Uploaded on Sep 6, 2021
PPT on Cyber Security.
Cyber Security
CYBER SECURITY
WHAT IS CYBER SECURITY?
Cyber security refers to protecting systems connected to the
internet from threats in cyberspace.
It involves protecting software, data, and hardware and helps
prevent cybercriminals from gaining access to devices or the
networks.
Source: www.logpoint.com
PARTS OF CYBER SECURITY
The best cyber security solution will be all-encompassing and
include:
Application security
Cloud security
Data security
Endpoint security
Identity management
Mobile security
Network security
Operational security
Source: www.logpoint.com
IMPORTANCE OF CYBER SECURITY
The importance of cyber security comes down to the desire to keep
information, data, and devices private and safe.
In today’s world, people store vast quantities of data on computers
and other internet-connected devices. Much of which is sensitive,
such as passwords or financial data.
Source: www.logpoint.com
BENEFITS OF CYBER SECURITY
By implementing security, businesses and individuals can protect themselves
against the full range of cyber security threats outlined below, as well as the
numerous others that exist.
With cyber security, companies do not have to worry about unauthorized users
accessing their network or data. It helps them protect both their end users and
their employees.
Source: www.logpoint.com
THREATS OF CYBER SECURITY
The threats countered by cyber-security are three-fold:
1. Cybercrime includes single actors or groups targeting systems for
financial gain or to cause disruption.
2. Cyber-attack often involves politically motivated information gathering.
3. Cyberterrorism is intended to undermine electronic systems to
Source: www.kaspersky.co.in
DIFFERENT TYPES OF
CYBERSECURITY
MALWARE
Malware is a form of malicious software in which any file or program can be
used to harm a computer user. This includes worms, viruses, Trojans and
spyware.
Source: www.logpoint.com
RANSOMWARE
Ransomware is another type of malware. It involves an attacker locking the
victim's computer system files typically through encryption and demanding a
payment to decrypt and unlock them.
Source: www.logpoint.com
PHISHING
Phishing is a form of social engineering where fraudulent email or text
messages that resemble those from reputable or known sources are sent. Often
random attacks, the intent of these messages is to steal sensitive data, such as
credit card or login information
Source: www.logpoint.com
DISTRIBUTED DENIAL-OF-SERVICE
(DDOS)
Distributed denial-of-service (DDoS) attacks are those in which multiple systems
disrupt the traffic of a targeted system, such as a server, website or other
network resource. By flooding the target with messages, connection requests or
packets, the attackers can slow the system or crash it, preventing legitimate
traffic from using it.
Source: www.logpoint.com
ADVANCED PERSISTENT THREATS
(APTS)
Advanced persistent threats (APTs) are prolonged targeted attacks in which an
attacker infiltrates a network and remains undetected for long periods of time
with the aim to steal data.
Source: www.logpoint.com
SQL INJECTION
SQL stands for Structured Query Language. A SQL injection aims to perform
actions on data in a database and potentially steal it. It involves inserting
malicious code via SQL statements, taking advantage of data-driven
applications’ vulnerabilities.
Source: www.logpoint.com
Comments