Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Cyber Security

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

Cyber Security

Group 12
Computer Security

 the protection of computer systems and


information from harm, theft, and unauthorized
use. Computer hardware is typically protected by
the same means used to protect other valuable or
sensitive equipment—namely, serial numbers,
doors and locks, and alarms.
Major areas covered in cyber security

 Application Security
 Information Security
 Disaster Security
 Disaster recovery planning
 Network Security
Application Security

 the process of developing, adding, and testing


security features within applications to
prevent security vulnerabilities against
threats such as unauthorized access and
modification.
Application Security Examples

Firewall VPN Cleaner


Security Antivirus

•Protects confidential information from data thefts.


•Reduces the attack surface and vulnerabilities in the
application.
Information Security

 protects sensitive information from unauthorized


activities, including inspection, modification,
recording, and any disruption or destruction. The
goal is to ensure the safety and privacy of critical
data such as customer account details, financial
data or intellectual property.
Disaster Security

 Types of disasters can include: Natural disasters


(for example, earthquakes, floods, tornados,
hurricanes, or wildfires) Pandemics and epidemics.
Cyber attacks (for example, malware, DDoS, and
ransomware attacks) Other intentional, human-
caused threats such as terrorist or biochemical
attacks.
Disaster recovery planning

 A disaster recovery plan (DR or DRP) is a formal


document created by an organization that contains
detailed instructions on how to respond to
unplanned incidents such as natural disasters,
power outages, cyber attacks and any other
disruptive events.
Disaster Recovery: 5 Key Features and
Building Your DR Plan
 Risk Assessment.
 Evaluate Critical Needs.
 Set Disaster Recovery Plan Objectives.
 Collect Data and Create the Written Document.
 Test and Revise.
Network Security

 any activity designed to protect the usability and


integrity of your network and data. It includes both
hardware and software technologies. It targets a
variety of threats. It stops them from entering or
spreading on your network. Effective network
security manages access to the network.
Common methods attackers use to control
computer or networks
 Virus
 Worms
 Spyware
 Trojan
 Ransomware
Virus

 a type of malicious software, or malware, that


spreads between computers and causes
damage to data and software. Computer
viruses aim to disrupt systems, cause major
operational issues, and result in data loss and
leakage.
Virus example

Common name ILOVEYOU


Aliases Love Bug, Loveletter
Type Computer worm
Point of origin Manila, Philippines
Author(s) Onel de Guzman
Worms

 type of malware that can automatically propagate


or self-replicate without human interaction,
enabling its spread to other computers across a
network. A worm often uses the victim
organization's internet or a local area network
(LAN) connection to spread itself.
Spyware

 is malicious software that enters a user's computer,


gathers data from the device and user, and sends it
to third parties without their consent. A commonly
accepted spyware definition is a strand of malware
designed to access and damage a device without
the user's consent.
Some of the most common
examples of spyware

Adware keyloggers infostealers


Trojan

 A Trojan Horse Virus is a type of malware that


downloads onto a computer disguised as a
legitimate program. The delivery method typically
sees an attacker use social engineering to hide
malicious code within legitimate software to try
and gain users' system access with their software.
Ransomware

 a type of malware that locks and encrypts a


victim's data, files, devices or systems, rendering
them inaccessible and unusable until the attacker
receives a ransom payment. The first iterations of
ransomware used only encryption to prevent
victims from accessing their files and systems.
What can you do to avoid being
hacked ?
 Delete suspicious emails. It is best to delete spam or dubious-
looking emails without opening them. ...
 Use secure devices. ...
 Create strong passwords. ...
 Use multifactor authentication on your accounts. ...
 Sign up for account alerts.

You might also like