狠狠撸

狠狠撸Share a Scribd company logo
What is Cyber Security?
? The technique of protecting internet-connected systems such as
computers, servers, mobile devices, electronic systems,
networks, and data from malicious attacks is known as
cybersecurity
Cyber security Fundamentals
i.e. CIA
? Confidentiality: Confidentiality is about preventing the disclosure of data to
unauthorized parties.
It includes:
? Data encryption
? Two-factor authentication
? Biometric verification
? Security tokens
Cyber security Fundamentals
Integrity:
Integrity refers to protecting information from being modified by unauthorized
parties. It includes:
? Cryptographic checksums
? Using file permissions
? Uninterrupted power supplies
? Data backups
Availability:
Availability is making sure that authorized parties are able to access the information
when needed.
It includes:
? Backing up data to external drives
? Implementing firewalls
? Having backup power supplies
? Data redundancy
Types of Cyber Security
? Network Security: It involves implementing the hardware and software
to secure a computer network from unauthorized access. This security
helps an organization to protect its assets against external and internal
threats.
? Application Security: It involves protecting the software and devices
from unwanted threats. This protection can be done by constantly
updating the apps to ensure they are secure from attacks.
? Information or Data Security: It involves implementing a strong data
storage mechanism to maintain the integrity and privacy of data, both in
storage and in transit.
? Identity management: It deals with the procedure for determining the
level of access that each individual has within an organization.
? Operational Security: It involves processing and making decisions on
handling and securing data assets.
Types of Cyber Security
? Mobile Security: It involves securing the organizational and personal data
stored on mobile devices such as cell phones, computers, tablets, and other
similar devices against various malicious threats. These threats are
unauthorized access, device loss or theft, malware, etc.
? Cloud Security: It involves in protecting the information stored in the digital
environment or cloud architectures for the organization. It uses various cloud
service providers such as AWS, Azure, Google, etc., to ensure security
against multiple threats.
? Disaster Recovery and Business Continuity Planning: It deals with the
processes, monitoring, alerts, and plans to how an organization responds
when any malicious activity is causing the loss of operations or data. Its
policies dictate resuming the lost operations after any disaster happens to the
same operating capacity as before the event.
? User Education: It deals with the processes, monitoring, alerts, and plans to
how an organization responds when any malicious activity is causing the loss
of operations or data. Its policies dictate resuming the lost operations after
any disaster happens to the same operating capacity as before the event.
Types of Cyber Security Threats:
A threat in cybersecurity is a malicious activity by an individual or
organization to corrupt or steal data, gain access to a network, or disrupts
digital life in general.
Malware
Malware means malicious software which is used by the cybercriminal or
hacker to damage a user's system.
? Virus: It is a malicious piece of code that spreads from one device to
another. It can clean files and spreads throughout a computer system,
infecting files, stoles information, or damage device.
? Spyware: It is a software that secretly records information about user
activities on their system. For example, spyware could capture credit
card details.
? Trojans: It is a type of malware or code that appears as legitimate(valid)
software or file to fool us into downloading and running. Its primary
purpose is to corrupt or steal data from our device or do other harmful
activities on our network.
? Worms: It is a piece of software that spreads copies of itself from device
to device without human interaction.
? Botnets: It enables cybercriminals to get credentials leaks,
unauthorized access, and data theft without the user's permission.
.
? Phishing
? Phishing is a type of cybercrime in which a sender seems to come from
a genuine organization like financial institutions. They contact a target
or targets via email, phone, or text message with a link to persuade them
to click on that links. This link will redirect them to fraudulent websites to
provide sensitive data such as personal information, usernames, and
passwords. Clicking on the link will also install malware on the target
devices that allow hackers to control devices remotely.
? Man-in-the-middle (MITM) attack
? The main objective of this type of attack is to gain access to our business
or customer data. For example, a cybercriminal could intercept data
passing between the target device and the network on an unprotected
Wi-Fi network.
? Distributed denial of service (DDoS)
? It is a type of cyber threat where the requests come from several IP
addresses that can make the system unusable, overload their servers,
slowing down significantly or temporarily taking them offline, or
.
? Brute Force
? A brute force attack is a cryptographic hack that uses a trial-and-error
method to guess all possible combinations until the correct information is
discovered.
? SQL Injection (SQLI)
? Once the attack is successful, the malicious actor can view, change, or
delete sensitive company data, user lists, or private customer details
stored in the SQL database.
? Domain Name System (DNS) attack
? It is a severe cybersecurity risk because the DNS system is an essential
element of the internet infrastructure.
SECURITY VULNERABILITIES, THREATS AND ATTACKS
Categories of vulnerabilities
? Corrupted (Loss of integrity)
? Leaky (Loss of confidentiality)
? Unavailable or very slow (Loss of availability)
Threats represent potential security harm to an asset when vulnerabilities are
exploited
Attacks are threats that have been carried out
? Passive – Make use of information from the system without affecting system
resources
? Active – Alter system resources or affect operation
? Insider – Initiated by an entity inside the organization
? Outsider – Initiated from outside the perimeter
Cyber Safety Tips
? Conduct cybersecurity training and awareness
? Update software and operating system
? Use anti-virus software
? Perform periodic security reviews
? Use strong passwords
? Do not open email attachments from unknown senders
? Avoid using unsecured Wi-Fi networks in public places
? Backup data
Security Policies
? : Security policies are a formal set of rules which is issued by an organization
to ensure that the user who are authorized to access company technology and
information assets comply with rules and guidelines related to the security of
information. A security policy also considered to be a "living document" which
means that the document is never finished, but it is continuously updated as
requirements of the technology and employee changes. We use security
policies to manage our network security. Most types of security policies are
automatically created during the installation. We can also customize policies
to suit our specific environment. Need of Security policies1) It increases
efficiency. 2) It upholds discipline and accountability 3) It can make or break a
business deal 4) It helps to educate employees on security literacy
REGULATIONS
? There are five predominant laws to cover when it comes to cybersecurity: Information Technology
Act, 2000 The Indian cyber laws are governed by the Information Technology Act, penned down back
in 2000. The principal impetus of this Act is to offer reliable legal inclusiveness to eCommerce,
facilitating registration of real-time records with the Government. But with the cyber attackers
getting sneakier, topped by the human tendency to misuse technology, a series of amendments
followed. The ITA, enacted by the Parliament of India, highlights the grievous punishments and
penalties safeguarding the e-governance, e-banking, and e-commerce sectors. Now, the scope of ITA
has been enhanced to encompass all the latest communication devices. The IT Act is the salient one,
guiding the entire Indian legislation to govern cybercrimes rigorously:
? Section 43 - Applicable to people who damage the computer systems without permission from the
owner. The owner can fully claim compensation for the entire damage in such cases.
? Section 66 - Applicable in case a person is found to dishonestly or fraudulently committing any act
referred to in section 43. The imprisonment term in such instances can mount up to three years or a
fine of up to Rs. 5 lakh.
? Section 66B - Incorporates the punishments for fraudulently receiving stolen communication devices
or computers, which confirms a probable three years imprisonment. This term can also be topped by
Rs. 1 lakh fine, depending upon the severity.
? Section 66C - This section scrutinizes the identity thefts related to imposter digital signatures,
hacking passwords, or other distinctive identification features. If proven guilty, imprisonment of
three years might also be backed by Rs.1 lakh fine.
REGULATIONS
? Section 66 D - This section was inserted on-demand, focusing on punishing cheaters doing impersonation using
computer resources.
? Indian Penal Code (IPC) 1980 Identity thefts and associated cyber frauds are embodied in the Indian Penal
Code (IPC), 1860 - invoked along with the Information Technology Act of 2000.
? The primary relevant section of the IPC covers cyber frauds: Forgery (Section 464)
? Forgery pre-planned for cheating (Section 468)
? False documentation (Section 465)
? Presenting a forged document as genuine (Section 471)
? Reputation damage (Section 469)
? Companies Act of 2013
? The corporate stakeholders refer to the Companies Act of 2013 as the legal obligation necessary for the
refinement of daily operations. The directives of this Act cements all the required techno-legal compliances,
putting the less compliant companies in a legal fix.
? The Companies Act 2013 vested powers in the hands of the SFIO (Serious Frauds Investigation Office) to
prosecute Indian companies and their directors. Also, post the notification of the Companies Inspection,
Investment, and Inquiry Rules, 2014, SFIOs has become even more proactive and stern in this regard. The
legislature ensured that all the regulatory compliances are well-covered, including cyber forensics, e-discovery,
and cybersecurity diligence. The Companies (Management and Administration) Rules, 2014 prescribes strict
guidelines confirming the cybersecurity obligations and responsibilities upon the company directors and
leaders.

More Related Content

Similar to Cyber Sequrity.pptx is life of cyber security (20)

hgfhvgggggggggggggggggggggggpresent.pptx
hgfhvgggggggggggggggggggggggpresent.pptxhgfhvgggggggggggggggggggggggpresent.pptx
hgfhvgggggggggggggggggggggggpresent.pptx
wellmove2222
?
Cysec.pptx
Cysec.pptxCysec.pptx
Cysec.pptx
jondon17
?
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
?
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
GauravWankar2
?
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
?
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
?
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
ANIKETKUMARSHARMA3
?
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
56ushodayareddy
?
презентация1
презентация1презентация1
презентация1
sagidullaa01
?
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
?
sec.This includes policy settings that prevent unauthorized people
sec.This includes policy settings that prevent unauthorized peoplesec.This includes policy settings that prevent unauthorized people
sec.This includes policy settings that prevent unauthorized people
JuliusECatipon
?
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
?
Cysecc.pptx
Cysecc.pptxCysecc.pptx
Cysecc.pptx
jondon17
?
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
Sweta Kumari Barnwal
?
Management Information Systems ( Security and Control.pptx
Management Information Systems ( Security and Control.pptxManagement Information Systems ( Security and Control.pptx
Management Information Systems ( Security and Control.pptx
NamugenyiBetty
?
Topic – cyber security, Introduction,future scope
Topic – cyber security, Introduction,future scopeTopic – cyber security, Introduction,future scope
Topic – cyber security, Introduction,future scope
gauravnainwal2291
?
Information Security Bachelor in Information technology unit 1
Information Security Bachelor in Information technology unit 1Information Security Bachelor in Information technology unit 1
Information Security Bachelor in Information technology unit 1
ssuserf35ac9
?
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
?
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
WilsonWanjohi5
?
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
?
hgfhvgggggggggggggggggggggggpresent.pptx
hgfhvgggggggggggggggggggggggpresent.pptxhgfhvgggggggggggggggggggggggpresent.pptx
hgfhvgggggggggggggggggggggggpresent.pptx
wellmove2222
?
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
MBRoman1
?
SEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptxSEMINAR ON CYBER SECURITY.pptx
SEMINAR ON CYBER SECURITY.pptx
GauravWankar2
?
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
?
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
?
презентация1
презентация1презентация1
презентация1
sagidullaa01
?
Cyber Security PPT.pptx
Cyber Security PPT.pptxCyber Security PPT.pptx
Cyber Security PPT.pptx
AkshayKhade21
?
sec.This includes policy settings that prevent unauthorized people
sec.This includes policy settings that prevent unauthorized peoplesec.This includes policy settings that prevent unauthorized people
sec.This includes policy settings that prevent unauthorized people
JuliusECatipon
?
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
?
Management Information Systems ( Security and Control.pptx
Management Information Systems ( Security and Control.pptxManagement Information Systems ( Security and Control.pptx
Management Information Systems ( Security and Control.pptx
NamugenyiBetty
?
Topic – cyber security, Introduction,future scope
Topic – cyber security, Introduction,future scopeTopic – cyber security, Introduction,future scope
Topic – cyber security, Introduction,future scope
gauravnainwal2291
?
Information Security Bachelor in Information technology unit 1
Information Security Bachelor in Information technology unit 1Information Security Bachelor in Information technology unit 1
Information Security Bachelor in Information technology unit 1
ssuserf35ac9
?
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
Sweta Kumari Barnwal
?
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
WilsonWanjohi5
?

More from perweeng31 (6)

SPREADSHEET 2.pptx is the power point presentations
SPREADSHEET 2.pptx is the power point presentationsSPREADSHEET 2.pptx is the power point presentations
SPREADSHEET 2.pptx is the power point presentations
perweeng31
?
19 MS word.pptx iybvs bscj ghdj shhshhhsh
19 MS word.pptx iybvs bscj ghdj  shhshhhsh19 MS word.pptx iybvs bscj ghdj  shhshhhsh
19 MS word.pptx iybvs bscj ghdj shhshhhsh
perweeng31
?
18 LINUX OS.pptx Linux command is basic isma
18 LINUX OS.pptx Linux command is basic isma18 LINUX OS.pptx Linux command is basic isma
18 LINUX OS.pptx Linux command is basic isma
perweeng31
?
15 SMPS.ppt simple mail protocol systeyk
15 SMPS.ppt simple mail protocol systeyk15 SMPS.ppt simple mail protocol systeyk
15 SMPS.ppt simple mail protocol systeyk
perweeng31
?
10 MS DOS and Its Commands.pptx .related to
10 MS DOS  and Its Commands.pptx .related to10 MS DOS  and Its Commands.pptx .related to
10 MS DOS and Its Commands.pptx .related to
perweeng31
?
SAFETY PRECAUTION.pptx . safety is firstv
SAFETY PRECAUTION.pptx . safety is firstvSAFETY PRECAUTION.pptx . safety is firstv
SAFETY PRECAUTION.pptx . safety is firstv
perweeng31
?
SPREADSHEET 2.pptx is the power point presentations
SPREADSHEET 2.pptx is the power point presentationsSPREADSHEET 2.pptx is the power point presentations
SPREADSHEET 2.pptx is the power point presentations
perweeng31
?
19 MS word.pptx iybvs bscj ghdj shhshhhsh
19 MS word.pptx iybvs bscj ghdj  shhshhhsh19 MS word.pptx iybvs bscj ghdj  shhshhhsh
19 MS word.pptx iybvs bscj ghdj shhshhhsh
perweeng31
?
18 LINUX OS.pptx Linux command is basic isma
18 LINUX OS.pptx Linux command is basic isma18 LINUX OS.pptx Linux command is basic isma
18 LINUX OS.pptx Linux command is basic isma
perweeng31
?
15 SMPS.ppt simple mail protocol systeyk
15 SMPS.ppt simple mail protocol systeyk15 SMPS.ppt simple mail protocol systeyk
15 SMPS.ppt simple mail protocol systeyk
perweeng31
?
10 MS DOS and Its Commands.pptx .related to
10 MS DOS  and Its Commands.pptx .related to10 MS DOS  and Its Commands.pptx .related to
10 MS DOS and Its Commands.pptx .related to
perweeng31
?
SAFETY PRECAUTION.pptx . safety is firstv
SAFETY PRECAUTION.pptx . safety is firstvSAFETY PRECAUTION.pptx . safety is firstv
SAFETY PRECAUTION.pptx . safety is firstv
perweeng31
?

Recently uploaded (20)

Internal-Security.pdf_compressed.pdfnnnn
Internal-Security.pdf_compressed.pdfnnnnInternal-Security.pdf_compressed.pdfnnnn
Internal-Security.pdf_compressed.pdfnnnn
AshwinR69
?
Etendue of microLED: fundamental theory and applications
Etendue of microLED: fundamental theory and applicationsEtendue of microLED: fundamental theory and applications
Etendue of microLED: fundamental theory and applications
Brian Kim, PhD
?
cybergyanppt.pptx centre for development of
cybergyanppt.pptx centre for development ofcybergyanppt.pptx centre for development of
cybergyanppt.pptx centre for development of
jainsambhav4507
?
Word Processing - Module 1.pptx to become
Word Processing - Module 1.pptx to becomeWord Processing - Module 1.pptx to become
Word Processing - Module 1.pptx to become
steveparker9990sp
?
复刻一套加拿大康考迪亚大学毕业证成绩单信封等材料最强攻略
复刻一套加拿大康考迪亚大学毕业证成绩单信封等材料最强攻略复刻一套加拿大康考迪亚大学毕业证成绩单信封等材料最强攻略
复刻一套加拿大康考迪亚大学毕业证成绩单信封等材料最强攻略
taqyed
?
Microtek Household Wires – Safe & Durable Wires for Your Home
Microtek Household Wires – Safe & Durable Wires for Your HomeMicrotek Household Wires – Safe & Durable Wires for Your Home
Microtek Household Wires – Safe & Durable Wires for Your Home
microtekindia00
?
一比一原版加拿大不列颠哥伦比亚大学毕业证(鲍叠颁毕业证书)如何办理
一比一原版加拿大不列颠哥伦比亚大学毕业证(鲍叠颁毕业证书)如何办理一比一原版加拿大不列颠哥伦比亚大学毕业证(鲍叠颁毕业证书)如何办理
一比一原版加拿大不列颠哥伦比亚大学毕业证(鲍叠颁毕业证书)如何办理
taqyed
?
Buy Jumbo UPS in India – Microtek’s Powerful & Reliable Solutions
Buy Jumbo UPS in India – Microtek’s Powerful & Reliable SolutionsBuy Jumbo UPS in India – Microtek’s Powerful & Reliable Solutions
Buy Jumbo UPS in India – Microtek’s Powerful & Reliable Solutions
microtekindia00
?
Best Desktop Computer Brands Available in Australia.pptx
Best Desktop Computer Brands Available in Australia.pptxBest Desktop Computer Brands Available in Australia.pptx
Best Desktop Computer Brands Available in Australia.pptx
Computer alliance
?
Microtek Home UPS – Best Power Backup Solutions in India
Microtek Home UPS – Best Power Backup Solutions in IndiaMicrotek Home UPS – Best Power Backup Solutions in India
Microtek Home UPS – Best Power Backup Solutions in India
microtekindia00
?
Basic of Electronics (haahahahhaah1).pptx
Basic of Electronics (haahahahhaah1).pptxBasic of Electronics (haahahahhaah1).pptx
Basic of Electronics (haahahahhaah1).pptx
ZAFIRATAHSEENHOQUE
?
一比一原版(罢惭鲍毕业证书)多伦多都会大学毕业证如何办理
一比一原版(罢惭鲍毕业证书)多伦多都会大学毕业证如何办理一比一原版(罢惭鲍毕业证书)多伦多都会大学毕业证如何办理
一比一原版(罢惭鲍毕业证书)多伦多都会大学毕业证如何办理
taqyed
?
Most Trusted Home Automation Company in India- Jasmine Smart Homes
Most Trusted Home Automation Company in India- Jasmine Smart HomesMost Trusted Home Automation Company in India- Jasmine Smart Homes
Most Trusted Home Automation Company in India- Jasmine Smart Homes
sanskar01021985
?
Computer Memory.pptx with its types and storage
Computer Memory.pptx with its types and storageComputer Memory.pptx with its types and storage
Computer Memory.pptx with its types and storage
sureshrani1169
?
Lecture TWO.pptx about IT and it's discipline
Lecture TWO.pptx about IT and it's disciplineLecture TWO.pptx about IT and it's discipline
Lecture TWO.pptx about IT and it's discipline
ChandigaRichard1
?
Train _Accident _Safety using track .pptx
Train _Accident _Safety using track .pptxTrain _Accident _Safety using track .pptx
Train _Accident _Safety using track .pptx
RajaBabu290247
?
Summary_of_Union_Budget_2025-26.pdfhhhbb
Summary_of_Union_Budget_2025-26.pdfhhhbbSummary_of_Union_Budget_2025-26.pdfhhhbb
Summary_of_Union_Budget_2025-26.pdfhhhbb
AshwinR69
?
Microsoft Office 365 Crack + Product Key Latest
Microsoft Office 365 Crack + Product Key LatestMicrosoft Office 365 Crack + Product Key Latest
Microsoft Office 365 Crack + Product Key Latest
hassanjameelrt45
?
加拿大毕业证购买(多伦多大学成绩单)鲍罢厂骋文凭学历认证
加拿大毕业证购买(多伦多大学成绩单)鲍罢厂骋文凭学历认证加拿大毕业证购买(多伦多大学成绩单)鲍罢厂骋文凭学历认证
加拿大毕业证购买(多伦多大学成绩单)鲍罢厂骋文凭学历认证
taqyed
?
Microsoft Office 365 Crack Latest Version 2025?
Microsoft Office 365 Crack Latest Version 2025?Microsoft Office 365 Crack Latest Version 2025?
Microsoft Office 365 Crack Latest Version 2025?
crackstore786
?
Internal-Security.pdf_compressed.pdfnnnn
Internal-Security.pdf_compressed.pdfnnnnInternal-Security.pdf_compressed.pdfnnnn
Internal-Security.pdf_compressed.pdfnnnn
AshwinR69
?
Etendue of microLED: fundamental theory and applications
Etendue of microLED: fundamental theory and applicationsEtendue of microLED: fundamental theory and applications
Etendue of microLED: fundamental theory and applications
Brian Kim, PhD
?
cybergyanppt.pptx centre for development of
cybergyanppt.pptx centre for development ofcybergyanppt.pptx centre for development of
cybergyanppt.pptx centre for development of
jainsambhav4507
?
Word Processing - Module 1.pptx to become
Word Processing - Module 1.pptx to becomeWord Processing - Module 1.pptx to become
Word Processing - Module 1.pptx to become
steveparker9990sp
?
复刻一套加拿大康考迪亚大学毕业证成绩单信封等材料最强攻略
复刻一套加拿大康考迪亚大学毕业证成绩单信封等材料最强攻略复刻一套加拿大康考迪亚大学毕业证成绩单信封等材料最强攻略
复刻一套加拿大康考迪亚大学毕业证成绩单信封等材料最强攻略
taqyed
?
Microtek Household Wires – Safe & Durable Wires for Your Home
Microtek Household Wires – Safe & Durable Wires for Your HomeMicrotek Household Wires – Safe & Durable Wires for Your Home
Microtek Household Wires – Safe & Durable Wires for Your Home
microtekindia00
?
一比一原版加拿大不列颠哥伦比亚大学毕业证(鲍叠颁毕业证书)如何办理
一比一原版加拿大不列颠哥伦比亚大学毕业证(鲍叠颁毕业证书)如何办理一比一原版加拿大不列颠哥伦比亚大学毕业证(鲍叠颁毕业证书)如何办理
一比一原版加拿大不列颠哥伦比亚大学毕业证(鲍叠颁毕业证书)如何办理
taqyed
?
Buy Jumbo UPS in India – Microtek’s Powerful & Reliable Solutions
Buy Jumbo UPS in India – Microtek’s Powerful & Reliable SolutionsBuy Jumbo UPS in India – Microtek’s Powerful & Reliable Solutions
Buy Jumbo UPS in India – Microtek’s Powerful & Reliable Solutions
microtekindia00
?
Best Desktop Computer Brands Available in Australia.pptx
Best Desktop Computer Brands Available in Australia.pptxBest Desktop Computer Brands Available in Australia.pptx
Best Desktop Computer Brands Available in Australia.pptx
Computer alliance
?
Microtek Home UPS – Best Power Backup Solutions in India
Microtek Home UPS – Best Power Backup Solutions in IndiaMicrotek Home UPS – Best Power Backup Solutions in India
Microtek Home UPS – Best Power Backup Solutions in India
microtekindia00
?
Basic of Electronics (haahahahhaah1).pptx
Basic of Electronics (haahahahhaah1).pptxBasic of Electronics (haahahahhaah1).pptx
Basic of Electronics (haahahahhaah1).pptx
ZAFIRATAHSEENHOQUE
?
一比一原版(罢惭鲍毕业证书)多伦多都会大学毕业证如何办理
一比一原版(罢惭鲍毕业证书)多伦多都会大学毕业证如何办理一比一原版(罢惭鲍毕业证书)多伦多都会大学毕业证如何办理
一比一原版(罢惭鲍毕业证书)多伦多都会大学毕业证如何办理
taqyed
?
Most Trusted Home Automation Company in India- Jasmine Smart Homes
Most Trusted Home Automation Company in India- Jasmine Smart HomesMost Trusted Home Automation Company in India- Jasmine Smart Homes
Most Trusted Home Automation Company in India- Jasmine Smart Homes
sanskar01021985
?
Computer Memory.pptx with its types and storage
Computer Memory.pptx with its types and storageComputer Memory.pptx with its types and storage
Computer Memory.pptx with its types and storage
sureshrani1169
?
Lecture TWO.pptx about IT and it's discipline
Lecture TWO.pptx about IT and it's disciplineLecture TWO.pptx about IT and it's discipline
Lecture TWO.pptx about IT and it's discipline
ChandigaRichard1
?
Train _Accident _Safety using track .pptx
Train _Accident _Safety using track .pptxTrain _Accident _Safety using track .pptx
Train _Accident _Safety using track .pptx
RajaBabu290247
?
Summary_of_Union_Budget_2025-26.pdfhhhbb
Summary_of_Union_Budget_2025-26.pdfhhhbbSummary_of_Union_Budget_2025-26.pdfhhhbb
Summary_of_Union_Budget_2025-26.pdfhhhbb
AshwinR69
?
Microsoft Office 365 Crack + Product Key Latest
Microsoft Office 365 Crack + Product Key LatestMicrosoft Office 365 Crack + Product Key Latest
Microsoft Office 365 Crack + Product Key Latest
hassanjameelrt45
?
加拿大毕业证购买(多伦多大学成绩单)鲍罢厂骋文凭学历认证
加拿大毕业证购买(多伦多大学成绩单)鲍罢厂骋文凭学历认证加拿大毕业证购买(多伦多大学成绩单)鲍罢厂骋文凭学历认证
加拿大毕业证购买(多伦多大学成绩单)鲍罢厂骋文凭学历认证
taqyed
?
Microsoft Office 365 Crack Latest Version 2025?
Microsoft Office 365 Crack Latest Version 2025?Microsoft Office 365 Crack Latest Version 2025?
Microsoft Office 365 Crack Latest Version 2025?
crackstore786
?

Cyber Sequrity.pptx is life of cyber security

  • 1. What is Cyber Security? ? The technique of protecting internet-connected systems such as computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks is known as cybersecurity
  • 2. Cyber security Fundamentals i.e. CIA ? Confidentiality: Confidentiality is about preventing the disclosure of data to unauthorized parties. It includes: ? Data encryption ? Two-factor authentication ? Biometric verification ? Security tokens
  • 3. Cyber security Fundamentals Integrity: Integrity refers to protecting information from being modified by unauthorized parties. It includes: ? Cryptographic checksums ? Using file permissions ? Uninterrupted power supplies ? Data backups Availability: Availability is making sure that authorized parties are able to access the information when needed. It includes: ? Backing up data to external drives ? Implementing firewalls ? Having backup power supplies ? Data redundancy
  • 4. Types of Cyber Security ? Network Security: It involves implementing the hardware and software to secure a computer network from unauthorized access. This security helps an organization to protect its assets against external and internal threats. ? Application Security: It involves protecting the software and devices from unwanted threats. This protection can be done by constantly updating the apps to ensure they are secure from attacks. ? Information or Data Security: It involves implementing a strong data storage mechanism to maintain the integrity and privacy of data, both in storage and in transit. ? Identity management: It deals with the procedure for determining the level of access that each individual has within an organization. ? Operational Security: It involves processing and making decisions on handling and securing data assets.
  • 5. Types of Cyber Security ? Mobile Security: It involves securing the organizational and personal data stored on mobile devices such as cell phones, computers, tablets, and other similar devices against various malicious threats. These threats are unauthorized access, device loss or theft, malware, etc. ? Cloud Security: It involves in protecting the information stored in the digital environment or cloud architectures for the organization. It uses various cloud service providers such as AWS, Azure, Google, etc., to ensure security against multiple threats. ? Disaster Recovery and Business Continuity Planning: It deals with the processes, monitoring, alerts, and plans to how an organization responds when any malicious activity is causing the loss of operations or data. Its policies dictate resuming the lost operations after any disaster happens to the same operating capacity as before the event. ? User Education: It deals with the processes, monitoring, alerts, and plans to how an organization responds when any malicious activity is causing the loss of operations or data. Its policies dictate resuming the lost operations after any disaster happens to the same operating capacity as before the event.
  • 6. Types of Cyber Security Threats: A threat in cybersecurity is a malicious activity by an individual or organization to corrupt or steal data, gain access to a network, or disrupts digital life in general.
  • 7. Malware Malware means malicious software which is used by the cybercriminal or hacker to damage a user's system. ? Virus: It is a malicious piece of code that spreads from one device to another. It can clean files and spreads throughout a computer system, infecting files, stoles information, or damage device. ? Spyware: It is a software that secretly records information about user activities on their system. For example, spyware could capture credit card details. ? Trojans: It is a type of malware or code that appears as legitimate(valid) software or file to fool us into downloading and running. Its primary purpose is to corrupt or steal data from our device or do other harmful activities on our network. ? Worms: It is a piece of software that spreads copies of itself from device to device without human interaction. ? Botnets: It enables cybercriminals to get credentials leaks, unauthorized access, and data theft without the user's permission.
  • 8. . ? Phishing ? Phishing is a type of cybercrime in which a sender seems to come from a genuine organization like financial institutions. They contact a target or targets via email, phone, or text message with a link to persuade them to click on that links. This link will redirect them to fraudulent websites to provide sensitive data such as personal information, usernames, and passwords. Clicking on the link will also install malware on the target devices that allow hackers to control devices remotely. ? Man-in-the-middle (MITM) attack ? The main objective of this type of attack is to gain access to our business or customer data. For example, a cybercriminal could intercept data passing between the target device and the network on an unprotected Wi-Fi network. ? Distributed denial of service (DDoS) ? It is a type of cyber threat where the requests come from several IP addresses that can make the system unusable, overload their servers, slowing down significantly or temporarily taking them offline, or
  • 9. . ? Brute Force ? A brute force attack is a cryptographic hack that uses a trial-and-error method to guess all possible combinations until the correct information is discovered. ? SQL Injection (SQLI) ? Once the attack is successful, the malicious actor can view, change, or delete sensitive company data, user lists, or private customer details stored in the SQL database. ? Domain Name System (DNS) attack ? It is a severe cybersecurity risk because the DNS system is an essential element of the internet infrastructure.
  • 10. SECURITY VULNERABILITIES, THREATS AND ATTACKS Categories of vulnerabilities ? Corrupted (Loss of integrity) ? Leaky (Loss of confidentiality) ? Unavailable or very slow (Loss of availability) Threats represent potential security harm to an asset when vulnerabilities are exploited Attacks are threats that have been carried out ? Passive – Make use of information from the system without affecting system resources ? Active – Alter system resources or affect operation ? Insider – Initiated by an entity inside the organization ? Outsider – Initiated from outside the perimeter
  • 11. Cyber Safety Tips ? Conduct cybersecurity training and awareness ? Update software and operating system ? Use anti-virus software ? Perform periodic security reviews ? Use strong passwords ? Do not open email attachments from unknown senders ? Avoid using unsecured Wi-Fi networks in public places ? Backup data
  • 12. Security Policies ? : Security policies are a formal set of rules which is issued by an organization to ensure that the user who are authorized to access company technology and information assets comply with rules and guidelines related to the security of information. A security policy also considered to be a "living document" which means that the document is never finished, but it is continuously updated as requirements of the technology and employee changes. We use security policies to manage our network security. Most types of security policies are automatically created during the installation. We can also customize policies to suit our specific environment. Need of Security policies1) It increases efficiency. 2) It upholds discipline and accountability 3) It can make or break a business deal 4) It helps to educate employees on security literacy
  • 13. REGULATIONS ? There are five predominant laws to cover when it comes to cybersecurity: Information Technology Act, 2000 The Indian cyber laws are governed by the Information Technology Act, penned down back in 2000. The principal impetus of this Act is to offer reliable legal inclusiveness to eCommerce, facilitating registration of real-time records with the Government. But with the cyber attackers getting sneakier, topped by the human tendency to misuse technology, a series of amendments followed. The ITA, enacted by the Parliament of India, highlights the grievous punishments and penalties safeguarding the e-governance, e-banking, and e-commerce sectors. Now, the scope of ITA has been enhanced to encompass all the latest communication devices. The IT Act is the salient one, guiding the entire Indian legislation to govern cybercrimes rigorously: ? Section 43 - Applicable to people who damage the computer systems without permission from the owner. The owner can fully claim compensation for the entire damage in such cases. ? Section 66 - Applicable in case a person is found to dishonestly or fraudulently committing any act referred to in section 43. The imprisonment term in such instances can mount up to three years or a fine of up to Rs. 5 lakh. ? Section 66B - Incorporates the punishments for fraudulently receiving stolen communication devices or computers, which confirms a probable three years imprisonment. This term can also be topped by Rs. 1 lakh fine, depending upon the severity. ? Section 66C - This section scrutinizes the identity thefts related to imposter digital signatures, hacking passwords, or other distinctive identification features. If proven guilty, imprisonment of three years might also be backed by Rs.1 lakh fine.
  • 14. REGULATIONS ? Section 66 D - This section was inserted on-demand, focusing on punishing cheaters doing impersonation using computer resources. ? Indian Penal Code (IPC) 1980 Identity thefts and associated cyber frauds are embodied in the Indian Penal Code (IPC), 1860 - invoked along with the Information Technology Act of 2000. ? The primary relevant section of the IPC covers cyber frauds: Forgery (Section 464) ? Forgery pre-planned for cheating (Section 468) ? False documentation (Section 465) ? Presenting a forged document as genuine (Section 471) ? Reputation damage (Section 469) ? Companies Act of 2013 ? The corporate stakeholders refer to the Companies Act of 2013 as the legal obligation necessary for the refinement of daily operations. The directives of this Act cements all the required techno-legal compliances, putting the less compliant companies in a legal fix. ? The Companies Act 2013 vested powers in the hands of the SFIO (Serious Frauds Investigation Office) to prosecute Indian companies and their directors. Also, post the notification of the Companies Inspection, Investment, and Inquiry Rules, 2014, SFIOs has become even more proactive and stern in this regard. The legislature ensured that all the regulatory compliances are well-covered, including cyber forensics, e-discovery, and cybersecurity diligence. The Companies (Management and Administration) Rules, 2014 prescribes strict guidelines confirming the cybersecurity obligations and responsibilities upon the company directors and leaders.