Uploaded on Jun 2, 2021
PPT on Cyber Security Definition, Types, and Importance.
Cyber Security Definition, Types and Importance.
CYBER SECURITY: DEFINITION, TYPES, AND IMPORTANCE What is cyber security? • Cyber security refers to protecting systems connected to the internet from threats in cyberspace. • It involves protecting software, data, and hardware and helps prevent cybercriminals from gaining access to devices or the networks. Source: www.logpoint.com Parts of cyber security • The best cyber security solution will be all-encompassing and include: – Application security – Cloud security – Data security – Endpoint security – Identity management – Mobile security – Network security – Operational security Source: www.logpoint.com Importance of cyber security • The importance of cyber security comes down to the desire to keep information, data, and devices private and safe. • In today’s world, people store vast quantities of data on computers and other internet-connected devices. Much of which is sensitive, such as passwords or financial data. Source: www.logpoint.com Benefits of cyber security • By implementing security, businesses and individuals can protect themselves against the full range of cyber security threats outlined below, as well as the numerous others that exist. • With cyber security, companies do not have to worry about unauthorized users accessing their network or data. It helps them protect both their end users and their employees. Source: www.logpoint.com Threats of cyber security • The threats countered by cyber-security are three-fold: 1. Cybercrime includes single actors or groups targeting systems for financial gain or to cause disruption. 2. Cyber-attack often involves politically motivated information gathering. 3. Cyberterrorism is intended to undermine electronic systems to Source: www.kaspersky.co.in DIFFERENT TYPES OF CYBERSECURITY Malware • Malware is a form of malicious software in which any file or program can be used to harm a computer user. This includes worms, viruses, Trojans and spyware. Source: www.logpoint.com Ransomware • Ransomware is another type of malware. It involves an attacker locking the victim's computer system files typically through encryption and demanding a payment to decrypt and unlock them. Source: www.logpoint.com Phishing • Phishing is a form of social engineering where fraudulent email or text messages that resemble those from reputable or known sources are sent. Often random attacks, the intent of these messages is to steal sensitive data, such as credit card or login information Source: www.logpoint.com Distributed denial-of-service (DDoS) • Distributed denial-of-service (DDoS) attacks are those in which multiple systems disrupt the traffic of a targeted system, such as a server, website or other network resource. By flooding the target with messages, connection requests or packets, the attackers can slow the system or crash it, preventing legitimate traffic from using it. Source: www.logpoint.com Advanced persistent threats (APTs) • Advanced persistent threats (APTs) are prolonged targeted attacks in which an attacker infiltrates a network and remains undetected for long periods of time with the aim to steal data. Source: www.logpoint.com SQL Injection • SQL stands for Structured Query Language. A SQL injection aims to perform actions on data in a database and potentially steal it. It involves inserting malicious code via SQL statements, taking advantage of data-driven applications’ vulnerabilities. Source: www.logpoint.com
Comments