Vous êtes sur la page 1sur 16

CYBER SECURITY

PRESENTED BY:-VAIBHAV DADHICH


CONTENTS
• Introduction
• Why we need cyber security?
• How is cyber security implement?
• Tools
• Principle of cyber security
• Why cyber security affects everyone?
• What you can do?
• Types of cyber attacks and their solution
INTRODUCTION
=> Cyber security is the protection of internet-connected systems, including hardware,
software, and data from cyber attacks.
=> It is made of two words one is cyber and other is security. Cyber is related to the
technology which contains systems, network and programs or data. Whereas security
related to the protection which includes systems security, network security and application
and information security.
=> It is the body of technologies, processes, and practices designed to protect networks,
devices, programs, and data from attack, theft, damage, modification or unauthorized
access. It may also be referred to as information technology security.
Why we need cyber security?
• It helps in securing data from threats.

• It safeguards your system from viruses.

• Concerns for big data.

• Cloud storage security.

• To protect private, intellectual , sensitive and banking


or financial data.
How is cyber security implement?
There are numerous procedures for actually implementing cybersecurity, but there three
main steps when actually fixing a security-related issue.

The first step is to recognize the problem that is causing the security issue, for example,
we have to recognize whether there is a denial of service attack or a man in the middle
attack.

The next step is to evaluate and analyze the problem. We have to make sure we isolate all
the data and information that may have been compromised in the attack.

Finally, after evaluating and analyzing the problem, the last step is to develop a patch that
actually solves the problem and brings back the organization to a running state.
Cyber security penetration testing tools :

• Metasploit
• Nmap
• Wireshark
• Air crack-ng
• John the ripper
• Burp suite
Principles of cyber security
There are at least three main principles behind cyber security.

Confidentiality involves any information that is sensitive and should only be shared with a limited
number of people.
Integrity involves keeping information from being altered.
Availability involves ensuring those who rely on accurate information are able to access it. Availability
is often related to integrity, but can also involve things like a cyber attack preventing people from
accessing specific computers, or from accessing the internet.
Why cyber security affects everyone?

• Cyber security doesn’t involve just businesses and the government. Your
computer, tablet and cellphone probably contain information that hackers and
other criminals would love to have, like other people’s email addresses, names
and birthdates.

•Suppose, for example, a hacker had access to your contact information. He


could then send an email or text message to everyone you know, using your
name, encouraging them to click on a link containing malware.
Types of Cyber Attacks

•Phishing

•Malware

•Man in the middle attack

•SQL injection

•Password Attack
Phishing
Phishing attacks are the practice of sending fraudulent communications that
appear to come from a reputable source. It is usually done through email. The
goal is to steal sensitive data like credit card and login information, or to
install malware on the victim’s machine.
Malware

• The word “Malware” comes from the term “MALicious


softWARE.”
• Malicious software can be described as unwanted software
that is installed in your system without your consent.
Man-in-the-Middle attack

• A Man-in-the-Middle attack occurs when a hacker inserts


itself between the communications of a client and a server.
• A malicious actor goes between two parties & gains access to
private information.
SQL Injection
• SQL injection is a code injection technique, used to attack
data-driven applications, in which malicious SQL statements
are inserted into an entry field for execution (e.g. to dump
the database contents to the attacker). SQL injection must
exploit a security vulnerability in an application's software.
SQL Injection
• SQL injection is a code injection technique, used to attack
data-driven applications, in which malicious SQL statements
are inserted into an entry field for execution (e.g. to dump
the database contents to the attacker). SQL injection must
exploit a security vulnerability in an application's software.
Password Attack
Password cracking is the process of recovering passwords from data have been stored in
or transmitted by a computer system. The common approach can be done in either a
random or systematic manner:
 Brute force
 Dictionary attack
ANY QUESTIONS ?

Vous aimerez peut-être aussi