1 / 10

CYBER SECURITY-ALL ABOUT IT THAT YOU SHOULD KNOW

The presentation is about cyber security. It covers its threats, precautions and measures.<br>https://technologymoon.com/

Vartika123
Download Presentation

CYBER SECURITY-ALL ABOUT IT THAT YOU SHOULD KNOW

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CYBER SECURITY ALL ABOUT IT THAT ONE SHOULD KNOW

  2. INTRODUCTION Cyber attacks are increasing day by day so to protect the system and the data form this attacks some cyber security measures are taken. The need of cyber security was felt when cyber attacks were increasing and people were getting problems from it.Cyber security needs dedication. The multinational companies and industries are having a great amount of possessive data, so there protection is important as well as. The details of clients and there contracts are very sensitive so that every company needs cyber security. When the data is protected by means of technical security we can say it cyber security.

  3. THREATS OF CYBER SECURITY SQL Injection-When an attacker inserts a complicated SQL statement in order to get the information from a particular website ,it is known as SQL injection. Malwares-When malware software are used to get the information related to someone’s company then it is called as malware attack. Social Engineering- It is the way of getting user name,password,card numbers etc.for impersonating a contractor or customer. Password attacks are another type of cyber security hacks .Generally password attacks happens in getting sensitive information of credit cards.

  4. The illegal attackers generally attack retail shops online, as there websites are outdated and can be hacked easily.Hence one should know all the security threats for protecting their website.

  5. PRECAUTIONS OF CYBER SECURITY Pre-evaluation-In this the security system is checked in advance before any attack. Strategic planning- A planning in advance should be planned in order to protect the data of our system. Implementation-There are stages for this process- · Commitment of the employees · Commitment of management · Commitment with organizational members Post evaluation-Here the success of the process is determined from Pre-evaluation to implementation.

  6. SYSTEM WHICH ARE AT MAJOR RISKS The systems which are at major risks by cyber crime are goverment ,large corporation,consumer devices,financial systems etc. • Government -The government and military systems and sites are generally attacked by an authorised member or foreign powers in order to get information about a country’s security information and to get information about it’s people. • Large corporation-Commonly large corporations are targeted for financial gain of the hacker. It can be done by any person or Foreign power. • Consumer devices-The consumer devices are targeted by means of getting basic information, Card numbers,sensitive health information etc.

  7. MOTIVE OF ATTACKERS The motive of attackers can be different in every case. Some are criminals which are willing for financial gain, some are willing for someone’s basic information for their use. The military security is also targeted by the foreigners some time. The military security and banks are targeted mostly by hackers.

  8. SECURITY MEASURES There are some security measures which can be taken to protect data, information etc of a company or a personal computer. · Firewall is the common step that is taken nowadays for protecting the system for external agents. · User access account controls can protect the data and information of a system. · Intrusion Detection System is designed particularly for detecting any cyber attack in advance.

  9. MAJOR CYBER ATTACKS • The South Korean nightmare • Alteryx data leak • Marriott Hotels : privacy of customers compromised • Adult Friend Finder Exposed • Panic at Sony

  10. The conclusion depicts that a large corporation, government sites, military systems and personal systems must be secured in order to protect the information and data related to a customer, military operation and basic information. For more information visit: Technology moon

More Related