Uploaded on Jun 2, 2021
PPT on Cyber Security Definition, Types, and Importance.
Cyber Security Definition, Types and Importance.
CYBER SECURITY: DEFINITION, TYPES, AND
IMPORTANCE
What is cyber security?
• Cyber security refers to protecting systems connected to the internet from
threats in cyberspace.
• It involves protecting software, data, and hardware and helps prevent
cybercriminals from gaining access to devices or the networks.
Source: www.logpoint.com
Parts of cyber security
• The best cyber security solution will be all-encompassing and include:
– Application security
– Cloud security
– Data security
– Endpoint security
– Identity management
– Mobile security
– Network security
– Operational security
Source: www.logpoint.com
Importance of cyber security
• The importance of cyber security comes down to the desire to keep information,
data, and devices private and safe.
• In today’s world, people store vast quantities of data on computers and other
internet-connected devices. Much of which is sensitive, such as passwords or
financial data.
Source: www.logpoint.com
Benefits of cyber security
• By implementing security, businesses and individuals can protect themselves against the full
range of cyber security threats outlined below, as well as the numerous others that exist.
• With cyber security, companies do not have to worry about unauthorized users accessing
their network or data. It helps them protect both their end users and their employees.
Source: www.logpoint.com
Threats of cyber security
• The threats countered by cyber-security are three-fold:
1. Cybercrime includes single actors or groups targeting systems for financial gain or to
cause disruption.
2. Cyber-attack often involves politically motivated information gathering.
3. Cyberterrorism is intended to undermine electronic systems to
Source: www.kaspersky.co.in
DIFFERENT TYPES OF CYBERSECURITY
Malware
• Malware is a form of malicious software in which any file or program can be used to harm a
computer user. This includes worms, viruses, Trojans and spyware.
Source: www.logpoint.com
Ransomware
• Ransomware is another type of malware. It involves an attacker locking the victim's computer
system files typically through encryption and demanding a payment to decrypt and unlock
them.
Source: www.logpoint.com
Phishing
• Phishing is a form of social engineering where fraudulent email or text messages that
resemble those from reputable or known sources are sent. Often random attacks, the intent
of these messages is to steal sensitive data, such as credit card or login information
Source: www.logpoint.com
Distributed denial-of-service (DDoS)
• Distributed denial-of-service (DDoS) attacks are those in which multiple systems disrupt the
traffic of a targeted system, such as a server, website or other network resource. By flooding
the target with messages, connection requests or packets, the attackers can slow the system
or crash it, preventing legitimate traffic from using it.
Source: www.logpoint.com
Advanced persistent threats (APTs)
• Advanced persistent threats (APTs) are prolonged targeted attacks in which an attacker
infiltrates a network and remains undetected for long periods of time with the aim to steal
data.
Source: www.logpoint.com
SQL Injection
• SQL stands for Structured Query Language. A SQL injection aims to perform actions on data in
a database and potentially steal it. It involves inserting malicious code via SQL statements,
taking advantage of data-driven applications’ vulnerabilities.
Source: www.logpoint.com
Comments