Cyber Presentation
Cyber Presentation
Cyber Presentation
Introduction ................................................................................................................................ 2
Operating System & security ..................................................................................................... 2
Explain what is security design system of Operating System ................................................... 2
Explain the following terms: ...................................................................................................... 3
Some of the biggest threats to email security include: .............................................................. 4
Conclusion ................................................................................................................................. 4
Reference ................................................................................................................................... 5
1
Introduction
Protecting software is becoming more important for the future and, therefore, efficient
protection schemes are required. Ideally, these schemes should provide a strong protection
while keeping to a minimum the number of required modifications at the software layer (both
operating system and user applications), and in the hardware layer as well.
2
An emphasis on building security into products counters the all-too-common tendency for
security to be an afterthought in development. Addressing existing vulnerabilities and
patching security holes as they are found can be a hit-and-miss process and will never be as
effective as designing systems to be as secure as possible from the start.
3
Some of the biggest threats to email security include:
Phishing
Phishing attacks are the most well-known and common threats to email security. Phishing
attacks began with attacks like the Nigerian Prince scams, which were known for their poor
grammar and unbelievable pretexts. Over time, these attacks have become more sophisticated
with attackers sending much more polished emails with more plausible pretexts.
The modern phishing attack can be general or targeted. These targeted attacks, also called spear
phishing attacks, are highly researched and designed to trick a particular person or group.
Malware
Email is an ideal delivery mechanism for malware. Malware can be attached directly to an
email or embedded in documents that are shared as attachments or via cloud-based storage.
And once installed on a computer, malware may steal sensitive information or encrypt a user’s
files.
Data Loss
Email accounts have access to a great deal of sensitive information. In addition to the data sent
directly over email, these accounts are also used to access cloud-based infrastructure and other
online services.
An attacker with access to these email accounts can gain access to all of this sensitive
information, making email account credentials a common target of attack. Additionally, this
information can be leaked unintentionally by employees who accidentally include an
unauthorized party on an email chain or fall for a phishing attack.
Conclusion
In conclusion Operating systems play a critical role when it comes to protecting and securing
resources present in our computer systems. Email accounts have access to a great deal of
sensitive information. In addition to the data sent directly over email, these accounts are also
used to access cloud-based infrastructure and other online services.
4
Reference