Uploaded on Jun 18, 2019
The presentation is all about cyber security. It covers its all threats, precautions and measures.
CYBER SECURITY
CYBER SECURITY
ALL ABOUT IT THAT ONE SHOULD KNOW
INTRODUCTION
Cyber attacks are increasing day by day so to protect the system and the
data form this attacks some cyber security measures are taken. The need of
cyber security was felt when cyber attacks were increasing and people were
getting problems from it.Cyber security needs dedication. The multinational
companies and industries are having a great amount of possessive data, so
there protection is important as well as. The details of clients and there
contracts are very sensitive so that every company needs cyber security.
When the data is protected by means of technical security we can say it
cyber security.
THREATS OF CYBER SECURITY
SQL Injection-When an attacker inserts a complicated SQL statement in
order to get the information from a particular website ,it is known as SQL
injection.
Malwares-When malware software are used to get the information related to
someone’s company then it is called as malware attack.
Social Engineering- It is the way of getting user name,password,card numbers
etc.for impersonating a contractor or customer.
Password attacks are another type of cyber security hacks .Generally
password attacks happens in getting sensitive information of credit cards.
The illegal attackers generally attack retail shops online, as there
websites are outdated and can be hacked easily.Hence one should know
all the security threats for protecting their website.
PRECAUTIONS OF CYBER SECURITY
Pre-evaluation-In this the security system is checked in advance before any
attack.
Strategic planning- A planning in advance should be planned in order to
protect the data of our system.
Implementation-There are stages for this process-
· Commitment of the employees
· Commitment of management
· Commitment with organizational members
Post evaluation-Here the success of the process is determined from Pre-
evaluation to implementation.
SYSTEM WHICH ARE AT MAJOR RISKS
The systems which are at major risks by cyber crime are goverment ,large
corporation,consumer devices,financial systems etc.
● Government -The government and military systems and sites are
generally attacked by an authorised member or foreign powers in order
to get information about a country’s security information and to get
information about it’s people.
● Large corporation-Commonly large corporations are targeted for
financial gain of the hacker. It can be done by any person or Foreign
power.
● Consumer devices-The consumer devices are targeted by means of
getting basic information, Card numbers,sensitive health information
etc.
MOTIVE OF ATTACKERS
The motive of attackers can be different in every case. Some are criminals
which are willing for financial gain, some are willing for someone’s basic
information for their use. The military security is also targeted by the
foreigners some time. The military security and banks are targeted mostly by
hackers.
SECURITY MEASURES
There are some security measures which can be taken to protect data,
information etc of a company or a personal computer.
· Firewall is the common step that is taken nowadays for protecting the
system for external agents.
· User access account controls can protect the data and information of a
system.
· Intrusion Detection System is designed particularly for detecting any cyber
attack in advance.
MAJOR CYBER ATTACKS
● The South Korean nightmare
● Alteryx data leak
● Marriott Hotels : privacy of customers compromised
● Adult Friend Finder Exposed
● Panic at Sony
The conclusion depicts that a large corporation, government
sites, military systems and personal systems must be secured in
order to protect the information and data related to a
customer, military operation and basic information.
For more information visit:
Technology moon
Comments