Cyber Security by Mannan Anand, Yugal Bairwa and Shiven Patel

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 13
At a glance
Powered by AI
The key takeaways from the document are that cybersecurity aims to protect systems, networks and programs from digital attacks. The main types of threats discussed are phishing, ransomware, social engineering and malware. A successful cybersecurity approach involves people, processes and technology working together with multiple layers of protection. A sandbox is an isolated testing environment that allows users to run programs safely without affecting the underlying system.

The main types of cybersecurity threats discussed are phishing (sending fraudulent emails), ransomware (malicious software that blocks access until ransom is paid), social engineering (tricking users into revealing sensitive info) and malware (software designed to gain unauthorized access or cause damage).

The three main components of a successful cybersecurity approach according to the document are people (users understanding basic security), processes (how organizations deal with attacks) and technology (tools like firewalls and antivirus software that protect endpoints, networks and cloud).

-Your Guide To The World Of Online Threats

and Ways To Prevent Them

By Mannan Anand, Shiven Patel & Yugal Bairwa


What Is
Cybersecurity?
IoT Without Security = Internet of Threats
Cyber Security
⬡ Cybersecurity is the practice of protecting systems, networks, and programs
from digital attacks. These cyberattacks are usually aimed at accessing,
changing, or destroying sensitive information; extorting money from users; or
interrupting normal business processes.
⬡ Implementing effective cybersecurity measures is particularly challenging today
because there are more devices than people, and attackers are becoming more
innovative.

3
What Is Cybersecurity All About?
A successful cybersecurity approach has multiple layers of protection spread across the computers,
networks, programs, or data that one intends to keep safe. In an organization, the people, processes,
and technology must all complement one another to create an effective defense from cyber attacks.
⬡ People: Users must understand and comply with basic data security principles like choosing strong
passwords, being wary of attachments in email, and backing up data. Learn more about basic cybersecurity
principles.
⬡ Processes: Organizations must have a framework for how they deal with both attempted and successful
cyber attacks. One well-respected framework can guide you. It explains how you can identify attacks,
protect systems, detect and respond to threats, and recover from successful attacks.
⬡ Technology: Technology is essential to giving organizations and individuals the computer security
tools needed to protect themselves from cyber attacks. Three main entities must be protected:
endpoint devices like computers, smart devices, and routers; networks; and the cloud. Common
technology used to protect these entities include next-generation firewalls, DNS filtering, malware
protection, antivirus software, and email security solutions.
4
Types Of Cybersecurity Threats
Phishing Social Engineering
Phishing is the practice of sending fraudulent emails that Social engineering is a tactic that adversaries use to trick you
resemble emails from reputable sources. The aim is to steal into revealing sensitive information. They can solicit a monetary
sensitive data like credit card numbers and login information. It’s payment or gain access to your confidential data. Social
the most common type of cyber attack. You can help protect engineering can be combined with any of the threats listed above
yourself through education or a technology solution that filters to make you more likely to click on links, download malware, or
malicious emails. trust a malicious source.

Ransomware Malware
Ransomware is a type of malicious software. It is designed to Malware is a type of software designed to gain unauthorized
extort money by blocking access to files or the computer system access or to cause damage to a computer.
until the ransom is paid. Paying the ransom does not guarantee
that the files will be recovered or the system restored.

5
Secure Password
⬡ Do not use personal information
⬡ Change passwords on a regular basis
⬡ Use different passwords on different
accounts
⬡ Do not type passwords on devices or
networks you do not control
⬡ Create longer passwords
⬡ Modify easy-to-remember phrases
How Does a Password Get Hacked?
⬡ Cybercriminals have several password-hacking tactics at their disposal, but
the easiest one is simply to buy your passwords off the dark web. There’s big
money in the buying and selling of login credentials and passwords on the
black-market, and if you’ve been using the same password for many
years, chances are it’s been compromised.
⬡ Brute force attack-This attack tries to guess every combination in the book
until it hits on yours. The attacker automates software to try as many
combinations as possible in as quick a time as possible, and there has been
some unfortunate headway in the evolution of that tech.

7
Two factor authentication
⬡ Two-factor authentication, or 2FA, is a method of verifying
your identity that adds a second layer of security to your
account password. Types of two-factor authentication can
include any of the following:
• Something you know: a PIN number, password, or pattern
• Something you have: an ATM or credit card, mobile phone,
or security token
• Something you are: a biometric form of authentication, such
as your fingerprint, your voice, or your face

8
MALWARE
⬡ Malware is a type of software
designed to gain unauthorized
access or to cause damage to a
computer. For example:
 Trojan viruses
 Spyware
 Adware
So on account of these increasing
threats, geniuses have a solution for it:

A sandbox.....
10
What's a Sandbox
after all ? 
⬡ A sandbox is an isolated testing
environment , created within a
computer system, that enables users to
run programs or execute files without
affecting the system or platform on
which they run . 

11
Examples of sandbox implementations include the following:
Full System Emulation: The sandbox simulates the host machine’s
physical hardware, including CPU and memory, providing deep
visibility into program behavior and impact.​
Emulation of Operating Systems: The sandbox emulates the end
user’s operating system but not the machine hardware.​
Virtualization: This approach uses a virtual machine (VM) based
sandbox to contain and examine suspicious programs.​

12
Thanks!

13

You might also like