0% found this document useful (0 votes)
51 views10 pages

Cyber Security & Threat

1. Cyber security refers to protecting systems, networks, programs, and data from cyber attacks. It aims to reduce the risk of cyber attacks by making them less likely to occur. 2. Critical infrastructure organizations like those in the energy and transport sectors are often more vulnerable to attacks due to their reliance on older control systems. UK regulations require these organizations to implement security measures to manage risks. 3. Cloud security refers to protecting the data, applications, and infrastructure that are stored in the cloud. Common cyber threats include malware, backdoors, cryptojacking, and distributed denial-of-service attacks.

Uploaded by

manahil1407
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views10 pages

Cyber Security & Threat

1. Cyber security refers to protecting systems, networks, programs, and data from cyber attacks. It aims to reduce the risk of cyber attacks by making them less likely to occur. 2. Critical infrastructure organizations like those in the energy and transport sectors are often more vulnerable to attacks due to their reliance on older control systems. UK regulations require these organizations to implement security measures to manage risks. 3. Cloud security refers to protecting the data, applications, and infrastructure that are stored in the cloud. Common cyber threats include malware, backdoors, cryptojacking, and distributed denial-of-service attacks.

Uploaded by

manahil1407
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Cyber Security

and Threat.

By: Manahil AlI Khan


9G2
What Is Cyber Security?

Security in the context of cyberspace refers to the


application of technologies, processes, and controls
in order to safeguard against cyber-attacks on
systems, networks, programs, devices, and data. With
the aim of reducing the possibility of cyber-attacks
and protecting against unauthorized access to
systems, networks, and technologies, this initiative
aims to reduce the risk of cyber-attacks by reducing
the chances that they will occur.
e e
h r
e t r
t h b e
r e c y
t a o f ?
a s i t y
h pe ur
W ty c
s e
Critical infrastructure organizations are
1. Critical often more vulnerable to attack than

infrastructure others because SCADA (supervisory


control and data acquisition) systems

cyber security often rely on older software.


Operators of essential services in the UK’s
energy, transport, health, water, and digital
infrastructure sectors, and digital service
providers are bound by the NIS
Regulations.
The Regulations require organizations to
implement appropriate technical and
organizational measures to manage their
security risks.
r k Network security involves
o
t w t y addressing vulnerabilities
e r i
. N u affecting your operating
2 e c
s systems and network
architecture, including
servers and hosts, firewalls
and wireless access points,
and network protocols.
Generally speaking, cloud
3. Cloud security refers to the
security of data,
security applications, and
infrastructure in the cloud.
Managing Cyber Security
Effective cyber security management must come
from the top of the organization.
A robust cyber security culture, reinforced by
regular training, will ensure that every employee
recognizes cyber security as their responsibility.
Good security and effective working practices must
go hand in hand.
01 Removable media such as flash drives.

Cyber Threats 02
Brute force attack using trial and error to
decode encrypted data.

A cyber or cybersecurity threat is a malicious act 03 Web or email attacks.


that seeks to damage data, steal data, or disrupt
digital life in general. Unauthorized use of your organization's
04 system privileges.

Loss or theft of devices containing


05 confidential information.

Phishing scams and social engineering


06 hacks.
TYPES OF CYBER THREATS

Common cyber threats include:


Malware, such as ransomware, botnet software, RATs (remote access Trojans),
rootkits and boot kits, spyware, Trojans, viruses, and worms.
Backdoors, which allow remote access.
Formjacking, which inserts malicious code into online forms.
Cryptojacking, which installs illicit cryptocurrency mining software.
DDoS (distributed denial-of-service) attacks flood servers, systems, and networks
with traffic to knock them offline.
DNS (domain name system) poisoning attacks compromise the DNS to redirect
traffic to malicious sites.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy