0% found this document useful (0 votes)
46 views8 pages

Cyber Security Techniques

The document discusses several trends that are changing cyber security, including the continued threat of web application attacks, the growing adoption of cloud computing services, the risks of targeted attacks and advanced persistent threats (APTs), the vulnerability of mobile networks, the importance of encryption, and the role of social media in personal cyber threats. It also outlines some common cyber security techniques such as access control, authentication of data, malware scanning, firewalls, and antivirus software.

Uploaded by

Solehin Azrain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views8 pages

Cyber Security Techniques

The document discusses several trends that are changing cyber security, including the continued threat of web application attacks, the growing adoption of cloud computing services, the risks of targeted attacks and advanced persistent threats (APTs), the vulnerability of mobile networks, the importance of encryption, and the role of social media in personal cyber threats. It also outlines some common cyber security techniques such as access control, authentication of data, malware scanning, firewalls, and antivirus software.

Uploaded by

Solehin Azrain
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8

METHODOLOGY

TRENDS CHANGING CYBER


SECURITY

Web servers Cloud computing and its


services
The threat of web application attacks to Cloud services are being gradually
extract data or distribute malicious code adopted by all small, medium, and large
persists. Cybercriminals distribute their businesses these days. In other words,
malicious code through legitimate web the world is gradually approaching the
servers that they have compromised. clouds.
TRENDS CHANGING CYBER
SECURITY

APT’s and targeted Mobile Networks


attacks
APT (Advanced Persistent Mobile networks are highly vulnerable
Threat) is a completely to cybercrime, extreme caution must be
new level of cybercrime exercised in the event of a security
ware. breach
TRENDS CHANGING CYBER
SECURITY

Encryption of the code

Encryption is the process of encoding


messages (or information) in such a way that
it cannot be read by eavesdroppers or
hackers. An encryption scheme encrypts a
message or information using an encryption
algorithm, resulting in unreadable cipher text
ROLE OF SOCIAL MEDIA IN
CYBER SECURITY

Social media plays a huge role in cyber


security and will contribute a lot to personal
cyber threats. Social media adoption among
personnel is skyrocketing and so is the
threat of attack.
RESULT
CYBER SECURITY TECHNIQUES

Access control and Authentication of


Malware scanners
password security data
The concept of username and The documents that we This is software that usually
password has been fundamental receive must always be scans all the files and
way of protecting our information. authenticated be before documents present in the
This may be one of the first downloading that is it should system for malicious code or
measures regarding cyber security. be checked if it has harmful viruses.
originated from a trusted and
a reliable source and that
they are not altered.
CYBER SECURITY TECHNIQUES

Firewalls Antivirus software


A firewall is a software Antivirus software is a computer
program or piece of program that detects, prevents,
hardware that helps screen and takes action to disarm or
out hackers, viruses, and remove malicious software
worms that try to reach your programs, such as viruses and
computer over the Internet. worms.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy