The document discusses several trends that are changing cyber security, including the continued threat of web application attacks, the growing adoption of cloud computing services, the risks of targeted attacks and advanced persistent threats (APTs), the vulnerability of mobile networks, the importance of encryption, and the role of social media in personal cyber threats. It also outlines some common cyber security techniques such as access control, authentication of data, malware scanning, firewalls, and antivirus software.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
46 views8 pages
Cyber Security Techniques
The document discusses several trends that are changing cyber security, including the continued threat of web application attacks, the growing adoption of cloud computing services, the risks of targeted attacks and advanced persistent threats (APTs), the vulnerability of mobile networks, the importance of encryption, and the role of social media in personal cyber threats. It also outlines some common cyber security techniques such as access control, authentication of data, malware scanning, firewalls, and antivirus software.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 8
METHODOLOGY
TRENDS CHANGING CYBER
SECURITY
Web servers Cloud computing and its
services The threat of web application attacks to Cloud services are being gradually extract data or distribute malicious code adopted by all small, medium, and large persists. Cybercriminals distribute their businesses these days. In other words, malicious code through legitimate web the world is gradually approaching the servers that they have compromised. clouds. TRENDS CHANGING CYBER SECURITY
APT’s and targeted Mobile Networks
attacks APT (Advanced Persistent Mobile networks are highly vulnerable Threat) is a completely to cybercrime, extreme caution must be new level of cybercrime exercised in the event of a security ware. breach TRENDS CHANGING CYBER SECURITY
Encryption of the code
Encryption is the process of encoding
messages (or information) in such a way that it cannot be read by eavesdroppers or hackers. An encryption scheme encrypts a message or information using an encryption algorithm, resulting in unreadable cipher text ROLE OF SOCIAL MEDIA IN CYBER SECURITY
Social media plays a huge role in cyber
security and will contribute a lot to personal cyber threats. Social media adoption among personnel is skyrocketing and so is the threat of attack. RESULT CYBER SECURITY TECHNIQUES
Access control and Authentication of
Malware scanners password security data The concept of username and The documents that we This is software that usually password has been fundamental receive must always be scans all the files and way of protecting our information. authenticated be before documents present in the This may be one of the first downloading that is it should system for malicious code or measures regarding cyber security. be checked if it has harmful viruses. originated from a trusted and a reliable source and that they are not altered. CYBER SECURITY TECHNIQUES
Firewalls Antivirus software
A firewall is a software Antivirus software is a computer program or piece of program that detects, prevents, hardware that helps screen and takes action to disarm or out hackers, viruses, and remove malicious software worms that try to reach your programs, such as viruses and computer over the Internet. worms.