SlideShare a Scribd company logo
Cyber Security
Engr. Ringko Kabiraj
Analyst (Server & Cloud Security)
National Data Center, BCC
HCNA, RHCSA, RHCE, CEH, CHFI, CLOUD, VIRTUALIZATION, CTFL@ISTQB,
Agile@ISTQB, NCP, ECA Certified
• Security is freedom from, or resilience against, potential harm (or other
unwanted coercive change) caused by others.
• Cyber security is the practice of defending computers, servers, mobile
devices, electronic systems, networks, and data from malicious attacks.
• Cyber security refers to the technologies and processes designed to
protect computers, networks and data from unauthorized access and
attacks delivered via the internet by cyber criminals
Introduction
cscnapd.ppt
 Hacking
 Phishing
 Denial of Service (DoS)
 Distributed Denial of Service (DDoS)
 Spam Email
 Spyware, Adware
 Malware (Trojan, Virus, Worms etc. )
 Ransomware
Types of Cyber Crime
• Network security: The process of protecting the network from
unwanted users, attacks and intrusions.
• Application security: Apps require constant updates and testing to
ensure these programs are secure from attacks.
• Endpoint security: Remote access is a necessary part of business, but
can also be a weak point for data. Endpoint security is the process of
protecting remote access to a company’s network.
• Data security: Inside of networks and applications is data. Protecting
company and customer information is a separate layer of security.
• IoT Security: Internet of Things Security (IoT Security) comprises
protecting the internet-enabled devices that connect on wireless
networks.
CHALLENGES OF CYBER SECURITY
• Identity management: Essentially, this is a process of understanding the
access every individual has in an organization.
• Database and infrastructure security: Everything in a network involves
databases and physical equipment. Protecting these devices is equally
important.
• Cloud security: Many files are in digital environments or ā€œthe cloudā€.
Protecting data in a 100% online environment presents a large amount
of challenges.
• Mobile security: Smart phones and tablets involve virtually every type
of security challenge in and of themselves.
• Disaster recovery/business continuity planning: In the event of a
breach, natural disaster or other event data must be protected and
business must go on.
CHALLENGES OF CYBER SECURITY
Hacking & Types
Hacking:
Hacking is the process of gaining unauthorized access into a computer
system, or group of computer systems. This is done through cracking of
passwords and codes which gives access to the systems.
Types:
 Black Hat
 White Hat
 Grey Hat
Types of Hacking
Website/Application Hacking
Network Hacking
Ethical Hacking
Password Hacking
Online Banking Hacking
Computer Hacking
DNS Poisoning
SQL Injection
DOS
DDOS
Ransomware
XSS
 Foundations of Security
 Cloud Security
 Web Security
 Securing Operating Systems
 Encryption
 Data Backup and Disaster Recovery
 Internet Security
 Secure Network Connections
 Secure Email Communications
 Social Engineering and Identity Theft
 Security on Social Networking Sites
 Securing Mobile Devices
 Latest Cyber Attacks and role of Bangladesh Government
cscnapd.ppt

More Related Content

PPTX
Cyber Security: A Hands on review
PDF
Presentation 10 (1).pdf
PPTX
Cyber Security awareness of cyber security
PPTX
What is Cyber & information security.pptx
PPTX
CYBER SECURITY DEFINITION AND TYPES.pptx
PPTX
Cybersecurity Course in Hyderabad – Learn to Protect Digital Assets
PPTX
Lec 1- Intro to cyber security and recommendations
PPTX
Cyber Security and Data Privacy in Information Systems.pptx
Cyber Security: A Hands on review
Presentation 10 (1).pdf
Cyber Security awareness of cyber security
What is Cyber & information security.pptx
CYBER SECURITY DEFINITION AND TYPES.pptx
Cybersecurity Course in Hyderabad – Learn to Protect Digital Assets
Lec 1- Intro to cyber security and recommendations
Cyber Security and Data Privacy in Information Systems.pptx

Similar to cscnapd.ppt (20)

PPTX
Network security and firewalls
PPT
Dos and Dont to be followed to protect information and technology
PPTX
Unit 1.pptx
PPTX
Cyber security for business
PPTX
Cyber Security PPT.pptx
PPT
Chapter1 intro network_security_sunorganised
PPTX
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
PPTX
Unit 1 Network Fundamentals and Security .pptx
PPTX
Cyber security.pptxelectronic systems, networks, and data from malicious
PPTX
Cyber Security PPT.pptx
PPTX
Cyber security and its controls.pptx
PPTX
Cybersecurity_Essentials (1).pptx|cyber essentials
PPTX
Cyber-Security-Unit-1.pptx
PPTX
Cysec.pptx
PPTX
cyber security
PPTX
Cyber security
PPTX
Cysecc.pptx
PPTX
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
PPTX
FCT UNIT 5 Foundation of computing technologies.pptx
PPTX
Data protection and security
Network security and firewalls
Dos and Dont to be followed to protect information and technology
Unit 1.pptx
Cyber security for business
Cyber Security PPT.pptx
Chapter1 intro network_security_sunorganised
43080d37-44e9-4b2f-9cb5-ceb90f3fab98.pptx
Unit 1 Network Fundamentals and Security .pptx
Cyber security.pptxelectronic systems, networks, and data from malicious
Cyber Security PPT.pptx
Cyber security and its controls.pptx
Cybersecurity_Essentials (1).pptx|cyber essentials
Cyber-Security-Unit-1.pptx
Cysec.pptx
cyber security
Cyber security
Cysecc.pptx
Cybersecurity : Tips and Tools to Properly Protect Your Digital Assets
FCT UNIT 5 Foundation of computing technologies.pptx
Data protection and security
Ad

Recently uploaded (20)

PPTX
Welding lecture in detail for understanding
PPTX
Strings in CPP - Strings in C++ are sequences of characters used to store and...
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Lesson 3_Tessellation.pptx finite Mathematics
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Sustainable Sites - Green Building Construction
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
OOP with Java - Java Introduction (Basics)
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
web development for engineering and engineering
DOCX
573137875-Attendance-Management-System-original
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Welding lecture in detail for understanding
Strings in CPP - Strings in C++ are sequences of characters used to store and...
Arduino robotics embedded978-1-4302-3184-4.pdf
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Lesson 3_Tessellation.pptx finite Mathematics
UNIT 4 Total Quality Management .pptx
Sustainable Sites - Green Building Construction
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
CYBER-CRIMES AND SECURITY A guide to understanding
OOP with Java - Java Introduction (Basics)
CH1 Production IntroductoryConcepts.pptx
web development for engineering and engineering
573137875-Attendance-Management-System-original
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Structs to JSON How Go Powers REST APIs.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Ad

cscnapd.ppt

  • 1. Cyber Security Engr. Ringko Kabiraj Analyst (Server & Cloud Security) National Data Center, BCC HCNA, RHCSA, RHCE, CEH, CHFI, CLOUD, VIRTUALIZATION, CTFL@ISTQB, Agile@ISTQB, NCP, ECA Certified
  • 2. • Security is freedom from, or resilience against, potential harm (or other unwanted coercive change) caused by others. • Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. • Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered via the internet by cyber criminals Introduction
  • 4.  Hacking  Phishing  Denial of Service (DoS)  Distributed Denial of Service (DDoS)  Spam Email  Spyware, Adware  Malware (Trojan, Virus, Worms etc. )  Ransomware Types of Cyber Crime
  • 5. • Network security: The process of protecting the network from unwanted users, attacks and intrusions. • Application security: Apps require constant updates and testing to ensure these programs are secure from attacks. • Endpoint security: Remote access is a necessary part of business, but can also be a weak point for data. Endpoint security is the process of protecting remote access to a company’s network. • Data security: Inside of networks and applications is data. Protecting company and customer information is a separate layer of security. • IoT Security: Internet of Things Security (IoT Security) comprises protecting the internet-enabled devices that connect on wireless networks. CHALLENGES OF CYBER SECURITY
  • 6. • Identity management: Essentially, this is a process of understanding the access every individual has in an organization. • Database and infrastructure security: Everything in a network involves databases and physical equipment. Protecting these devices is equally important. • Cloud security: Many files are in digital environments or ā€œthe cloudā€. Protecting data in a 100% online environment presents a large amount of challenges. • Mobile security: Smart phones and tablets involve virtually every type of security challenge in and of themselves. • Disaster recovery/business continuity planning: In the event of a breach, natural disaster or other event data must be protected and business must go on. CHALLENGES OF CYBER SECURITY
  • 7. Hacking & Types Hacking: Hacking is the process of gaining unauthorized access into a computer system, or group of computer systems. This is done through cracking of passwords and codes which gives access to the systems. Types:  Black Hat  White Hat  Grey Hat
  • 8. Types of Hacking Website/Application Hacking Network Hacking Ethical Hacking Password Hacking Online Banking Hacking Computer Hacking DNS Poisoning SQL Injection DOS DDOS Ransomware XSS
  • 9.  Foundations of Security  Cloud Security  Web Security  Securing Operating Systems  Encryption  Data Backup and Disaster Recovery  Internet Security  Secure Network Connections  Secure Email Communications  Social Engineering and Identity Theft  Security on Social Networking Sites  Securing Mobile Devices  Latest Cyber Attacks and role of Bangladesh Government