SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
Cyber Security
A professional approach to protection
What is Cyber? What is Cyber
Security?
Elements of
Cyber Security
Types of Cyber
Threats
Latest Cyber
Threats
End-User
Protection
Cyber
Safety Tips
What is Cyber?
Storing Data
Protecting
Data
Accessing
Data
Processing
Data
Transmitting
Data
Linking Data
What is Cyber Security?
Cyber security refers to the body of technologies,
processes, and practices designed to protect networks,
devices, programs, and data from attack, damage, or
unauthorized access. Cyber security may also be
referred to as information technology security.
Elements of Cyber Security
NETWORK
SECURITY
Practice of securing a
computer network
APPLICATION
SECURITY
Keeping software and
devices free of threats
INFORMATION
SECURITY
Protects the integrity and
privacy of data
OPERATIONAL
SECURITY
Protects and handles
data assets
DISASTER
RECOVERY
Restores operations and
information after the
disaster
CLOUD
SECURITY
Protecting data in a 100%
online environment
Types of Cyber Threats
Cyber-crime
1
Cyber-attack
2
Cyber-terrorism
3
There are three forms of cyber-threats:
Methods used to threaten Cyber Security
PHISHING
Targeting victims
with fake emails
MALWARE
Software created
to disrupt or
damage user’s
computer
MAN-IN-THE-
MIDDLE- ATTACK
Intercepts
communication
between two
individuals to
steal data
SQL INJECTION
Take control and
steal data from a
database
DOS ATTACK
Makes the computer
system inaccessible for
the users
Latest Cyber Threats
DRIDEX MALWARE
Affects the public, government,
infrastructure and business worldwide
SCAM DATING SITES
Affects people emotionally and
personally
EMOTET MALWARE
Steals data and load malware
Dridex Malware
The U.S. Department of Justice
(DOJ) charged the cyber-criminal
group in a global Dridex
malware attack.
6 1
2
4 3
5
This has affected the public,
government, infrastructure, and
businesses worldwide..
Dridex is a financial Trojan with
a range of capabilities.
Affecting victims since 2014, it
infects computers through
phishing emails or existing
malware.
Stealing passwords, banking
details, and personal data, it has
caused massive financial losses
The U.K.’s National Cyber
Security Centre advises to
“ensure devices are patched,
anti-virus is turned on and up to
date and files are backed up”.
Emotet Malware
The Australian Cyber Security Centre
warned national organizations about a
global cyber threat from Emotet
malware
1
2
3
Sophisticated Trojan that can steal data
and load other malware
Thrives on unsophisticated password
Scam Dating Sites
FBI warned U.S. citizens to be aware of
the confidence fraud such as dating
sites, chat rooms, and apps
1
2
3
Perpetrators take advantage of people
seeking new partners, duping victims
into giving away personal data.
The FBI reports that this threat has
affected 114 victims in New Mexico in
2019, with financial losses amounting to
$1.6 million.
Why Cyber Security is important?
Government, Military, corporate world,
financial, and medical organizations, collect,
process, and store unmatched data on
devices.
Data can be sensitive information, like
intellectual property, financial data, or
personal information, and data with negative
consequences.
Organizations transmit sensitive data across
networks and to other devices while doing
business.
Thus, Cyber Security describes the discipline
dedicated to protecting that information and
systems that areused to process or store
them
Detect and remove
malicious code hidden
in Master Boot Record
(MBR) and are designed
to encrypt or wipe data
End-User Protection
End-user protection
or endpoint security
is a crucial aspect of
cyber security
Cyber-security relies on
cryptographic protocols
to encrypt emails, files,
and other critical data
Scans computers for
pieces of malicious
code, quarantines this
code, and then removes
Confine potentially
malicious programs to a
virtual environment
separate from a user's
network
Electronic security
protocols also focus on
real-time malware
detection
Cyber Safety Tips
Do not open email
attachments from
unknown senders
Avoid using
unsecure Wi-Fi
networks in public
places
Use Anti-Virus
software
Update your
software and
operating system
Use strong
passwords
Do not click on links
in emails from
unknown senders
Cybersecurity

More Related Content

PPTX
Pranavi verma-cyber-security-ppt
PPTX
Introduction to cyber security amos
PPTX
The Board and Cyber Security
PPTX
Is6120 data security presentation
PPTX
Cyber Threat Intelligence
PDF
Network Security Presentation
PPT
Ethical hacking presentation
PPTX
Application security
Pranavi verma-cyber-security-ppt
Introduction to cyber security amos
The Board and Cyber Security
Is6120 data security presentation
Cyber Threat Intelligence
Network Security Presentation
Ethical hacking presentation
Application security

What's hot (20)

PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Inetsecurity.in Ethical Hacking presentation
PDF
Building a Next-Generation Security Operations Center (SOC)
PPTX
Phishing Awareness Training.pptx
PPTX
Cyber security
PDF
Threat Intelligence
PDF
Cybersecurity risk management 101
PPTX
Denial of Service Attacks (DoS/DDoS)
PPTX
Network security - Defense in Depth
PPSX
Security Awareness Training
PPTX
Cyber crime and Security
PPTX
Phishing ppt
PPTX
Cyber security
PDF
Cyber Resilience
PDF
Security Consulting Services
PDF
Cyber Security Governance
PDF
Data Privacy & Security
PDF
System architecture for central banks
PPT
Introduction To OWASP
PDF
1. introduction to cyber security
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Inetsecurity.in Ethical Hacking presentation
Building a Next-Generation Security Operations Center (SOC)
Phishing Awareness Training.pptx
Cyber security
Threat Intelligence
Cybersecurity risk management 101
Denial of Service Attacks (DoS/DDoS)
Network security - Defense in Depth
Security Awareness Training
Cyber crime and Security
Phishing ppt
Cyber security
Cyber Resilience
Security Consulting Services
Cyber Security Governance
Data Privacy & Security
System architecture for central banks
Introduction To OWASP
1. introduction to cyber security
Ad

Similar to Cybersecurity (20)

PPTX
Cyber security
PPTX
cybersecurity and its importance in digital era
PPTX
CYBER SECURITY CYBER SECURITY of 2025 .pptx
PPTX
Cyber security
PDF
Master Cyber Security & Ethical Hacking with Expert Training! 🔐🚀
PPTX
Presentation on Cyber Security
PPTX
Ceferov Cefer Intelectual Technologies
PPTX
Cyber Security_ Protecting the Digital World.pptx
PPTX
Purple Gradient Futuristic Cyber Presentation.pptx
PPTX
Purple Gradient Futuristic Cyber Presentation.pptx
PPTX
Cyber security of 2025 presentation.pptx
DOCX
Cyber crime
PPTX
Ict presentation pptx
PPTX
Cyber Security and data Security for all.pptx
PPTX
CYBERSECURITYcoll[1].pptx
PPTX
Cyber Security
PPTX
Cyber Security in detail PPT BY HIMANXU.pptx
PPTX
Gopal halde presentation CYBER SECURITY.pptx
PPTX
Gopal halde presentation CYBER SECURITY.pptx
PDF
Cyber Security Course & Guide. X.GI. pdf
Cyber security
cybersecurity and its importance in digital era
CYBER SECURITY CYBER SECURITY of 2025 .pptx
Cyber security
Master Cyber Security & Ethical Hacking with Expert Training! 🔐🚀
Presentation on Cyber Security
Ceferov Cefer Intelectual Technologies
Cyber Security_ Protecting the Digital World.pptx
Purple Gradient Futuristic Cyber Presentation.pptx
Purple Gradient Futuristic Cyber Presentation.pptx
Cyber security of 2025 presentation.pptx
Cyber crime
Ict presentation pptx
Cyber Security and data Security for all.pptx
CYBERSECURITYcoll[1].pptx
Cyber Security
Cyber Security in detail PPT BY HIMANXU.pptx
Gopal halde presentation CYBER SECURITY.pptx
Gopal halde presentation CYBER SECURITY.pptx
Cyber Security Course & Guide. X.GI. pdf
Ad

More from Sabiha M (13)

PPTX
Top-Down Estimation Approach
PPTX
Kernel Computing
PPTX
Goal-Setting Theory of Motivation
PPTX
Decomposition
PPTX
Advanced SQL
PPTX
Job Sequencing with Deadlines
PPTX
LAN, WAN, MAN
PPTX
Next Generation Internet
PPTX
Near Field Communication
PPTX
Green Cloud Computing
PPTX
Remote Method Invocation
PPTX
Apache web server
PPTX
Types of parsers
Top-Down Estimation Approach
Kernel Computing
Goal-Setting Theory of Motivation
Decomposition
Advanced SQL
Job Sequencing with Deadlines
LAN, WAN, MAN
Next Generation Internet
Near Field Communication
Green Cloud Computing
Remote Method Invocation
Apache web server
Types of parsers

Recently uploaded (20)

PPTX
Skill Development Program For Physiotherapy Students by SRY.pptx
PPTX
How to Manage Global Discount in Odoo 18 POS
PPTX
Strengthening open access through collaboration: building connections with OP...
PPTX
ACUTE NASOPHARYNGITIS. pptx
PDF
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
PPTX
Open Quiz Monsoon Mind Game Final Set.pptx
PDF
UTS Health Student Promotional Representative_Position Description.pdf
PPTX
IMMUNIZATION PROGRAMME pptx
PPTX
Introduction and Scope of Bichemistry.pptx
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PPTX
NOI Hackathon - Summer Edition - GreenThumber.pptx
PDF
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
PDF
LDMMIA Reiki Yoga Workshop 15 MidTerm Review
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Cardiovascular Pharmacology for pharmacy students.pptx
PPTX
Software Engineering BSC DS UNIT 1 .pptx
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
PPTX
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx
Skill Development Program For Physiotherapy Students by SRY.pptx
How to Manage Global Discount in Odoo 18 POS
Strengthening open access through collaboration: building connections with OP...
ACUTE NASOPHARYNGITIS. pptx
Piense y hagase Rico - Napoleon Hill Ccesa007.pdf
Open Quiz Monsoon Mind Game Final Set.pptx
UTS Health Student Promotional Representative_Position Description.pdf
IMMUNIZATION PROGRAMME pptx
Introduction and Scope of Bichemistry.pptx
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
Open Quiz Monsoon Mind Game Prelims.pptx
NOI Hackathon - Summer Edition - GreenThumber.pptx
5.Universal-Franchise-and-Indias-Electoral-System.pdfppt/pdf/8th class social...
LDMMIA Reiki Yoga Workshop 15 MidTerm Review
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Cardiovascular Pharmacology for pharmacy students.pptx
Software Engineering BSC DS UNIT 1 .pptx
Renaissance Architecture: A Journey from Faith to Humanism
2.Reshaping-Indias-Political-Map.ppt/pdf/8th class social science Exploring S...
UNDER FIVE CLINICS OR WELL BABY CLINICS.pptx

Cybersecurity

  • 1. Cyber Security A professional approach to protection
  • 2. What is Cyber? What is Cyber Security? Elements of Cyber Security Types of Cyber Threats Latest Cyber Threats End-User Protection Cyber Safety Tips
  • 3. What is Cyber? Storing Data Protecting Data Accessing Data Processing Data Transmitting Data Linking Data
  • 4. What is Cyber Security? Cyber security refers to the body of technologies, processes, and practices designed to protect networks, devices, programs, and data from attack, damage, or unauthorized access. Cyber security may also be referred to as information technology security.
  • 5. Elements of Cyber Security NETWORK SECURITY Practice of securing a computer network APPLICATION SECURITY Keeping software and devices free of threats INFORMATION SECURITY Protects the integrity and privacy of data OPERATIONAL SECURITY Protects and handles data assets DISASTER RECOVERY Restores operations and information after the disaster CLOUD SECURITY Protecting data in a 100% online environment
  • 6. Types of Cyber Threats Cyber-crime 1 Cyber-attack 2 Cyber-terrorism 3 There are three forms of cyber-threats:
  • 7. Methods used to threaten Cyber Security PHISHING Targeting victims with fake emails MALWARE Software created to disrupt or damage user’s computer MAN-IN-THE- MIDDLE- ATTACK Intercepts communication between two individuals to steal data SQL INJECTION Take control and steal data from a database DOS ATTACK Makes the computer system inaccessible for the users
  • 8. Latest Cyber Threats DRIDEX MALWARE Affects the public, government, infrastructure and business worldwide SCAM DATING SITES Affects people emotionally and personally EMOTET MALWARE Steals data and load malware
  • 9. Dridex Malware The U.S. Department of Justice (DOJ) charged the cyber-criminal group in a global Dridex malware attack. 6 1 2 4 3 5 This has affected the public, government, infrastructure, and businesses worldwide.. Dridex is a financial Trojan with a range of capabilities. Affecting victims since 2014, it infects computers through phishing emails or existing malware. Stealing passwords, banking details, and personal data, it has caused massive financial losses The U.K.’s National Cyber Security Centre advises to “ensure devices are patched, anti-virus is turned on and up to date and files are backed up”.
  • 10. Emotet Malware The Australian Cyber Security Centre warned national organizations about a global cyber threat from Emotet malware 1 2 3 Sophisticated Trojan that can steal data and load other malware Thrives on unsophisticated password
  • 11. Scam Dating Sites FBI warned U.S. citizens to be aware of the confidence fraud such as dating sites, chat rooms, and apps 1 2 3 Perpetrators take advantage of people seeking new partners, duping victims into giving away personal data. The FBI reports that this threat has affected 114 victims in New Mexico in 2019, with financial losses amounting to $1.6 million.
  • 12. Why Cyber Security is important? Government, Military, corporate world, financial, and medical organizations, collect, process, and store unmatched data on devices. Data can be sensitive information, like intellectual property, financial data, or personal information, and data with negative consequences. Organizations transmit sensitive data across networks and to other devices while doing business. Thus, Cyber Security describes the discipline dedicated to protecting that information and systems that areused to process or store them
  • 13. Detect and remove malicious code hidden in Master Boot Record (MBR) and are designed to encrypt or wipe data End-User Protection End-user protection or endpoint security is a crucial aspect of cyber security Cyber-security relies on cryptographic protocols to encrypt emails, files, and other critical data Scans computers for pieces of malicious code, quarantines this code, and then removes Confine potentially malicious programs to a virtual environment separate from a user's network Electronic security protocols also focus on real-time malware detection
  • 14. Cyber Safety Tips Do not open email attachments from unknown senders Avoid using unsecure Wi-Fi networks in public places Use Anti-Virus software Update your software and operating system Use strong passwords Do not click on links in emails from unknown senders