0% found this document useful (0 votes)
15 views28 pages

Samaltman 2

The document discusses data breaches and cyber threats, defining data breaches as unauthorized access to sensitive information. It outlines various types of breaches, common cyber attacks, their causes, and major case studies, emphasizing the importance of cybersecurity measures. Preventive strategies include strong password policies, regular software updates, and employee training to mitigate risks associated with cyber threats.

Uploaded by

Ansh Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views28 pages

Samaltman 2

The document discusses data breaches and cyber threats, defining data breaches as unauthorized access to sensitive information. It outlines various types of breaches, common cyber attacks, their causes, and major case studies, emphasizing the importance of cybersecurity measures. Preventive strategies include strong password policies, regular software updates, and employee training to mitigate risks associated with cyber threats.

Uploaded by

Ansh Gupta
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 28

DATA

BREACH
ANDUNDERSTANDING CYBER THREATS, CAUSES,
AND PREVENTION MEASURES

CYBER
ATTACKS
INTRODUCTIO
N
A data breach occurs when confidential,
sensitive, or protected information is accessed,
disclosed, or stolen by unauthorized
individuals.

Cyber attacks are malicious attempts to


compromise, damage, or steal data from a
system or network. With increasing
dependence on digital platforms, cybersecurity
has become a crucial aspect of both personal
and organizational security.
TYPES DATA
OF BREACHES

ACCIDENTAL
EXPOSURE
Happens when sensitive
data is unintentionally MALICIOUS
exposed due to BREACH
Occurs when hackers INSIDER
misconfiguration or
human error.
deliberately gain THREATS
Employees, contractors,
unauthorized access or business partners
to data. may intentionally or
accidentally leak data.
COMMON
CYBER
ATTACKS
Denial of Service (DoS): Overloads a system or network, making it unavailable to
users.
Ransomware: Encrypts files and demands a ransom for decryption.

Phishing: Attackers send fake emails pretending to be trusted entities to trick


users into revealing credentials.

Man-in-the-Middle (MITM): Intercepts communication between two parties to steal sensitive


information.

Malware: Malicious software such as viruses, worms, and trojans that harm or steal data.
CAUSES OF
UNPATCHED SOFTWARE
DATA Security vulnerabilities in outdated
BREACHES software provide entry points for
attackers.
HUMAN ERROR
Mistakenly sending confidential data or
misconfiguring security settings.

WEAK INSIDER THREATS


PASSWORDS
Easily guessable or reused Employees or associates misusing their
passwords make it simple access privileges for personal gain or
for hackers to gain access. revenge.
MAJOR CYBER
CASE
ATTACK
STUDIES
YAHOO DATA BREACH WANNACRY RANSOMWARE EQUIFAX DATA BREACH
(2013-2014) ATTACK (2017) (2017)

One of the biggest data A ransomware attack Due to unpatched


breaches where 3 billion that spread worldwide, software, hackers stole
accounts were affecting hospitals, the personal data of 147
compromised, exposing banks, and businesses million individuals.
personal information. by locking their data and
demanding payment.
PREVENTIVMEASURE
E S

1.Implement Strong Password Policies: Use complex and unique passwords for each
account.
2. Regular Software Updates: Keep all applications and systems updated to patch
security vulnerabilities.
3. Cybersecurity Training: Educate employees on recognizing phishing emails and
security best practices.
4. Multi-Factor Authentication (MFA): Adds an extra layer of security beyond just a
password.
5. Regular Security Audits: Conduct periodic assessments to identify and fix security
CONCL
USION
WITH THE GROWING NUMBER OF
CYBER THREATS, BUSINESSES AND
INDIVIDUALS MUST ADOPT
STRONG CYBERSECURITY
PRACTICES. CYBER ATTACKS WILL
CONTINUE TO EVOLVE, MAKING
PROACTIVE SECURITY MEASURES
ESSENTIAL. FUTURE TRENDS
INCLUDE ARTIFICIAL INTELLIGENCE
IN CYBERSECURITY, ENHANCED
ENCRYPTION METHODS, AND
STRICTER REGULATIONS TO
PROTECT USER DATA.
CYBER
SAFETY
Technology Presentation
1
questio
n

What is cyber safety?


a) b) c) d)
Protecting Protecting
yourself Protecting yourself Protecting
from yourself from yourself
physical from natural from
harm online disasters sunburn
harm
1
answe
r

What is cyber safety?


b)

Protecting
yourself
from
online
harm
2
questio
n

What is personal
a) information?
Information about
b)
Information that
your age and school can identify you,
like your name or
address

c) d)
Information about
All of these
your family
2
answe
r

What is personal
information?

d)
All of these
3
questio
n

a) password123

Which of b) qwerty
the
following is c) ilovecats

a strong
d) b$1y%T3@k
password?
3
answe
r

Which of
the
following is
a strong
d) b$1y%T3@k
password?
4
questio
n
What should you do if
someone you don't know
tries to contact you online?
a) b) c) d)
Reply to Ignore Add them
their their Give them as a
message message your friend on
and and tell a personal your
become trusted informatio social
friends adult n media
4
answe
r
What should you do if
someone you don't know
tries to contact you online?
b)
Ignore
their
message
and tell a
trusted
adult
5
questio

What is cyberbullying?
n

a) b)
Using technology to
harm or harass Being scared of
someone using technology

c) d)
Pushing a computer
Sharing funny
over and then
memes with your
laughing at it
friends
5
answe

What is cyberbullying?
r

a)
Using technology to
harm or harass
someone
6
questio
n

a) Your home address

Which of
b) Your school name
the
following is c) Your favorite hobby

safe to d) Your birth date


share
online?
6
answe
r

Which of
the
following is c) Your favorite hobby

safe to
share
online?
7
What is phishing?
questio
n

a) b) c) d)
Pretending
Spending to be
Playing
Saturday someone
Swimming online
at the else online
in the games
lake to get
river with with
catching personal
the fish friends
fish informatio
n
7
What is phishing?
answe
r

d)
Pretending
to be
someone
else online
to get
personal
informatio
n
8
What is malware?
questio
n

a) b)
A type of virus that
can harm your A type of protective
computer or device software

c) d)
A type of online A special outfit to
chatroom wear ito a party for
Uncle Mal
8
What is malware?
answe
r

a)
A type of virus that
can harm your
computer or device
9
questio
n

The impression you leave


a)
online

What is a b) A picture of your foot


taken with a camera
digital Walking on a laptop
c)
footprint?
d) A type of online game
9
answe
r

The impression you leave


a)
online

What is a
digital
footprint?
THANKYOU
MADE BY : ANSH GUPTA

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy