Uploaded on Sep 21, 2021
PPT on Cybersecurity.
Cybersecurity
CYBERSECURI
C
TY
What is Cyber Security?
• Cyber security is the practice of defending computers,
servers, mobile devices, electronic systems, networks, and
data from malicious attacks.
Source: www.kaspersky.com
Types of cyber threats
• The threats countered by cyber-security are three-fold:
• Cybercrime includes single actors or groups targeting systems for financial gain or
to cause disruption.
• Cyber-attack often involves politically motivated information gathering.
• Cyberterrorism is intended to undermine electronic systems to cause panic or fear.
Source: www.kaspersky.com
How big is the threat?
• The threat posed by cyber-crime is real and it’s growing, with global cyber-
attacks up 63% in the last three years.
• Cyber-crime is even thought to be overtaking the illegal drugs trade in
terms of profitability.
Source: www. gosuperscript.com
Sectors exposed to cyber threat
• Medical services, retailers and public entities experienced the most
breaches, with malicious criminals responsible for most incidents.
• Some of these sectors are more appealing to cybercriminals because they
collect financial and medical data, but all businesses that use networks can
be targeted for customer data, corporate espionage, or customer attacks.
Source: www. gosuperscript.com
Cyber crime in our daily lives
• The Internet of Things provides new and concerning avenues of attack. For a start,
many smart appliances aren’t as secure as they could be.
• And as the internet becomes increasingly interwoven with our devices and
appliances, cyber-crime could start encroaching more and more into our daily
lives.
Source: www. gosuperscript.com
The scale of the cyber threat
• The global cyber threat continues to evolve at a rapid pace, with a rising
number of data breaches each year.
• A report by Risk Based Security revealed that a shocking 7.9 billion records
have been exposed by data breaches in the first nine months of 2019 alone.
Source: www. kaspersky.com
How effective are security measures?
• Cyber security measures are only as good as the people and fallbacks you must
implement and deal with them.
• There are some great security resources out there, but to be as safe as you can
be, you need to ensure all your people are clued up on the threats.
Source: www. gosuperscript.com
Smartphone cyber-security
• Smartphone cyber-security does exist, it’s not utilized as often as it should be.
Cyber-criminals are becoming increasingly adept at attacking through
smartphones and mobile networks, with mobile malware up 40% in 2018.
Source: www. gosuperscript.com
End-user protection
• End-user protection or endpoint security is a crucial aspect of cyber security. After
all, it is often an individual (the end-user) who accidentally uploads malware or
another form of cyber threat to their desktop, laptop or mobile device.
Source: www. gosuperscript.com
THANK YOU
Comments