Cybersecurity Threats &
Prevention
Protecting the Digital World
Presented by: Monil Babariya(23BIT074)
Presentation Outline
Cybersecurity
Threats &
Prevention: Agenda
1 Introduction to Cybersecurity
2 Common Threats
3 Emerging Threats
4 Case Studies
5 Detection Signs
6 Prevention Strategies
Introduction to Cybersecurity: The CIA Triad
Cybersecurity involves the sophisticated art of protecting computer systems, networks, and data from malicious cyberattacks. With increasing global digitalisation, the risk of sophisticated cyber threats is higher than ever before.
Cybersecurity (CIA
Triad)
Confidentiality
Protecting sensitive data from unauthorized
access
Integrity
Ensuring data remains accurate and unaltered
Availability
Maintaining reliable access to systems and
data
Why Cybersecurity is Non-Negotiable
Effective cybersecurity goes beyond protecting technology; it safeguards reputation, finances, and operational continuity.
Sensitive Data Protection
Safeguarding confidential information, including personal records,
intellectual property, and financial details.
Business Continuity
Maintaining critical systems and operations to avoid costly downtime and
service disruption.
Customer Trust
Building and preserving confidence with clients by demonstrating a
commitment to data security.
Financial and Reputational Loss
Mitigating the risk of severe fines, legal action, and irreparable brand
damage from breaches.
Five Common Cybersecurity Threats
These prevalent threats target vulnerabilities across individuals and organisations, necessitating robust defensive measures.
Malware
Malicious software, encompassing viruses,
worms, and Trojans, designed to damage or
gain unauthorised access to systems.
Phishing
Deceptive communications, typically fake
emails or websites, used to trick users into
divulging sensitive data like login
credentials.
Ransomware
A type of malware that encrypts a victim's
files, demanding a ransom payment for
their release.
Denial of Service (DoS)
Attacks that overwhelm a system or
network with traffic, making resources
unavailable to legitimate users.
Insider Threats
Security risks posed by current or former
employees, contractors, or partners who
misuse their legitimate access privileges.
The Horizon of Emerging Cyber Threats
As technology evolves, so do the methods of attack. Staying ahead requires vigilance against these new vectors.
1 AI-Driven Attacks
Using machine learning to automate attacks, find zero-day vulnerabilities, and
launch more sophisticated, targeted campaigns.
2 IoT Vulnerabilities
Exploiting security weaknesses in smart devices (home, industrial, medical) due to
weak default passwords and lack of patching.
3 Cloud Security Issues
Misconfigurations, insecure interfaces, and compromised credentials targeting
data hosted in public and private cloud environments.
4 Social Engineering & Deepfakes
Advanced manipulation techniques and synthetic media used to deceive
individuals or bypass biometric security systems.
Major Cyber Attack Case Studies
These incidents demonstrate the real-world impact and scale of modern cyber threats across global systems.
WannaCry Ransomware (2017)
A global cyberattack that leveraged a vulnerability
in Windows, affecting over 200,000 systems across
150 countries in a matter of days.
Facebook Data Leak (2019)
Exposed the data of hundreds of millions of users
due to improper configuration, highlighting issues
with third-party app access.
SolarWinds Attack (2020)
A sophisticated supply chain compromise where
attackers inserted malicious code into a widely
used IT management tool, affecting numerous
high-profile organisations and government
agencies.
Recognising the Signs of a Cyber Attack
Early detection is crucial for mitigating damage. Be alert for these indicators of compromise (IoC).
Unusual Login Activity
Notifications of logins from unknown locations or devices, or repeated failed login attempts.
Slow System Performance
Unexpectedly slow computer speeds, frequent crashes, or high network activity when idle, often due to
hidden malware or processes.
Unrecognised Files or Apps
The appearance of new, unfamiliar files, programmes, or browser extensions you did not intentionally
download or install.
Fake Pop-ups or Ransom Messages
Unexpected warnings, system alerts, or demands for payment that interrupt normal activity and attempt
to sow panic.
Essential Personal Prevention Strategies
Adopting robust digital hygiene practices forms the first and most critical line of defence against cyber threats.
Strong, Unique Passwords
Create complex passwords (12+ characters, mixed case, symbols) and never reuse them across multiple services.
Multi-Factor Authentication (MFA)
Enable MFA wherever possible to require a second verification step, severely limiting the damage from stolen credentials.
Regular Software Updates
Patch operating systems and applications immediately to close security vulnerabilities that attackers might exploit.
Antivirus and Firewalls
Maintain updated antivirus software and ensure firewalls are active to monitor and block unauthorised network traffic.
Regular Data Backup
Implement the 3-2-1 backup rule (3 copies, 2 different media types, 1 offsite) to ensure quick recovery from ransomware or system failure.
Thank You

Cybersecurity Threats and Prevention

  • 1.
    Cybersecurity Threats & Prevention Protectingthe Digital World Presented by: Monil Babariya(23BIT074)
  • 2.
    Presentation Outline Cybersecurity Threats & Prevention:Agenda 1 Introduction to Cybersecurity 2 Common Threats 3 Emerging Threats 4 Case Studies 5 Detection Signs 6 Prevention Strategies
  • 3.
    Introduction to Cybersecurity:The CIA Triad Cybersecurity involves the sophisticated art of protecting computer systems, networks, and data from malicious cyberattacks. With increasing global digitalisation, the risk of sophisticated cyber threats is higher than ever before. Cybersecurity (CIA Triad) Confidentiality Protecting sensitive data from unauthorized access Integrity Ensuring data remains accurate and unaltered Availability Maintaining reliable access to systems and data
  • 4.
    Why Cybersecurity isNon-Negotiable Effective cybersecurity goes beyond protecting technology; it safeguards reputation, finances, and operational continuity. Sensitive Data Protection Safeguarding confidential information, including personal records, intellectual property, and financial details. Business Continuity Maintaining critical systems and operations to avoid costly downtime and service disruption. Customer Trust Building and preserving confidence with clients by demonstrating a commitment to data security. Financial and Reputational Loss Mitigating the risk of severe fines, legal action, and irreparable brand damage from breaches.
  • 5.
    Five Common CybersecurityThreats These prevalent threats target vulnerabilities across individuals and organisations, necessitating robust defensive measures. Malware Malicious software, encompassing viruses, worms, and Trojans, designed to damage or gain unauthorised access to systems. Phishing Deceptive communications, typically fake emails or websites, used to trick users into divulging sensitive data like login credentials. Ransomware A type of malware that encrypts a victim's files, demanding a ransom payment for their release. Denial of Service (DoS) Attacks that overwhelm a system or network with traffic, making resources unavailable to legitimate users. Insider Threats Security risks posed by current or former employees, contractors, or partners who misuse their legitimate access privileges.
  • 6.
    The Horizon ofEmerging Cyber Threats As technology evolves, so do the methods of attack. Staying ahead requires vigilance against these new vectors. 1 AI-Driven Attacks Using machine learning to automate attacks, find zero-day vulnerabilities, and launch more sophisticated, targeted campaigns. 2 IoT Vulnerabilities Exploiting security weaknesses in smart devices (home, industrial, medical) due to weak default passwords and lack of patching. 3 Cloud Security Issues Misconfigurations, insecure interfaces, and compromised credentials targeting data hosted in public and private cloud environments. 4 Social Engineering & Deepfakes Advanced manipulation techniques and synthetic media used to deceive individuals or bypass biometric security systems.
  • 7.
    Major Cyber AttackCase Studies These incidents demonstrate the real-world impact and scale of modern cyber threats across global systems. WannaCry Ransomware (2017) A global cyberattack that leveraged a vulnerability in Windows, affecting over 200,000 systems across 150 countries in a matter of days. Facebook Data Leak (2019) Exposed the data of hundreds of millions of users due to improper configuration, highlighting issues with third-party app access. SolarWinds Attack (2020) A sophisticated supply chain compromise where attackers inserted malicious code into a widely used IT management tool, affecting numerous high-profile organisations and government agencies.
  • 8.
    Recognising the Signsof a Cyber Attack Early detection is crucial for mitigating damage. Be alert for these indicators of compromise (IoC). Unusual Login Activity Notifications of logins from unknown locations or devices, or repeated failed login attempts. Slow System Performance Unexpectedly slow computer speeds, frequent crashes, or high network activity when idle, often due to hidden malware or processes. Unrecognised Files or Apps The appearance of new, unfamiliar files, programmes, or browser extensions you did not intentionally download or install. Fake Pop-ups or Ransom Messages Unexpected warnings, system alerts, or demands for payment that interrupt normal activity and attempt to sow panic.
  • 9.
    Essential Personal PreventionStrategies Adopting robust digital hygiene practices forms the first and most critical line of defence against cyber threats. Strong, Unique Passwords Create complex passwords (12+ characters, mixed case, symbols) and never reuse them across multiple services. Multi-Factor Authentication (MFA) Enable MFA wherever possible to require a second verification step, severely limiting the damage from stolen credentials. Regular Software Updates Patch operating systems and applications immediately to close security vulnerabilities that attackers might exploit. Antivirus and Firewalls Maintain updated antivirus software and ensure firewalls are active to monitor and block unauthorised network traffic. Regular Data Backup Implement the 3-2-1 backup rule (3 copies, 2 different media types, 1 offsite) to ensure quick recovery from ransomware or system failure.
  • 10.