0% found this document useful (0 votes)
298 views21 pages

Cyber Security

its a presentation on cyber security,its types about cyber attack types and measures to cyber attack

Uploaded by

rababarian18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
298 views21 pages

Cyber Security

its a presentation on cyber security,its types about cyber attack types and measures to cyber attack

Uploaded by

rababarian18
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 21

Cyber security

Presented by :
Umaymah Zahid EC-70
Rabab Ashraf EC-45
CT-173
Sir Ahmed zaki
Table of contents

 Introduction

 Types of cyber attack

 Who need cyber security

 Types of cyber security

 Cyber security measures

 Benefits of cyber security

 conclusion
Introduction
 Cyber Security is a process that’s designed to
protect networks and devices from external
threats. Businesses typically employ Cyber
Security professionals to protect their
confidential information

 The world of Cyber Security revolves around the


industry standard of confidentiality, integrity,
and availability, or CIA.
Types of Cyber Attack

Malware Attack
 This is one of the most common types of
cyberattacks. “Malware” refers to malicious
software viruses including worms, spyware,
ransomware, adware, and trojans .

Phishing Attack
 Phishing attacks are one of the most prominent
widespread types of cyberattacks. It is a type of
social engineering attack wherein an attacker
impersonates to be a trusted contact and sends the
victim fake mails.
Password attack
• It is a form of attack wherein a hacker cracks
your password with various programs and
password cracking tools like Aircrack, Cain,
Abel, John the Ripper, Hashcat, etc.

Man-in-the-Middle Attack
 A Man-in-the-Middle Attack (MITM) is also
known as an eavesdropping attack. In this attack,
an attacker comes in between a two-party
communication
Insider Threat
 As the name suggests, an insider threat does not
involve a third party but an insider. In such a
case; it could be an individual from within the
organization who knows everything about the
organization

Social engineering Attack


 It is an form of manipulation where attackers
exploit human psychology to gain access to
information or systems
Who needs cyber
security?
 It is a mistake to believe that you are of no
interest to cyber attackers. Everyone who is
connected to the Internet needs cyber
security. This is because most cyber attacks
are automated and aim to exploit common
vulnerabilities rather than specific websites
or organisations.
Types of cyber security
 Network security

 End point security

 Cloud security

 Data security

 Operational security

 Application security
network security
 Network security focuses on protecting
networks and their infrastructure from
unauthorised access & attacks. It involves
implementing firewalls intrusion detection
system (ids), virtual private networks
(VPNs) and other security measures to
secure network communications and
prevent unauthorised access.
End point security
It involves protecting individual
devices such as laptops, desktop,
smartphones and tablets from cyber
threats. It includes installing antivirus
software and conducting regular
security updates.
Cloud security
 Cloud security focuses on protecting cloud-
based assets and services, including
applications, data, and infrastructure. Most
cloud security is managed as a shared
responsibility between organizations and
cloud service providers.
Data security
 A subset of information security, data
security combines many types of
cybersecurity solutions to protect the
confidentiality, integrity, and availability of
digital assets at rest (i.e., while being
stored) and in motion (i.e., while being
transmitted).
Operational security
 Operational security covers many types of
cybersecurity processes and technology
used to protect sensitive systems and data
by establishing protocols for access and
monitoring to detect unusual behavior that
could be a sign of malicious activity.
Application security
 It involves securing software applications
and system from potential vulnerabilities
and attacks. It includes implementing
secure coding practices to protect against
common application level attack.
Cyber security
measures
 Implementing effective cyber
security measures is crucial to
protect digital system, networks and
data from cyber attacks
 Create a strong password for all platforms.
Try to create unique passwords. Most
importantly, the passwords are not related at
all. In this way, hackers will not succeed in
their password guessing methodology.

 Always read the terms and conditions of


any site. In this way, you will know
whether your information will be collected
or not.
 Never type your financial information on any
site, especially, if the site lacks padlock on the
page.
 Always ensure that the permissions required
by the particular site are reasonable. For
example, if your calculator app requests
permission to access your gallery/ any of such
nature, it is extremely suspicious. In such
cases, uninstall the app immediately.
 Always turn on two-factor
authentication on your social media
platforms. In that way, you will be alerted
whenever there is an attempt to access your
account.
 Always backup your data. By doing that
you can protect your data in case of breach
too.
Benefits of cyber
security
• Ensure the confidentiality, integrity, and
availability of sensitive data guarding against
unauthorized access or data breaches

• Protects organizations from financial losses


associated with data breaches, theft or disruption
of services

• A strong cybersecurity framework contributes to


global economic stability by reducing the impact
of cyber threats on businesses and financial
institutions
Conclusion
 In conclusion, cybersecurity is a critical and
evolving discipline that plays a pivotal role in
safeguarding digital assets, personal privacy, and
the integrity of information systems.. The
benefits of cybersecurity extend beyond data
protection to include financial stability,
reputation preservation, and contributions to
global security
Thank you.

You might also like