0% found this document useful (0 votes)
14 views6 pages

Cybersecurity Module5 Presentation

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks aimed at accessing or destroying sensitive information. It is crucial for protecting data, ensuring business continuity, maintaining trust, and complying with legal requirements. Common threats include malware, phishing, and DDoS attacks, while basic protection practices involve using strong passwords, enabling multi-factor authentication, and regular data backups.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views6 pages

Cybersecurity Module5 Presentation

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks aimed at accessing or destroying sensitive information. It is crucial for protecting data, ensuring business continuity, maintaining trust, and complying with legal requirements. Common threats include malware, phishing, and DDoS attacks, while basic protection practices involve using strong passwords, enabling multi-factor authentication, and regular data backups.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 6

What is Cybersecurity?

Cybersecurity refers to the practice of protecting


• Systems
• Networks
• Programs
from digital attacks.

These cyberattacks are usually aimed at


• Accessing
• Changing or destroying sensitive information
• Extorting money from users
Why is Cybersecurity Important?
 Protection of sensitive data: Personal, financial, and business
data need to be protected from unauthorized access.
 Business continuity: Ensures that services remain
uninterrupted by attacks like ransomware or DDoS.
 Trust and reputation: Organizations with strong cybersecurity
frameworks gain more trust from users.
 Legal compliance: Laws like GDPR, HIPAA, and India's IT Act
mandate cybersecurity practices.
Example:
A bank uses firewalls and encryption to protect customer
transactions. Without cybersecurity, attackers might intercept and
misuse customer credentials.
Malware (Malicious Software) is any software intentionally designed
to cause disruption to a computer, server, client, or computer network,
leak private information, gain unauthorized access to information or
systems, deprive access to information, or which unknowingly
interferes with the user's computer security and privacy.

 Computer viruses  Spyware


 Worms  Adware
 Trojan horses  Rogue software
 Logic bombs  Wipers
 Ransomware  Keyloggers

Anti Viruses & Firewalls


Common Threats and Vulnerabilities

Threats:

1. Malware: Malicious software like viruses, worms, trojans, ransomware, and


spyware.

o Example: Ransomware encrypts your files and demands payment to


unlock them.

2. Phishing: Fraudulent attempts to obtain sensitive information by disguising


as trustworthy entities.

o Example: A fake email that looks like it’s from your bank asking for your
login details.

3. Man-in-the-middle (MitM) attacks: Intercepting communication between


two parties.

o Example: Hackers stealing data by intercepting information sent over


public Wi-Fi.

4. Denial-of-Service (DoS) and Distributed DoS (DDoS): Flooding a


Vulnerabilities:

 Outdated software: Old applications may have security loopholes.

 Weak passwords: Easily guessed or reused passwords make systems


vulnerable.

 Unpatched systems: Missing security updates can be exploited.

 Social engineering: Manipulating individuals into revealing


confidential information.

Software, hardware, human, outdated, Default Credentials, Insufficient


Access Control, Inadequate network security, third party software, lack of
security testing, training,
Basic Data Protection and Security Practices
Key Practices:
1. Use strong passwords: Use combinations of letters, numbers, and
symbols.
2. Enable multi-factor authentication (MFA): Adds an extra layer of
security.
3. Install and update antivirus software.
4. Keep software and operating systems updated.
5. Regular data backup: Back up data regularly to recover it in case
of ransomware or accidental deletion.
6. Be cautious with emails and attachments.
7. Use firewalls and intrusion detection systems.

Example:
An employee backs up critical documents to a secure cloud drive weekly.
When ransomware encrypts their system, the backup allows full
recovery.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy