SlideShare a Scribd company logo
CYBER SECURITY AND ITS
CONTROLS
WHAT IS CYBER SECURITY?
• Cybersecurity is the practical method of defending computer systems, servers,
mobile devices, electronic systems, networks, and data from Hacking attacks and
various other attacks.
• It’s also known as information tech security or Network information security in
common.
• The term consists of a variety of contexts, from entrepreneurial to mobile computing,
and can be divided into a few other general parts.
TYPES OF CYBER ATTACKS.
• Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks.
• Man-in-the-middle (MitM) attack.
• Phishing and spear-phishing attacks.
• Drive-by attack.
• Password attack.
• SQL injection attack.
• Cross-site-scripting (XSS) attack.
• Eaves-dropping attack.
TYPES OF CYBER SECURITY MANAGEMENT
• Network security
• Application security
• Information security
• Operational security
• Cloud Security
HOW TO BE SAFE FROM CYBER ATTACKS:-
• Give knowledge to all levels of your company and
its members related to the risks of social
engineering attacks and common social engineering
scams like phishing emails ETC.
• Invest in the web tools that limit information leaks,
keep an eye on your third-party risk, and fourth-
party risk, and continuously scan for data leak
points and leak credentials.
• Use technical knowledge to reduce costs like
automatically sending out the assessment
questionnaires as part of an overall cybersecurity
risk assessment technique.
TYPES OF HACKERS AND ATTACKERS.
• White Hat:- These are good hackers and have a genuine license for doing the hacking.
The hacking performed by them is to protect the government or big companies and to
build a cybersecurity infrastructure. They are good hackers.
• Grey Hat:- They are called by companies to attack their companies to test their
company’s security system. They are also called to hack another company in the
competition or even make D-Dos attacks on their competitive companies.
• Black Hat:- These are bad hackers and perform Unethical hacking to hack big companies
either to hack their bank account or to blackmail them and to take financial advantage.
Eg:- “These are the hackers and attackers who hack your bank accounts, Social Media
account” and many other things.
NEED OF CYBER SECURITY.
• Cybersecurity is required because it ensures all the things to protect our sensitive
information personally identifiable information personal information and
governmental computer systems from the leak and harms done by hackers.
• Cyber Attack risk is increasing due to global connectivity and usage of cloud
services, Eg:-Amazon Web Services, to store sensitive information and personal
data. The poor security level is a serious threat. Cybersecurity ppt
• Past were are the days of normal firewalls and antivirus services being your main
security measures. Entrepreneurs can no longer leave Information security and
network security to cybersecurity professionals.
IMPORTANCE OF CYBER SECURITY.
• In today’s internet connected world, everyone benefits from advanced cyber defense programs.
• At an individual level, a cybersecurity attack can result in everything from identity theft and hacker, to
attempts, to the loss of important information and media files like family photos. cyber security ppt
• Everyone keeps their shoulders on critical infrastructure like power plants, hospitals, and financial
service companies. Securing these and other organizations is essential to keeping our society functioning
to be secured from digital attacks.
• Everyone also benefits from the work of cyber threat researchers or cyber security experts, like the team
of 250 threat researchers at the USA, who finds new and emerging threats and cyber-attack techniques.
• They reveal new loop holes in their network, educate the public on the importance of cyber security, and
even strengthen open source tools. cybersecurity ppt
• Their work makes the Internet safer for everyone in their countries.
CYBER SAFETY TIPS – PROTECT YOURSELF
AGAINST CYBER ATTACKS.
• Update your software and operating system:
• There is the meaning that you got the benefit from the latest security loops.
• Use anti-virus software:
These Security solutions like will detect and removes threats. Keep your software updated for the best level of protection
regularly. You will also find this point in the above cybersecurity ppt.
• Use strong passwords:
Ensures your passwords are not easily guessable and you will not be hacked.
• Don’t open email attachments from anonymous senders:
They could be infected with malware or any kind of spyware. You will also find this point in the above cybersecurity ppt
• Do not click on links on emails from anonymous mail senders or unknown websites:
This is a common way in which malware is spread across digital devices. You will also find this point in the above
cybersecurity ppt
• Avoid connecting to open WiFi connections in public areas like hotels and station:
Non protected networks keep you vulnerable to be attacked by man-in-the-middle attacks. They are very easy atacks
which can be done on you.
Thank you

More Related Content

Cyber security and its controls.pptx

  • 1. CYBER SECURITY AND ITS CONTROLS
  • 2. WHAT IS CYBER SECURITY? • Cybersecurity is the practical method of defending computer systems, servers, mobile devices, electronic systems, networks, and data from Hacking attacks and various other attacks. • It’s also known as information tech security or Network information security in common. • The term consists of a variety of contexts, from entrepreneurial to mobile computing, and can be divided into a few other general parts.
  • 3. TYPES OF CYBER ATTACKS. • Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks. • Man-in-the-middle (MitM) attack. • Phishing and spear-phishing attacks. • Drive-by attack. • Password attack. • SQL injection attack. �� Cross-site-scripting (XSS) attack. • Eaves-dropping attack.
  • 4. TYPES OF CYBER SECURITY MANAGEMENT • Network security • Application security • Information security • Operational security • Cloud Security
  • 5. HOW TO BE SAFE FROM CYBER ATTACKS:- • Give knowledge to all levels of your company and its members related to the risks of social engineering attacks and common social engineering scams like phishing emails ETC. • Invest in the web tools that limit information leaks, keep an eye on your third-party risk, and fourth- party risk, and continuously scan for data leak points and leak credentials. • Use technical knowledge to reduce costs like automatically sending out the assessment questionnaires as part of an overall cybersecurity risk assessment technique.
  • 6. TYPES OF HACKERS AND ATTACKERS. • White Hat:- These are good hackers and have a genuine license for doing the hacking. The hacking performed by them is to protect the government or big companies and to build a cybersecurity infrastructure. They are good hackers. • Grey Hat:- They are called by companies to attack their companies to test their company’s security system. They are also called to hack another company in the competition or even make D-Dos attacks on their competitive companies. • Black Hat:- These are bad hackers and perform Unethical hacking to hack big companies either to hack their bank account or to blackmail them and to take financial advantage. Eg:- “These are the hackers and attackers who hack your bank accounts, Social Media account” and many other things.
  • 7. NEED OF CYBER SECURITY. • Cybersecurity is required because it ensures all the things to protect our sensitive information personally identifiable information personal information and governmental computer systems from the leak and harms done by hackers. • Cyber Attack risk is increasing due to global connectivity and usage of cloud services, Eg:-Amazon Web Services, to store sensitive information and personal data. The poor security level is a serious threat. Cybersecurity ppt • Past were are the days of normal firewalls and antivirus services being your main security measures. Entrepreneurs can no longer leave Information security and network security to cybersecurity professionals.
  • 8. IMPORTANCE OF CYBER SECURITY. • In today’s internet connected world, everyone benefits from advanced cyber defense programs. • At an individual level, a cybersecurity attack can result in everything from identity theft and hacker, to attempts, to the loss of important information and media files like family photos. cyber security ppt • Everyone keeps their shoulders on critical infrastructure like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning to be secured from digital attacks. • Everyone also benefits from the work of cyber threat researchers or cyber security experts, like the team of 250 threat researchers at the USA, who finds new and emerging threats and cyber-attack techniques. • They reveal new loop holes in their network, educate the public on the importance of cyber security, and even strengthen open source tools. cybersecurity ppt • Their work makes the Internet safer for everyone in their countries.
  • 9. CYBER SAFETY TIPS – PROTECT YOURSELF AGAINST CYBER ATTACKS. • Update your software and operating system: • There is the meaning that you got the benefit from the latest security loops. • Use anti-virus software: These Security solutions like will detect and removes threats. Keep your software updated for the best level of protection regularly. You will also find this point in the above cybersecurity ppt. • Use strong passwords: Ensures your passwords are not easily guessable and you will not be hacked. • Don’t open email attachments from anonymous senders: They could be infected with malware or any kind of spyware. You will also find this point in the above cybersecurity ppt • Do not click on links on emails from anonymous mail senders or unknown websites: This is a common way in which malware is spread across digital devices. You will also find this point in the above cybersecurity ppt • Avoid connecting to open WiFi connections in public areas like hotels and station: Non protected networks keep you vulnerable to be attacked by man-in-the-middle attacks. They are very easy atacks which can be done on you.