicking on the link will also install malware on the target devices that allow hackers to control devices remotely. • Man-in-the-middle (MITM) attack • The main objective of this type of attack is to gain access to our business or customer data. For example, a cybercriminal could intercept data passing between the target device and the network on an unprotected Wi-Fi network. • Distributed denial of service (DDoS) • It is a type of cyber threat where the requests come from several IP addresses that can make the system unusable, overload their servers, slowing down significantly or temporarily taking them offline, or
  • 9. . • Brute Force • A brute force attack is a cryptographic hack that uses a trial-and-error method to guess all possible combinations until the correct information is discovered. • SQL Injection (SQLI) • Once the attack is successful, the malicious actor can view, change, or delete sensitive company data, user lists, or private customer details stored in the SQL database. • Domain Name System (DNS) attack • It is a severe cybersecurity risk because the DNS system is an essential element of the internet infrastructure.
  • 10. SECURITY VULNERABILITIES, THREATS AND ATTACKS Categories of vulnerabilities • Corrupted (Loss of integrity) • Leaky (Loss of confidentiality) • Unavailable or very slow (Loss of availability) Threats represent potential security harm to an asset when vulnerabilities are exploited Attacks are threats that have been carried out • Passive – Make use of information from the system without affecting system resources • Active – Alter system resources or affect operation • Insider – Initiated by an entity inside the organization • Outsider – Initiated from outside the perimeter
  • 11. Cyber Safety Tips • Conduct cybersecurity training and awareness • Update software and operating system • Use anti-virus software • Perform periodic security reviews • Use strong passwords • Do not open email attachments from unknown senders • Avoid using unsecured Wi-Fi networks in public places • Backup data
  • 12. Security Policies • : Security policies are a formal set of rules which is issued by an organization to ensure that the user who are authorized to access company technology and information assets comply with rules and guidelines related to the security of information. A security policy also considered to be a "living document" which means that the document is never finished, but it is continuously updated as requirements of the technology and employee changes. We use security policies to manage our network security. Most types of security policies are automatically created during the installation. We can also customize policies to suit our specific environment. Need of Security policies1) It increases efficiency. 2) It upholds discipline and accountability 3) It can make or break a business deal 4) It helps to educate employees on security literacy
  • 13. REGULATIONS • There are five predominant laws to cover when it comes to cybersecurity: Information Technology Act, 2000 The Indian cyber laws are governed by the Information Technology Act, penned down back in 2000. The principal impetus of this Act is to offer reliable legal inclusiveness to eCommerce, facilitating registration of real-time records with the Government. But with the cyber attackers getting sneakier, topped by the human tendency to misuse technology, a series of amendments followed. The ITA, enacted by the Parliament of India, highlights the grievous punishments and penalties safeguarding the e-governance, e-banking, and e-commerce sectors. Now, the scope of ITA has been enhanced to encompass all the latest communication devices. The IT Act is the salient one, guiding the entire Indian legislation to govern cybercrimes rigorously: • Section 43 - Applicable to people who damage the computer systems without permission from the owner. The owner can fully claim compensation for the entire damage in such cases. • Section 66 - Applicable in case a person is found to dishonestly or fraudulently committing any act referred to in section 43. The imprisonment term in such instances can mount up to three years or a fine of up to Rs. 5 lakh. • Section 66B - Incorporates the punishments for fraudulently receiving stolen communication devices or computers, which confirms a probable three years imprisonment. This term can also be topped by Rs. 1 lakh fine, depending upon the severity. • Section 66C - This section scrutinizes the identity thefts related to imposter digital signatures, hacking passwords, or other distinctive identification features. If proven guilty, imprisonment of three years might also be backed by Rs.1 lakh fine.
  • 14. REGULATIONS • Section 66 D - This section was inserted on-demand, focusing on punishing cheaters doing impersonation using computer resources. • Indian Penal Code (IPC) 1980 Identity thefts and associated cyber frauds are embodied in the Indian Penal Code (IPC), 1860 - invoked along with the Information Technology Act of 2000. • The primary relevant section of the IPC covers cyber frauds: Forgery (Section 464) • Forgery pre-planned for cheating (Section 468) • False documentation (Section 465) • Presenting a forged document as genuine (Section 471) • Reputation damage (Section 469) • Companies Act of 2013 • The corporate stakeholders refer to the Companies Act of 2013 as the legal obligation necessary for the refinement of daily operations. The directives of this Act cements all the required techno-legal compliances, putting the less compliant companies in a legal fix. • The Companies Act 2013 vested powers in the hands of the SFIO (Serious Frauds Investigation Office) to prosecute Indian companies and their directors. Also, post the notification of the Companies Inspection, Investment, and Inquiry Rules, 2014, SFIOs has become even more proactive and stern in this regard. The legislature ensured that all the regulatory compliances are well-covered, including cyber forensics, e-discovery, and cybersecurity diligence. The Companies (Management and Administration) Rules, 2014 prescribes strict guidelines confirming the cybersecurity obligations and responsibilities upon the company directors and leaders.