Uploaded on Jan 12, 2022
PPT on Cyber Crime and Security.
Cyber Crime and Security
CYBER
CRIME AND
SECURITY
WHAT IS CYBER SECURITY?
Cyber security is the practice of defending computers, servers,
mobile devices, electronic systems, networks, and data from
malicious attacks.
Source: www.kaspersky.com
TYPES OF CYBER THREATS
The threats countered by cyber-security are three-fold:
Cybercrime includes single actors or groups targeting systems for financial gain or to
cause disruption.
Cyber-attack often involves politically motivated information gathering.
Cyberterrorism is intended to undermine electronic systems to cause panic or fear.
Source: www.kaspersky.com
HOW BIG IS THE THREAT?
The threat posed by cyber-crime is real and it’s growing, with global cyber-
attacks up 63% in the last three years.
Cyber-crime is even thought to be overtaking the illegal drugs trade in terms
of profitability.
Source: www. gosuperscript.com
SECTORS EXPOSED TO
MeCdicalY serBviceEs, reRtaile rsT andH pubRlic eEntitieAs eTxperienced the most breaches,
with malicious criminals responsible for most incidents.
Some of these sectors are more appealing to cybercriminals because they
collect financial and medical data, but all businesses that use networks can be
targeted for customer data, corporate espionage, or customer attacks.
Source: www. gosuperscript.com
CYBER CRIME IN OUR DAILY
TheL IntIeVrnet Eof TShings provides new and concerning avenues of attack. For a start,
many smart appliances aren’t as secure as they could be.
And as the internet becomes increasingly interwoven with our devices and
appliances, cyber-crime could start encroaching more and more into our daily lives.
Source: www. gosuperscript.com
THE SCALE OF THE CYBER
TheT gloHbal RcybeEr thAreaTt continues to evolve at a rapid pace, with a rising
number of data breaches each year.
A report by Risk Based Security revealed that a shocking 7.9 billion records
have been exposed by data breaches in the first nine months of 2019 alone.
Source: www. kaspersky.com
HOW EFFECTIVE ARE SECURITY
MEASURES?
Cyber security measures are only as good as the people and fallbacks you must
implement and deal with them.
There are some great security resources out there, but to be as safe as you can be,
you need to ensure all your people are clued up on the threats.
Source: www. gosuperscript.com
SMARTPHONE CYBER-SECURITY
Smartphone cyber-security does exist, it’s not utilized as often as it should be.
Cyber-criminals are becoming increasingly adept at attacking through smartphones
and mobile networks, with mobile malware up 40% in 2018.
Source: www. gosuperscript.com
END-USER PROTECTION
End-user protection or endpoint security is a crucial aspect of cyber security. After
all, it is often an individual (the end-user) who accidentally uploads malware or
another form of cyber threat to their desktop, laptop or mobile device.
Source: www. gosuperscript.com
THANK YOU
Comments