Cyber security
Presented by :
Umaymah Zahid EC-70
Rabab Ashraf EC-45
CT-173
Sir Ahmed zaki
Table of contents
Introduction
Types of cyber attack
Who need cyber security
Types of cyber security
Cyber security measures
Benefits of cyber security
conclusion
Introduction
Cyber Security is a process that’s designed to
protect networks and devices from external
threats. Businesses typically employ Cyber
Security professionals to protect their
confidential information
The world of Cyber Security revolves around the
industry standard of confidentiality, integrity,
and availability, or CIA.
Types of Cyber Attack
Malware Attack
This is one of the most common types of
cyberattacks. “Malware” refers to malicious
software viruses including worms, spyware,
ransomware, adware, and trojans .
Phishing Attack
Phishing attacks are one of the most prominent
widespread types of cyberattacks. It is a type of
social engineering attack wherein an attacker
impersonates to be a trusted contact and sends the
victim fake mails.
Password attack
• It is a form of attack wherein a hacker cracks
your password with various programs and
password cracking tools like Aircrack, Cain,
Abel, John the Ripper, Hashcat, etc.
Man-in-the-Middle Attack
A Man-in-the-Middle Attack (MITM) is also
known as an eavesdropping attack. In this attack,
an attacker comes in between a two-party
communication
Insider Threat
As the name suggests, an insider threat does not
involve a third party but an insider. In such a
case; it could be an individual from within the
organization who knows everything about the
organization
Social engineering Attack
It is an form of manipulation where attackers
exploit human psychology to gain access to
information or systems
Who needs cyber
security?
It is a mistake to believe that you are of no
interest to cyber attackers. Everyone who is
connected to the Internet needs cyber
security. This is because most cyber attacks
are automated and aim to exploit common
vulnerabilities rather than specific websites
or organisations.
Types of cyber security
Network security
End point security
Cloud security
Data security
Operational security
Application security
network security
Network security focuses on protecting
networks and their infrastructure from
unauthorised access & attacks. It involves
implementing firewalls intrusion detection
system (ids), virtual private networks
(VPNs) and other security measures to
secure network communications and
prevent unauthorised access.
End point security
It involves protecting individual
devices such as laptops, desktop,
smartphones and tablets from cyber
threats. It includes installing antivirus
software and conducting regular
security updates.
Cloud security
Cloud security focuses on protecting cloud-
based assets and services, including
applications, data, and infrastructure. Most
cloud security is managed as a shared
responsibility between organizations and
cloud service providers.
Data security
A subset of information security, data
security combines many types of
cybersecurity solutions to protect the
confidentiality, integrity, and availability of
digital assets at rest (i.e., while being
stored) and in motion (i.e., while being
transmitted).
Operational security
Operational security covers many types of
cybersecurity processes and technology
used to protect sensitive systems and data
by establishing protocols for access and
monitoring to detect unusual behavior that
could be a sign of malicious activity.
Application security
It involves securing software applications
and system from potential vulnerabilities
and attacks. It includes implementing
secure coding practices to protect against
common application level attack.
Cyber security
measures
Implementing effective cyber
security measures is crucial to
protect digital system, networks and
data from cyber attacks
Create a strong password for all platforms.
Try to create unique passwords. Most
importantly, the passwords are not related at
all. In this way, hackers will not succeed in
their password guessing methodology.
Always read the terms and conditions of
any site. In this way, you will know
whether your information will be collected
or not.
Never type your financial information on any
site, especially, if the site lacks padlock on the
page.
Always ensure that the permissions required
by the particular site are reasonable. For
example, if your calculator app requests
permission to access your gallery/ any of such
nature, it is extremely suspicious. In such
cases, uninstall the app immediately.
Always turn on two-factor
authentication on your social media
platforms. In that way, you will be alerted
whenever there is an attempt to access your
account.
Always backup your data. By doing that
you can protect your data in case of breach
too.
Benefits of cyber
security
• Ensure the confidentiality, integrity, and
availability of sensitive data guarding against
unauthorized access or data breaches
• Protects organizations from financial losses
associated with data breaches, theft or disruption
of services
• A strong cybersecurity framework contributes to
global economic stability by reducing the impact
of cyber threats on businesses and financial
institutions
Conclusion
In conclusion, cybersecurity is a critical and
evolving discipline that plays a pivotal role in
safeguarding digital assets, personal privacy, and
the integrity of information systems.. The
benefits of cybersecurity extend beyond data
protection to include financial stability,
reputation preservation, and contributions to
global security
Thank you.