Fabrikam Technology Inc

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

WHAT IS CYBER SAFETY?

By 7052
AGENDA Citations
what is cyber safety? Grammarly contributed to this text by responding to these AI prompts:
(Grammarly 2024)
what are the threats to http://tinyurl.com/2njehrda
Cybersafety?
http://tinyurl.com/2s3p773a
how to protect against http://tinyurl.com/ys2ft72n
them? http://tinyurl.com/58n4ehvy
http://tinyurl.com/2maedkhu
http://tinyurl.com/ykwjra5j
http://tinyurl.com/ykumapc3
WHAT IS CYBER SAFETY?
- Cyber safety involves following ethical principles.
- Respect intellectual property rights
- Use technology responsibly.
- Protect internet-connected systems from viruses and malware.
- Install and update antivirus software.
- Use unique passwords.
- Enable two-factor authentication.
- Be cautious of phishing attempts.
- Be aware of potential threats like Ransomware and malware.
THREATS TO CYBERSECURITY?
• Phishing
• Ransomware
• Malware
• Insider threats
PHISHING
- Phishing involves using fake emails, websites, or text messages to trick users into divulging
personal information, installing malware, or gaining access to sensitive data.
- There are several types of phishing scams, including "plate_number_1" phishing, Vishing,
and Clone phishing.
- "Plate_number_1" phishing involves sending fraudulent emails that appear to come from a
reputable source.
- Vishing is like phishing but uses phone calls instead of emails or texts.
- Clone phishing involves creating a replica of a legitimate website to trick users into
entering their login credentials.- It is important to be aware of these types of cybercrimes and
take steps to protect yourself from falling victim to them.
RANSOMWARE
- Ransomware is a type of malicious software that can block access to computer files, systems, or networks.

- It can cause costly disruptions and lead to the loss of critical data.

- There are different types of ransomware, including screen locker ransomware, crypto locker
ransomware, file-less ransomware, and DarkSide ransomware.

- Screen locker ransomware prevents users from accessing their computer or mobile device by locking the screen.

- Cryptolocker ransomware encrypts files on a computer or network, making them inaccessible to users unless a ransom
is paid.

- Fileless ransomware infects a system's memory and can avoid detection by traditional antivirus software.
MALWARE
- Malware is a type of malicious software designed to cause harm to computer systems.
- It can steal sensitive information and compromise security measures.
- Cybercriminals create malware to gain unauthorized access to computer networks and infect computers
with viruses.
-Malware can be delivered through various channels, including email attachments, infected websites, and
software downloads.
- It is a serious threat to computer users and can cause significant damage.
- To protect yourself and your computer from malware, it's important to take measures such as using
antivirus software, avoiding suspicious emails and websites, and keeping your software up to date.
INSIDER THREATS
- Insider threat is a security risk that comes from individuals who have authorized access to an
organization's data, network, or devices.- The risk can be intentional or unintentional.

- Various factors such as malicious intent, human error, poor judgment, negligence, and departing
employees can contribute to insider threats.

- Employees, contractors, or third-party personnel who have access to sensitive company information
can pose insider threats.

- It is essential for organizations to implement robust security measures and policies to mitigate the risk
of insider threats and protect their sensitive data from unauthorized access, theft, or misuse.
HOW TO PROTECT AGAINST
THEM?

PHISHING
- Educate users on how to recognize phishing attempts.
- Use spam filters to block phishing emails.
- Use email authentication to prevent email spoofing.
- Encourage users to access websites via secure HTTPS connections.
- Verify requests for sensitive information before sharing.
RAMSON WARE
To protect your data from ransomware attacks, follow these tips:
- Regularly back up your data and store it securely
- Keep all software up-to-date with the latest security patches
- Use reputable antivirus and anti-malware software
- Implement strong email security measures
- Segment your network and limit access to sensitive data
- Only allow approved and trusted software applications to run on your systems
MALWARE
- Install antivirus software and set it to run automatically
- Keep your software updated
- Use a firewall and security networks whenever possible
- Be cautious when clicking on links or email attachments
- Avoid opening attachments from untrusted sources
- Use a non-administrator account if possible.
INSIDER THREATS
- Conduct thorough background checks during the hiring process to prevent insider threats.
- Limit access to sensitive information based on the user's role.
- Implement regular audits and monitoring to ensure security.
- Divide critical tasks among multiple individuals to prevent a single point of failure.
- Encourage a positive work culture to reduce the likelihood of malicious behaviour.
- Use multi-factor authentication to strengthen security.
- Deploy data loss prevention tools to prevent sensitive information from being leaked.
- Develop an effective incident response plan to mitigate the damage of any potential security breaches.

You might also like