Presentation on Cyber Security
IT Fundamentals of Cyber Security
Introduction
The Internet in India is growing rapidly. There are two sides to a coin. The Internet also has its disadvantages as cybercrime-illegal activity is committed on the Internet. Crime is committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs. Cybercrime is an activity done using computers and the internet. Cyber security refers to the technologies and processes designed to protect computers, networks, and data from unauthorized access and attacks delivered via the internet by cyber criminals. Though, cyber security is important for network, data, and application security. The objective of cyber security is to establish rules and measures to use against attacks over the internet.
WHAT IS CYBER SECURITY?
Cybersecurity is the protection of internet-connected systems, including hardware, software, and data, from cyberattacks. In a computing context, security comprises cybersecurity and physical security -- both are used by enterprises to protect against unauthorized access to data centers and other computerized systems. Information security, which is designed to maintain the confidentiality, integrity, and availability of data, is a subset of cybersecurity.
THE CIA TRIAD OF INFORMATION SECURITY
Confidentiality:
Ensures that data or an information system is accessed by only an authorized person.
Integrity:
Integrity assures that the data or information system can be trusted. Ensures that it is edited by only authorized persons and remains in its original state at rest.
Availability:
Data and information systems are available when required.
Categories of Cybercrime
We can categorize cyber crime in two ways:-
The computer as a target:
Using a computer to attack another computer e.g. Hacking, Viruses/Worms attacks, DoS attacks, etc.
The computer as a weapon:
Using a computer to commit real-world crimes e.g. credit card fraud etc.
Types of Cybercrime
Hacking Phishing Types of Cyber Crime Denial of Service Spam Email Spyware, Adware Malware (Trojan, Virus, Worms, etc.) ATM Skimming and Point of Scale Crimes Ransomware
Types of Cyber Attacks by Percentage
(Source-FBI) Financial fraud 11% Sabotage of data/networks 17% Theft of proprietary information 20%System penetration from the outside 25% Denial of Service 27% Unauthorized access by insiders 71% Employee abuse of internet privileges 79% Viruses 85%
Types of Security Tools
Understanding CVE, CWE, CVSS, OWASP Top 10, SANS Top 25. Wireshark demonstration. Nmap demonstration. Nessus - Vulnerability Assessment scanning tool.
Advantage of Cybersecurity
It will defend us from hacks and viruses. It helps us to browse safe websites. Internet Security processes all the incoming and outgoing data on our computers. Cyber security will defend us from critical attacks. The application of cyber security used in our PC needs upto be date every week. The security developers will update their database once every week hence a new virus was also detected.
Safety tiTipso Cybercrime
Use Antivirus Software. Insert Firewalls. Uninstall unnecessary software. Maintain backup. Check security settings. Never give your full name or address to strangers. Learn more about internet privacy.
Reference
https://www.embroker.com/blog/cyber-attack-statistics/
Subscribe to my newsletter
Read articles from Aryan Koundal directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by